On Fri, Jun 17, 2011 at 8:36 AM,  <[email protected]> wrote:
> This problem is even worse if the user is traveling at a partner's
> institution and using eduroam, in that if that partner insititution's RADIUS
> server has user-password logging enable, they too can see my user's
> password.

That's not correct. The "partner institution" (the place your user
visits) only proxies radius requests. They don't know what is inside.
They don't see any passwords from your users.

They would only see the password if one of your users incorrectly
tries to authentication against the "partner institution" domain. But
this should never happen if they set up eduroam correctly, set the
correct user name including the domain name of your institution and
also only accept the certificate of your radius server.

If the eduroam wireless connection is set up correctly on the computer
and the user uses it correctly the "partner institution" radius server
will only see the outer identity and then proxies the requests back to
your radius server. This requires correct settings on the user's
computer and knowledge not accept certificates or radius servers which
you did not configure before...

Gerald
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to