-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> As most authentication is actually software based, password is
> obviously still the easiest method, followed by x.509 certificates
> (some of these can incur a cost, unless you use a free certificate
> provider such as CACert.org)

Nice plug ;-)

While trying to figure out the 802.1x scheme I still have yet to discover
something in regards to public wireless service ... first and foremost is
the actual scope of a WAP owner, I have seen that they are primarily based
on the amount of clients they must attend to.  For example a single
NYCWireless node owner with say 10 max clients per day (you can never guess
this number since it will probably climb everyday more WiFi cards are sold)
... but in basic small authentication models, which are not complex, it
seems there is little inexpensive solutions for AAA.

For example Id still like to find out where I could do simple authentication
with say very timely DHCP leases.  I asked the question a long time ago on
what TMobile was configured with and I was told NoCat but Im not sure.  But
is there a way to dynamically change DHCP leases *with* an authentication
like 802.1x.  Or am I missing something.  For example say my cousins laptop
would like to connect, yet I allocate the time to 30 minutes, but it can be
used incrementally till it timesout based on a given ID:

ID/user: 1234567890
Pass: MD5
Timetable: 12 minutes remaining for this ID

Is there a simple solution for this?  (With or without involving Radius or
another AS)

- - Jon


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQA/AwUBPf6tw0Hb24uaDK9HEQI+lwCZAYgFYuW4CAiB834xHCNWfygLuPcAn0lv
awXixEbYg/4Kn3/tAz/oCK+r
=ax5G
-----END PGP SIGNATURE-----

--
NYCwireless - http://www.nycwireless.net/
Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
Archives: http://lists.nycwireless.net/pipermail/nycwireless/

Reply via email to