There are alternatives to certificate-based solutions. Check out SRP: password-based, but quite secure. The EAP SRP draft must have expired, though, and I don't know what its status is...

http://srp.stanford.edu/

Jacques.

At 14:06 05/12/2002, Bon sy wrote:
Jon,
        If you are looking for using RADIUS for 802.1x or
certificate based deployment, my experience is that the challenge is the
certificate/key distribution, especially if yours is a non-enterprise
environment that certificate/key distribution is by nature not
centralized.

        Hope this helps!

Bon


On Thu, 5 Dec 2002, Jon Baer wrote:

> Kevin Arima wrote:
>
> >Basically, it claims that MITM attacks are possible when an inner protocol
> >is tunneled through a protected tunnel provided by the outer protocol.
> >Now I do not know whether something of this nature is feasible, but when
> >designing a security solution it's something that you should keep in mind.
> >
> >
> What about the upcoming WPA standard?  (is it even shipping yet?)  Is
> EAP part of it?
>
> Keeping up w/ all the bs wireless security acronyms is blowing my mind
> and I have yet to set up a radius server to play around with.  But
> thanks alot for the community feedback in the meantime :-)
>
> - Jon
>
> --
> NYCwireless - http://www.nycwireless.net/
> Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
> Archives: http://lists.nycwireless.net/pipermail/nycwireless/
>

--
NYCwireless - http://www.nycwireless.net/
Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
Archives: http://lists.nycwireless.net/pipermail/nycwireless/

-- Jacques Caron, IP Sector Technologies
   Join the discussion on public WLAN open global roaming:
   http://lists.ipsector.com/listinfo/openroaming


--
NYCwireless - http://www.nycwireless.net/
Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
Archives: http://lists.nycwireless.net/pipermail/nycwireless/

Reply via email to