![]() ![]() 24 11.2 Tunneled Authentication Protocols. Internet-Draft February 2008 11.1 Implicit challenge. 23 10.3 Guidelines for Maximum Compatibility with AAA Servers. Encapsulation of AVPs within the TLS Record Layer. 15 7.6 Determining Whether to Enter Phase 2. Of the EAP-TTLS protocol, which has been widely deployed.ġ. This document describes EAP-TTLSv0 that is, the original version 0 The keying material is established implicitly between client and Protecting the security of these legacy protocols againstĮavesdropping, man-in-the-middle and other attacks.ĮAP-TTLS also allows client and server to establish keying materialįor use in the data connection between the client and access point. To be used against existing authentication databases, while Thus, EAP-TTLS allows legacy password-based authentication protocols ![]() Itself be EAP, or it may be another authentication protocol such as The secure connectionĮstablished by the handshake may then be used to allow the server toĪuthenticate the client using existing, widely-deployedĪuthentication mechanisms. Handshake may be mutual or it may be one-way, in which only the TTLS extends this authentication negotiation by using the secureĬonnection established by the TLS handshake to exchange additional Handshake is used to mutually authenticate a client and server. All Rights Reserved.ĮAP-TTLS is an EAP method that provides additional functionalityīeyond what is available in EAP-TLS. The list of Internet-Draft Shadow Directories can be accessed atĬopyright (C) The IETF Trust (2008). The list of current Internet-Drafts can be accessed at Reference material or to cite them other than as "work in progress." It is inappropriate to use Internet-Drafts as Months and may be updated, replaced, or obsoleted by other documentsĪt any time. ![]() Internet-Drafts are draft documents valid for a maximum of six Other groups may also distribute working documents as Internet. Task Force (IETF), its areas, and its working groups. Internet-Drafts are working documents of the Internet Engineering Have been or will be disclosed, and any of which he or she becomesĪware will be disclosed, in accordance with Section 6 of BCP 79. Intended status: Informational Simon Blake-WilsonĮAP Tunneled TLS Authentication Protocol Version 0 (EAP-TTLSv0)īy submitting this Internet-Draft, each author represents that anyĪpplicable patent or other IPR claims of which he or she is aware ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |