Hi,

> >> on the client can then extract? this could tunnel traffic through
> >> an 802.1X restricted network? in fact, is the inner EAP traffic limited
> >> at all?  once the authentication outer layer is started i should be
> >> able to just keep throwing data back/forward through that tube?
> >>
> Wait are you talking about something really quite evil here? Like using
> EAP as a VPN tunnel ?!?!

yes. if the supplicant is code I have written and the server is running
a nice bit of PHP or PERL code that i have written then.....hmmm.... PoC ?

alan
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to