EAP-TTLS inner auth methods for 802.1x

James Lever j at jamver.id.au
Mon Jan 29 22:27:25 CET 2007


On 29/01/2007, at 11:03 PM, A.L.M.Buxey at lboro.ac.uk wrote:

> MSCHAPv2 is the main way to go. offering challenge/response means
> the password is never sent clear.  alternatively you could use
> MD5 instead of plain. but client support is an issue...

After reading through Alan DeKok's compatibility page and a bit  
further research from that, it would appear that the risk of  
compromise is greater from poor storage on the server than the  
transient cleartext credentials inside the EAP-TLS session.

cheers,
James






More information about the Freeradius-Users mailing list