X509v3 EAP Parameter Extension
draft-rieckers-eapparameterextension-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Jan-Frederik Rieckers | ||
Last updated | 2020-05-04 (Latest revision 2019-11-01) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document specifies an extension to X509v3 certificates for EAP- TLS servers to mitigate some flaws in the specification to the use of TLS in EAP as specified in RFC5216. The specified extension enables clients to decide whether to trust the certificate presented by the EAP-TLS server by including information implicitly defined by login credentials or communication context in the server certificate.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)