<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.ietf-emu-eaptlscert" target="https://datatracker.ietf.org/doc/html/draft-ietf-emu-eaptlscert-06">
   <front>
      <title>Handling Large Certificates and Long Certificate Chains in TLS-based EAP Methods</title>
      <author initials="M." surname="Sethi" fullname="Mohit Sethi">
         <organization>Ericsson</organization>
      </author>
      <author initials="J. P." surname="Mattsson" fullname="John Preuß Mattsson">
         <organization>Ericsson</organization>
      </author>
      <author initials="S." surname="Turner" fullname="Sean Turner">
         <organization>sn3rd</organization>
      </author>
      <date month="October" day="28" year="2020" />
      <abstract>
	 <t>   The Extensible Authentication Protocol (EAP), defined in RFC3748,
   provides a standard mechanism for support of multiple authentication
   methods.  EAP-Transport Layer Security (EAP-TLS) and other TLS-based
   EAP methods are widely deployed and used for network access
   authentication.  Large certificates and long certificate chains
   combined with authenticators that drop an EAP session after only 40 -
   50 round-trips is a major deployment problem.  This document looks at
   the this problem in detail and describes the potential solutions
   available.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-emu-eaptlscert-06" />
   
</reference>
