Hi

I have a question

) In 802.1x

Client ---------------- AP--------------RADIUS SERVEr

Challenge text ( EAP-TLS) case : When certificates are authenticated
sucessfully Radius server gives a MASTER KEY TO AP.

Then AP generates a session key, encrypt session key with MASTER KEY and
send it to client.

Then session keys are used in communication between client and AP.

My question is HOW DOES CLIENT DECRYPT THE PACkET SEND BY AP TO GET
"SESSION KEY". According to my understanding client should also have
MASTER KEY to decrypt the packet in order to obtain the session key.

If I am worng do correct me otherwiser I would appreciate if anybody
share light on this problem.


Thanks

Akash Malhotra
--
general wireless list, a bawug thing <http://www.bawug.org/>
[un]subscribe: http://lists.bawug.org/mailman/listinfo/wireless

Reply via email to