Blog
TLDR: clients will move to not supporting Diffie-Hellman keys of less than 1024 bit - upgrade your RADIUS server configuration or release to ensure its providing bigger Diffie-Hellman parameters in the EAP session
overview
On the back of the recent wave of further SSL attacks and weakness identitication, several vendors are now making moves to stop SSL clients from negotiating connections where the parameters have weak Diffie-Hellman (DH) keys. In the world of web browsers ,...