Ah. I misunderstood your question.
standard (see RFC6614 section 2.3). (Thinking of it, one could probably
> Hi Linus ,
>
> Thanks a-lot for your reply. I retried it after setting `certificateNameCheck off' in Server block. However, it is still using mutual authentication (I am copying the packet transfer between Client and Server below). The main difference which I could see was that now it can establish TLS connection with non-matching CN name also.
>
>
> To turn off mutual authentication i.e. Server should not ask for Client certificate in Server Hello message. Is there any way to disable "SSL_VERIFY_PEER" in Server code ?
>
>
>
> Source Destination Protocol Info
> 192.168.1.100 192.168.1.2 TLSv1.2 Client Hello
> 192.168.1.2 192.168.1.100 TLSv1.2 Server Hello
> 192.168.1.2 192.168.1.100 TLSv1.2 Certificate <======= Server Certificate
> 192.168.1.100 192.168.1.2 TLSv1.2 Certificate <======= Client Certificate
> 192.168.1.2 192.168.1.100 TLSv1.2 New Session Ticket, Change Cipher Spec, Encrypted Handshake Message
>
> Regards,
> Mofassir
>
> On Wednesday, 5 October 2016 7:58 PM, Linus Nordberg <
linus@nordu.net> wrote:
>
>
> Mofassir Ul Haque <
mofassir_haque@yahoo.com> wrote
> Wed, 5 Oct 2016 00:19:55 +0000 (UTC):
>
>> Currently, radsecproxy supports mutual authentication by default
>> i.e. both the Client and the Server certificate are validated at the
>> time of TLS connection establishment. However, I want to only validate
>> Server’s certificate. Is it possible to make changes to TLS Block
>> (radsecproxy.conf) or to code to only do the validation of Server
>> certificate's ? Any help will be greatly appreciated ! Thanks,
>
> You can set `certificateNameCheck off' in a server block to disable
> verification of client CN and SAN.
>
>
>
>