Prateek Gupta wrote:
> User A sends the NSIS request with its keyed hash (generated using User
> A's key) appended to it to the NSIS server. Now the NSIS server needs to
> authenticate that request with a Radius server.
Can you point to a specification saying how this hashing works?
> Is there a way to do this i.e. how to generate a AAA message with the
> information available i.e. a string, its keyed hash and User A's id ?
> Assuming that the Radius server has keys of all legitimate users.
http://deployingradius.com - The web site of the book
http://deployingradius.com/blog/ - The blog
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html