Dear Daniele Brevi,
--Thursday, February 13, 2003, 9:35:36 PM, you wrote to [EMAIL PROTECTED]: DB> the environment is 802.1x access in a wireless networks with EAP-TLS DB> with MPPE. DB> Probably now I have understand: DB> Freeradius after the TLS handshake derive the MPPE keys from the key DB> material of the handshake and send this keys to the AP. DB> The client derives this key itself, and the AP and client are DB> responsable for the rekeying, this rekeying happen every packet that the DB> AP and the client exchange. DB> It's all exact? Exactly. FreeRADIUS does only deriving of INITIAL session key as described in RFC 3079. It doesn't perform actual encryption and session key generation (RFC 3078). Rekeying is performed by AP and client. -- ~/ZARAZA ����� ������ �������� �� ���������, �� ���������� �� ������. (���) - List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html
