Your wish is my command...

network={
        ssid="umd-secure"
        scan_ssid=1
        proto=RSN
        key_mgmt=WPA-EAP
        group=CCMP TKIP
        eap=TTLS
        identity="bhackett"
        anonymous_identity="anonymous"
        password="<your directory password here>"
        ca_cert="/etc/thawte_server_roots/ThawtePremiumServerCA.cer"
        subject_match="CN=wireless.umd.edu"
        phase2="auth=PAP"
}

I'm not sure you actually need the certs but they are available for free.

-Bernie


---- Original message ----
>Date: Thu, 13 Sep 2007 11:36:41 -0400
>From: "J. Scott Olsson" <[EMAIL PROTECTED]>  
>Subject: [UM-LINUX] using umd-secure with wpa_supplicant, was: some dumb 
>questions about VPNC  
>To: [email protected]
>
>   Can someone who has umd-secure working under
>   wpa_supplicant kindly send me their working network
>   block from their wpa_supplicant.conf file?
>
>   thanks!
>   Scott
>
>   On 9/12/07, Karl Reuss <[EMAIL PROTECTED]> wrote:
>
>     traffic couldn't be snooped.  Now we have the the
>     'umd-secure' ssid
>     which supports WPA/WPA2.  UMD-TunnelAll was there
>     for a few old
>
>   --
>   Learn conversational Latin like the barbarian you
>   are, at http://talkingvulgar.blogspot.com

Reply via email to