Configuring freeradius for MACsec

Phil Mayers p.mayers at imperial.ac.uk
Fri Feb 24 10:58:30 CET 2012


On 02/24/2012 07:38 AM, Alan DeKok wrote:

>    TTLS doesn't generate it.  My guess is that Cisco has invented
> something themselves which defines EAP-Key-Name.  Find out what that is,
> and we can implement it in FreeRADIUS.

FWIW, a bit more digging shows section 1.4.1 of RFC 5247 is relevant, 
saying that:

EAP-Key-Name = <eap type> || <eap session id>

...and appendix A lists Peer-Id, Server-Id and Session-Id values for 
existing methods. Sadly, since neither PEAP nor TTLS were ever 
standardised, it skips those :o(

RFC 5216 suggests that EAP-TLS, and possibly all TLS-based methods in 
the absence of an alternative, might define EAP-Key-Name as:

<eap type> || 0x0d || <tls client random> || <tls server random>

But it's all very unclear, and I'm struggling to see what the point is; 
what is all this crud for?



More information about the Freeradius-Users mailing list