Alan DeKok wrote:

 >> I personally fine with writing MUST send an Error alert if the WG wants 
 >> that.
>
> This is what all implementations have done for ~15 years.  The TLS Alert 
> satisfies the "altReject" 
> requirements of RFC 4137.  Which means it's a very good iea.

Jorge said offline that he also wanted this behaivior. I will update the draft 
to make TLS Error alerts mandatory to send.

Maybe the draft should summarize the profiling EAP-TLS 1.3 does on TLS 1.3

- OCSP stapling mandatory to support for server
- Only cipher suites with confidentiality
- MUST send Erros alert.



>> I don't if this would be common or expected behavior from the server, but if 
>> EAP-TLS cannot
>> enforce that this to not happen, then we cannot use close_notify as an 
>> alternate success
>> indication, because an alternate success indication cannot be followed by 
>> EAP-Failure.
>
> Perhaps just update the document to say that such use-cases are forbidden?

I already did that when I added text to the GitHub version on alternative 
success indicatiors. If close_notify is to be used as an alternative success 
indicatiors, forbidding and enforcing this is essential, otherwise, 
close_notify cannot be used.


Cheers,
John


_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to