Does EAP TLS benefit from “Verify the server’s identity by validating the certificate” setting

For PEAP it’s important to enable the "Verify the server’s identity by validating the certificate" setting in a Windows WiFi profile. Is there any benefit enabling this for EAP TLS? If I understood correctly, EAP TLS itself uses … Continue reading Does EAP TLS benefit from “Verify the server’s identity by validating the certificate” setting

Does TLS interception necessarily require a self-signed certificate? Please explain why

A brief schema of a TLS intercepting proxy – the Client connects to the Host via the Proxy in a way which allows the Proxy to perform a (consensual) MITM.
[Client] -> [Proxy] -> [Host]

It’s my understanding reading references on… Continue reading Does TLS interception necessarily require a self-signed certificate? Please explain why

How does the SSL/TLS protocol determine if a certificate is expired or not?

I already tried googling but no luck. All search results always tell you how to check cert expiration manually, but that is not my question. Yes I can use OpenSSL for example, but what I am asking is how the SSL/TLS protocol does it, not h… Continue reading How does the SSL/TLS protocol determine if a certificate is expired or not?

Why openssl verify does not work for the certificate chain of a correctly configured site?

I download its certificates. To do that, I used the openssl debug output of the command
openssl s_client -connect security.stackexchange.com:443 -servername security.stackexchange.com -showcerts -debug </dev/null 2>&1|tee out

Th… Continue reading Why openssl verify does not work for the certificate chain of a correctly configured site?