hi
Antonios Lazaridis wrote: >>looks good. >>you mean session timeout of the radius server? > > Yes. > I set this in the users file. > I have to set this, otherwise there is no dynamic WEP enabled, right? ahem, wrong ... but you CAN do that. as i said, the WEP keys are generated at the AP and by the AP. turn on the broadcast key rotation and it will regenerate the WEP keys... i'm actually not quiet sure if it regenerates the both or only the multicast key. Henrik, Lars, you probably know? does it lose the connection (tcp e.g.) during the rekeying in your case? i would suppose that it does since the AP should close the port during re-auth. with AP regenerating keys you don't lose the connection, that would be an advantage. however, for more security you should set a session-timeout to some reasonable finite value. > In the log there apears a SSL error 2 or something like that. > What is this? no idea, but i have it, too :) i already asked but there was no answer. probably rather an openssl issue than radius-related stuff. ken, perhaps you know? ciao artur -- Artur Hecker Groupe Acc�s et Mobilit� hecker[at]enst[dot]fr D�partement Informatique et R�seaux +33 1 45 81 7507 46, rue Barrault 75634 Paris cedex 13 http://www.infres.enst.fr ENST Paris - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
