The first question you might be asking yourself after reading the title of this post is “Why in the @#$%&! would you do that” If that wasn’t the first thing that came to your mind, you’re probably wondering what EAP even is and why you should be so taken aback. Don’t worry, I will try to answer both of these questions with this blog post.| BeryJu.io
Impact of the different Wifi security modes| www.gabriel.urdhr.fr
Introduction to TLS v1.2| www.gabriel.urdhr.fr
The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints. This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation. This document obsoletes RFC 2716. A summary of the changes between this document and RFC 2716 is available...| IETF Datatracker