@techreport{ietf-pppext-eap-ttls-05, number = {draft-ietf-pppext-eap-ttls-05}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-pppext-eap-ttls/05/}, author = {Paul Funk and Simon Blake-Wilson}, title = {{EAP Tunneled TLS Authentication Protocol (EAP-TTLS)}}, pagetotal = 52, year = 2004, month = jul, day = 20, abstract = {EAP-TTLS is an EAP protocol that extends EAP-TLS. In EAP-TLS, a TLS handshake is used to mutually authenticate a client and server. EAP- TTLS extends this authentication negotiation by using the secure connection established by the TLS handshake to exchange additional information between client and server. In EAP-TTLS, the TLS handshake may be mutual; or it may be one-way, in which only the server is authenticated to the client. The secure connection established by the handshake may then be used to allow the server to authenticate the client using existing, widely-deployed authentication infrastructures such as RADIUS. The authentication of the client may itself be EAP, or it may be another authentication protocol such as PAP, CHAP, MS-CHAP or MS-CHAP-V2.}, }