mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2025-02-16 15:20:42 +01:00
TODO: Mark certificate domain matching as done
This commit is contained in:
parent
2bbd61cd1c
commit
0d900cf250
14
TODO
14
TODO
@ -295,20 +295,6 @@ Wireless daemon
|
|||||||
Priority: Low
|
Priority: Low
|
||||||
Complexity: C8
|
Complexity: C8
|
||||||
|
|
||||||
- Implement EAP Authenticator certificate element matching
|
|
||||||
|
|
||||||
With TLS based EAP methods it is possible for certain Man-In-The-Middle
|
|
||||||
attacks to be performed by having a trusted CA issue a certificate for an
|
|
||||||
unrelated domain and then have an adversary utilize that certificate to spoof
|
|
||||||
trusted Access Points for a certain SSID. To prevent this it is possible
|
|
||||||
for clients to further limit what certificates they accept by utilizing
|
|
||||||
dNSName sub-element of SubjectAltName in the X.509 certificate (or
|
|
||||||
alternatively the SubjectName CN) of the Authenticator. This matching can
|
|
||||||
be done by suffix, an exact match, or perhaps even glob matching.
|
|
||||||
|
|
||||||
Priority: Medium
|
|
||||||
Complexity: C8
|
|
||||||
|
|
||||||
- Support receiving OCE FILS Discovery Frames
|
- Support receiving OCE FILS Discovery Frames
|
||||||
|
|
||||||
When operating in station mode, we should support receiving of FILS
|
When operating in station mode, we should support receiving of FILS
|
||||||
|
Loading…
x
Reference in New Issue
Block a user