Missing SSL Change Cipher Spec in EAP-TLS	withClientCertificate verify failed
    yuqiang 
    yuqiang1973 at 163.com
       
    Fri Jul  8 18:37:06 CEST 2011
    
    
  
 I think the packets described in red rect should be communicate between client and server, when the certificate verification failed. 
2011-07-09 
yuqiang1973 
发件人: Alan DeKok-2 [via FreeRadius] 
发送时间: 2011-07-09  00:21:07 
收件人: yuqiang 
抄送: 
主题: Re: Missing SSL Change Cipher Spec in EAP-TLS withClientCertificate verify failed 
 
Phil Mayers wrote: 
> EAP-TLS in FreeRADIUS WORKS. Stop posting nonsense about RFC compliance. 
  If the certificate verification fails, then the server is *supposed* 
to stop the EAP-TLS conversation. 
> FreeRADIUS just uses OpenSSL. OpenSSL works. OpenSSL is compliant with 
> the standards. 
> 
> There is nothing wrong with FreeRADIUS or OpenSSL. 
  Everything is working as expected, and as required by the specifications. 
  Alan DeKok. 
- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/devel.html
If you reply to this email, your message will be added to the discussion below:
http://freeradius.1045715.n5.nabble.com/Missing-SSL-Change-Cipher-Spec-in-EAP-TLS-with-Client-Certificate-verify-failed-tp4565228p4565389.html 
To unsubscribe from Missing SSL Change Cipher Spec in EAP-TLS with Client Certificate verify failed, click here. 
--
View this message in context: http://freeradius.1045715.n5.nabble.com/Missing-SSL-Change-Cipher-Spec-in-EAP-TLS-with-Client-Certificate-verify-failed-tp4565228p4565453.html
Sent from the FreeRadius - Dev mailing list archive at Nabble.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-devel/attachments/20110708/271bf1d6/attachment.html>
    
    
More information about the Freeradius-Devel
mailing list