If a rogue access point existed and a user walks within range of both a 
legitimate and rogue AP while authenticating - could the EAP packets be 
distributed between the two systems possibly resulting in:

EAP Response type 25, but no expected type known

on the legitimate server?

---
Roberto Ullfig - [email protected]
Systems Administrator
Enterprise Architecture and Development | ACCC
University of Illinois - Chicago
_______________________________________________
radiator mailing list
[email protected]
https://lists.open.com.au/mailman/listinfo/radiator

Reply via email to