Ready for 2.2.7?
    Alan DeKok 
    aland at deployingradius.com
       
    Tue Mar 31 18:16:25 CEST 2015
    
    
  
On Mar 31, 2015, at 10:53 AM, Jouni Malinen <jkmalinen at gmail.com> wrote:
> It should actually already be possible to enable this by adding
> phase1="tls_disable_session_ticket=0" into the network profile in
> wpa_supplicant/eapol_test.
  That's good to know.
> This workaround (of not sending session
> ticket) can also be disabled with eap_workaround=0, but it looks like
> that actually results in other issues with FreeRADIUS (mismatch in
> EAP-MSCHAPv2 header length when used within PEAP),
  Hmm... I don't see that here.  Do you have packet traces / debug logs?
  And the inner EAP data in PEAP is... stupid.  Very, very, stupid.  <sigh>
> I don't know which TLS implementation is involved in the problem cases
> or whether the EAP server implementation manages to break this on  its
> own. Anyway, none of the reported interop issues with TLS session
> ticket extension have been with FreeRADIUS.
  That's good to know.
  Alan DeKok.
    
    
More information about the Freeradius-Users
mailing list