Dear Daniele Brevi,


--Thursday, February 13, 2003, 9:35:36 PM, you wrote to 
[EMAIL PROTECTED]:


DB> the environment is 802.1x access in a wireless networks with EAP-TLS
DB> with MPPE.
DB> Probably now I have understand:
DB> Freeradius after the TLS handshake derive the MPPE keys from the key
DB> material of the handshake and send this keys to the AP.
DB> The client derives this key itself, and the AP and client are
DB> responsable for the rekeying, this rekeying happen every packet that the
DB> AP and the client exchange.

DB> It's all exact?

Exactly.  FreeRADIUS  does  only  deriving  of  INITIAL  session  key as
described  in RFC 3079. It doesn't perform actual encryption and session
key generation (RFC 3078). Rekeying is performed by AP and client.

-- 
~/ZARAZA
����� ������ �������� �� ���������, �� ���������� �� ������.  (���)


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to