In practice it is difficult to securely support self-signed certificates.  
There are several issues involved:

a. Vulnerability to man-in-the-middle attack on initial provisioning.  For 
wireless networks, this is a significant risk, more so than with protocols like 
SSH, where initial contact might occur over a wired network. 

b. Potential for affecting other applications.  Self-signed certificates, if 
trusted for a given use, must not be used as trust anchors for other uses.  
This can require significant additional work to make sure that trust is 
properly isolated. 

For these reasons, I do not believe that EAP methods relying on self-signed 
certificates satisfy the requirements of RFC 4017. 


_______________________________________________
Emu mailing list
Emu@ietf.org
http://www.ietf.org/mailman/listinfo/emu

Reply via email to