On 06/17/2011 08:15 AM, Reg Emailster wrote:
Thanks Gerald for the reply.

Just to confirm, you are saying that at the partner's institution,
the user's client will set up an encrypted channel all the way back
to the client's home institution RADIUS server (determined using the
login realm), and their plain password will be passed inside this
encrypted channel?

Correct. In Eduroam, the EAP flows between a client and their home site. The visited site is just a proxy, and only ever receives the final per-session random crypto keys needed for WPA-Enterprise to encrypt the wireless link.

However: a malicious visited (partner, as you call it) site or an attacker impersonating an eduroam site could in theory try to terminate the TTLS portion of the EAP. This is why "validate server certificate" is so important. Be sure you instruct your clients to tick the appropriate boxes.
-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to