Your wish is my command...
network={
ssid="umd-secure"
scan_ssid=1
proto=RSN
key_mgmt=WPA-EAP
group=CCMP TKIP
eap=TTLS
identity="bhackett"
anonymous_identity="anonymous"
password="<your directory password here>"
ca_cert="/etc/thawte_server_roots/ThawtePremiumServerCA.cer"
subject_match="CN=wireless.umd.edu"
phase2="auth=PAP"
}
I'm not sure you actually need the certs but they are available for free.
-Bernie
---- Original message ----
>Date: Thu, 13 Sep 2007 11:36:41 -0400
>From: "J. Scott Olsson" <[EMAIL PROTECTED]>
>Subject: [UM-LINUX] using umd-secure with wpa_supplicant, was: some dumb
>questions about VPNC
>To: [email protected]
>
> Can someone who has umd-secure working under
> wpa_supplicant kindly send me their working network
> block from their wpa_supplicant.conf file?
>
> thanks!
> Scott
>
> On 9/12/07, Karl Reuss <[EMAIL PROTECTED]> wrote:
>
> traffic couldn't be snooped. Now we have the the
> 'umd-secure' ssid
> which supports WPA/WPA2. UMD-TunnelAll was there
> for a few old
>
> --
> Learn conversational Latin like the barbarian you
> are, at http://talkingvulgar.blogspot.com