-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > As most authentication is actually software based, password is > obviously still the easiest method, followed by x.509 certificates > (some of these can incur a cost, unless you use a free certificate > provider such as CACert.org)
Nice plug ;-) While trying to figure out the 802.1x scheme I still have yet to discover something in regards to public wireless service ... first and foremost is the actual scope of a WAP owner, I have seen that they are primarily based on the amount of clients they must attend to. For example a single NYCWireless node owner with say 10 max clients per day (you can never guess this number since it will probably climb everyday more WiFi cards are sold) ... but in basic small authentication models, which are not complex, it seems there is little inexpensive solutions for AAA. For example Id still like to find out where I could do simple authentication with say very timely DHCP leases. I asked the question a long time ago on what TMobile was configured with and I was told NoCat but Im not sure. But is there a way to dynamically change DHCP leases *with* an authentication like 802.1x. Or am I missing something. For example say my cousins laptop would like to connect, yet I allocate the time to 30 minutes, but it can be used incrementally till it timesout based on a given ID: ID/user: 1234567890 Pass: MD5 Timetable: 12 minutes remaining for this ID Is there a simple solution for this? (With or without involving Radius or another AS) - - Jon -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBPf6tw0Hb24uaDK9HEQI+lwCZAYgFYuW4CAiB834xHCNWfygLuPcAn0lv awXixEbYg/4Kn3/tAz/oCK+r =ax5G -----END PGP SIGNATURE----- -- NYCwireless - http://www.nycwireless.net/ Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/ Archives: http://lists.nycwireless.net/pipermail/nycwireless/
