Hello.
On Wed, 2006-03-22 at 15:08, Robert Love wrote:
>
> to wpa_supplicant if the user selects a specific option. But I need to
> better understand the problem. What is "PAP" ? What other second-stage
> authentications are there? Are they only valid with certain ciphers?
From the wpa_supplicant hompage:
EAP-PEAP/MSCHAPv2 (both PEAPv0 and PEAPv1)
EAP-PEAP/TLS (both PEAPv0 and PEAPv1)
EAP-PEAP/GTC (both PEAPv0 and PEAPv1)
EAP-PEAP/OTP (both PEAPv0 and PEAPv1)
EAP-PEAP/MD5-Challenge (both PEAPv0 and PEAPv1)
EAP-TTLS/EAP-MD5-Challenge
EAP-TTLS/EAP-GTC
EAP-TTLS/EAP-OTP
EAP-TTLS/EAP-MSCHAPv2
EAP-TTLS/EAP-TLS
EAP-TTLS/MSCHAPv2
EAP-TTLS/MSCHAP
EAP-TTLS/PAP
EAP-TTLS/CHAP
In our university setup we use also eap-ttls/pap. The first one only
setup a crypted tunnel with anonymous identity and pap do the real
authentication.
network={
ssid="TUBSWLAN"
# We're using IEEE 802.1X with EAP-TTLS and PAP authentication
# in phase2
key_mgmt=IEEE8021X
eap=TTLS
phase2="auth=PAP"
eapol_flags=3
anonymous_identity="anonymous"
identity="USERNAME"
}
regards
Stefan Schmidt
Attachment:
signature.asc
Description: Digital signature