Just wanted to follow up on this and say thank you!  You're answer was right on the 
money.  Machine and user authentication now work as they should.  Sadly this means 
individual certs for each machine which we were trying to avoid for simplicity's sake. 
 Ah, well...  I'll be using this as an example of the superb (level of) support 
available for free tools.  =)

> -----Original Message-----
> From: Michael Griego [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, February 03, 2004 4:35 PM
> To: [EMAIL PROTECTED]
> Subject: RE: Problem with machine authentication on Windows
> 2000usingfreeradius, eap-tls, wireless
> 
> 
> Yup... I have...  Works great....  Based on where you're 
> getting in the
> authentication, it really looks like you don't have a proper 
> certificate
> in the computer section...
> 
> Oh... you're using Win2K... does the certificate CN match the machine
> name?  I discovered that Windows 2000 actually seems to 
> enforce that the
> CN or subjAltName match the name of the machine (ie, NetBIOS name or
> FQDN DNS name).
> 
> --Mike
> 
> 
> On Tue, 2004-02-03 at 15:30, Wieck, Owen wrote:
> > Thanks for the quick response.  Yes to both questions.  The 
> CA cert is in the Trusted Root section and the client cert is 
> in the personal section for the "local computer".  There are 
> a few reg keys that can be twiddled to determine under what 
> circumstances the Windows wireless client will 
> re-authenticate, but I'm not even getting that far.  Under my 
> current configuration, when I log in as a user (with the 
> client cert installed) the exchange is successful and the 
> connection comes up after the user logs in.
> > 
> > Has anyone gotten the "local computer" connection to work?  
> I'm curious if I'm p***ing in the wind here... 
> > 
> > Owen L. Wieck
> > Senior Network Administrator
> > Ricardo, Inc.
> > 
> > "Those who give up liberty for the sake of security deserve 
> neither liberty nor security."
> > --Ben Franklin
> > 
> > 
> > > -----Original Message-----
> > > From: Michael Griego [mailto:[EMAIL PROTECTED]
> > > Sent: Tuesday, February 03, 2004 4:08 PM
> > > To: [EMAIL PROTECTED]
> > > Subject: Re: Problem with machine authentication on Windows 2000
> > > usingfreeradius, eap-tls, wireless
> > > 
> > > 
> > > Take a look in your Certificates MMC for the Local Computer 
> > > account.  If
> > > you don't have a certificate in the "personal" section, 
> what you're
> > > trying to do won't work.  In other words, the machine itself 
> > > has to have
> > > a certificate as well if you want the wireless interface 
> to come up
> > > before you actually login to the machine.  Also, you have 
> to make sure
> > > that the root CA cert is in the Trusted Root CA section for 
> > > the computer
> > > account.  Otherwise, the 802.1x client will be unable to 
> verify the
> > > authenticity of the network and will refuse to connect.
> > > 
> > > --MIke
> > > 
> > > 
> > > On Tue, 2004-02-03 at 14:41, Wieck, Owen wrote:
> > > > First, a brief description of my setup.  I'm using 
> > > freeradius (v0.9.1) as backend AAA to secure our wireless 
> > > network.  We're using eap-tls with the certificates, etc.  
> > > The setup was done per the guides out on the 'net.  Works 
> > > great, but...
> > > > 
> > > > I'm having trouble getting freeradius to interoperate with 
> > > the "authenticate as computer" option in Windows 2000/XP.  It 
> > > works as a user (once the login), but this creates problems 
> > > in that our login scripts and other useful things don't run 
> > > because the network interface isn't up yet.  =(  A classic 
> > > chicken-and-egg problem.  When "authenticate as computer" is 
> > > checked in the windows authentication tab, Windows tries to 
> > > do an "Authenticate-only" service type (see freeradius log 
> > > capture below).  The certificate exchange never gets 
> > > initiated.  After repeated cyles authentication requests, the 
> > > client gives up and doesn't connect.  Note, I initially 
> > > thought the funny user-name (host/dtc) was to blame but I 
> > > manually entered the same username when logged in and that 
> > > worked like a charm!
> > > > 
> > > > So, my question is has anyone found a workaround for this 
> > > and if so can they provide me with some details?  I realize 
> > > the problem is likely with Windows violating some standard, 
> > > but of course the perception will be a Linux/Freeradius 
> > > problem by those above me.  It will chap my hide resort to 
> > > using a Windows/ISA implementation...  Any assistance will be 
> > > greatly appreciated.
> > > > 
> > > > Log capture follows.  I've only put in the interesting bits 
> > > for brevity, the pattern repeats about 20 times before it 
> gives up...
> > > > 
> > > > Listening on IP address *, ports 1812/udp and 1813/udp, 
> > > with proxy on 1814/udp.
> > > > Ready to process requests.
> > > > rad_recv: Access-Request packet from host 
> > > 172.20.162.223:1183, id=138, length=164
> > > >         User-Name = "host/dtc"
> > > >         Cisco-AVPair = "ssid=RCDOgroupwn01"
> > > >         NAS-IP-Address = 172.20.162.223
> > > >         Called-Station-Id = "000c309426eb"
> > > >         Calling-Station-Id = "000dbc7a8f75"
> > > >         NAS-Identifier = "DTC-AP1200-NB01"
> > > >         NAS-Port = 38
> > > >         Framed-MTU = 1400
> > > >         NAS-Port-Type = Wireless-802.11
> > > >         Service-Type = Login-User
> > > >         EAP-Message = 0x0252000d01686f73742f647463
> > > >         Message-Authenticator = 
> 0x431996dc5a278e1a2bbec47424a6b6b3
> > > > modcall: entering group authorize
> > > >   modcall[authorize]: module "preprocess" returns ok
> > > >   modcall[authorize]: module "chap" returns noop
> > > >   rlm_eap: EAP packet type notification id 82 length 13
> > > >   rlm_eap: EAP Start not found
> > > >   modcall[authorize]: module "eap" returns updated
> > > >     rlm_realm: No '@' in User-Name = "host/dtc", looking up 
> > > realm NULL
> > > >     rlm_realm: No such realm "NULL"
> > > >   modcall[authorize]: module "suffix" returns noop
> > > >     users: Matched DEFAULT at 66
> > > >   modcall[authorize]: module "files" returns ok
> > > >   modcall[authorize]: module "mschap" returns noop
> > > > modcall: group authorize returns updated
> > > >   rad_check_password:  Found Auth-Type EAP
> > > > auth: type "EAP"
> > > > modcall: entering group authenticate
> > > >   rlm_eap: EAP packet type notification id 82 length 13
> > > >   rlm_eap: EAP Start not found
> > > >   rlm_eap: EAP Identity
> > > >   rlm_eap: processing type tls
> > > >   rlm_eap_tls: Initiate
> > > >   rlm_eap_tls: Start returned 1
> > > >   modcall[authenticate]: module "eap" returns ok
> > > > modcall: group authenticate returns ok
> > > > Login OK: [host/dtc] (from client Rinc port 38 cli 000dbc7a8f75)
> > > > Sending Access-Challenge of id 138 to 172.20.162.223:1183
> > > >         EAP-Message = 0x015300060d20
> > > >         Message-Authenticator = 
> 0x00000000000000000000000000000000
> > > >         State = 
> > > 0xdf2f265c0f0274e481ea5f5c4b0a2d49dbf61f40f29b84c263b84393a8c4
> > > 579b0e964d30
> > > > Finished request 0
> > > > Going to the next request
> > > > --- Walking the entire request list ---
> > > > Waking up in 6 seconds...
> > > > --- Walking the entire request list ---
> > > > Cleaning up request 0 ID 138 with timestamp 401ff6db
> > > > Nothing to do.  Sleeping until we see a request.
> > > > rad_recv: Access-Request packet from host 
> > > 172.20.162.223:1184, id=139, length=202
> > > >         User-Name = "host/dtc"
> > > >         Cisco-AVPair = "ssid=RCDOgroupwn01"
> > > >         NAS-IP-Address = 172.20.162.223
> > > >         Called-Station-Id = "000c309426eb"
> > > >         Calling-Station-Id = "000dbc7a8f75"
> > > >         NAS-Identifier = "DTC-AP1200-NB01"
> > > >         NAS-Port = 38
> > > >         Framed-MTU = 1400
> > > >         State = 
> > > 0xdf2f265c0f0274e481ea5f5c4b0a2d49dbf61f40f29b84c263b84393a8c4
> > > 579b0e964d30
> > > >         NAS-Port-Type = Wireless-802.11
> > > >         Service-Type = Authenticate-Only
> > > >         EAP-Message = 0x0254000d01686f73742f647463
> > > >         Message-Authenticator = 
> 0x50cb5e7f047adcfd1fc33d9123402245
> > > > modcall: entering group authorize
> > > >   modcall[authorize]: module "preprocess" returns ok
> > > >   modcall[authorize]: module "chap" returns noop
> > > >   rlm_eap: EAP packet type notification id 84 length 13
> > > >   rlm_eap: EAP Start not found
> > > >   modcall[authorize]: module "eap" returns updated
> > > >     rlm_realm: No '@' in User-Name = "host/dtc", looking up 
> > > realm NULL
> > > >     rlm_realm: No such realm "NULL"
> > > >   modcall[authorize]: module "suffix" returns noop
> > > >     users: Matched DEFAULT at 66
> > > >   modcall[authorize]: module "files" returns ok
> > > >   modcall[authorize]: module "mschap" returns noop
> > > > modcall: group authorize returns updated
> > > >   rad_check_password:  Found Auth-Type EAP
> > > > auth: type "EAP"
> > > > modcall: entering group authenticate
> > > >   rlm_eap: EAP packet type notification id 84 length 13
> > > >   rlm_eap: EAP Start not found
> > > >   rlm_eap: EAP Identity
> > > >   rlm_eap: processing type tls
> > > >   rlm_eap_tls: Initiate
> > > >   rlm_eap_tls: Start returned 1
> > > >   modcall[authenticate]: module "eap" returns ok
> > > > modcall: group authenticate returns ok
> > > > Login OK: [host/dtc] (from client Rinc port 38 cli 000dbc7a8f75)
> > > > Sending Access-Challenge of id 139 to 172.20.162.223:1184
> > > >         EAP-Message = 0x015500060d20
> > > >         Message-Authenticator = 
> 0x00000000000000000000000000000000
> > > >         State = 
> > > 0xbbbcdb8364abbbff307d2a9046748d63f9f61f4067c560bc45bbac039de3
> > > 866208164730
> > > > Finished request 1
> > > > Going to the next request
> > > > --- Walking the entire request list ---
> > > > Waking up in 6 seconds...
> > > > --- Walking the entire request list ---
> > > > Cleaning up request 1 ID 139 with timestamp 401ff6f9
> > > > Nothing to do.  Sleeping until we see a request.
> > > > rad_recv: Access-Request packet from host 
> > > 172.20.162.223:1186, id=140, length=164
> > > >         User-Name = "host/dtc"
> > > >         Cisco-AVPair = "ssid=RCDOgroupwn01"
> > > >         NAS-IP-Address = 172.20.162.223
> > > >         Called-Station-Id = "000c309426eb"
> > > >         Calling-Station-Id = "000dbc7a8f75"
> > > >         NAS-Identifier = "DTC-AP1200-NB01"
> > > >         NAS-Port = 38
> > > >         Framed-MTU = 1400
> > > >         NAS-Port-Type = Wireless-802.11
> > > >         Service-Type = Login-User
> > > >         EAP-Message = 0x0257000d01686f73742f647463
> > > >         Message-Authenticator = 
> 0xa65e73d758f53af805eb7d0a1c47ba46
> > > > modcall: entering group authorize
> > > >   modcall[authorize]: module "preprocess" returns ok
> > > >   modcall[authorize]: module "chap" returns noop
> > > >   rlm_eap: EAP packet type notification id 87 length 13
> > > >   rlm_eap: EAP Start not found
> > > >   modcall[authorize]: module "eap" returns updated
> > > >     rlm_realm: No '@' in User-Name = "host/dtc", looking up 
> > > realm NULL
> > > >     rlm_realm: No such realm "NULL"
> > > >   modcall[authorize]: module "suffix" returns noop
> > > >     users: Matched DEFAULT at 66
> > > >   modcall[authorize]: module "files" returns ok
> > > >   modcall[authorize]: module "mschap" returns noop
> > > > modcall: group authorize returns updated
> > > >   rad_check_password:  Found Auth-Type EAP
> > > > auth: type "EAP"
> > > > modcall: entering group authenticate
> > > >   rlm_eap:  list_clean deleted one item
> > > >   rlm_eap:  list_clean deleted one item
> > > >   rlm_eap: EAP packet type notification id 87 length 13
> > > >   rlm_eap: EAP Start not found
> > > >   rlm_eap: EAP Identity
> > > >   rlm_eap: processing type tls
> > > >   rlm_eap_tls: Initiate
> > > >   rlm_eap_tls: Start returned 1
> > > >   modcall[authenticate]: module "eap" returns ok
> > > > modcall: group authenticate returns ok
> > > > Login OK: [host/dtc] (from client Rinc port 38 cli 000dbc7a8f75)
> > > > Sending Access-Challenge of id 140 to 172.20.162.223:1186
> > > >         EAP-Message = 0x015800060d20
> > > >         Message-Authenticator = 
> 0x00000000000000000000000000000000
> > > >         State = 
> > > 0xab0be15b25e57f3bac11b093b5d4f4b3cdf71f4002b4fef93e7b0b041ec4
> > > efea57e3e3bf
> > > > Finished request 2
> > > > Going to the next request
> > > > --- Walking the entire request list ---
> > > > Waking up in 6 seconds...
> > > > --- Walking the entire request list ---
> > > > Cleaning up request 2 ID 140 with timestamp 401ff7cd
> > > > Nothing to do.  Sleeping until we see a request.
> > > > rad_recv: Access-Request packet from host 
> > > 172.20.162.223:1187, id=141, length=202
> > > >         User-Name = "host/dtc"
> > > >         Cisco-AVPair = "ssid=RCDOgroupwn01"
> > > >         NAS-IP-Address = 172.20.162.223
> > > >         Called-Station-Id = "000c309426eb"
> > > >         Calling-Station-Id = "000dbc7a8f75"
> > > >         NAS-Identifier = "DTC-AP1200-NB01"
> > > >         NAS-Port = 38
> > > >         Framed-MTU = 1400
> > > >         State = 
> > > 0xab0be15b25e57f3bac11b093b5d4f4b3cdf71f4002b4fef93e7b0b041ec4
> > > efea57e3e3bf
> > > >         NAS-Port-Type = Wireless-802.11
> > > >         Service-Type = Authenticate-Only
> > > >         EAP-Message = 0x0259000d01686f73742f647463
> > > >         Message-Authenticator = 
> 0x12e40096ceef66957cb798b9ca626cde
> > > > modcall: entering group authorize
> > > >   modcall[authorize]: module "preprocess" returns ok
> > > >   modcall[authorize]: module "chap" returns noop
> > > >   rlm_eap: EAP packet type notification id 89 length 13
> > > >   rlm_eap: EAP Start not found
> > > >   modcall[authorize]: module "eap" returns updated
> > > >     rlm_realm: No '@' in User-Name = "host/dtc", looking up 
> > > realm NULL
> > > >     rlm_realm: No such realm "NULL"
> > > >   modcall[authorize]: module "suffix" returns noop
> > > >     users: Matched DEFAULT at 66
> > > >   modcall[authorize]: module "files" returns ok
> > > >   modcall[authorize]: module "mschap" returns noop
> > > > modcall: group authorize returns updated
> > > >   rad_check_password:  Found Auth-Type EAP
> > > > auth: type "EAP"
> > > > modcall: entering group authenticate
> > > >   rlm_eap: EAP packet type notification id 89 length 13
> > > >   rlm_eap: EAP Start not found
> > > >   rlm_eap: EAP Identity
> > > >   rlm_eap: processing type tls
> > > >   rlm_eap_tls: Initiate
> > > >   rlm_eap_tls: Start returned 1
> > > >   modcall[authenticate]: module "eap" returns ok
> > > > modcall: group authenticate returns ok
> > > > Login OK: [host/dtc] (from client Rinc port 38 cli 000dbc7a8f75)
> > > > Sending Access-Challenge of id 141 to 172.20.162.223:1187
> > > >         EAP-Message = 0x015a00060d20
> > > >         Message-Authenticator = 
> 0x00000000000000000000000000000000
> > > >         State = 
> > > 0x2b5908dbb4d23207a4c3ae50849ef880ebf71f40c70bd2230104c11072a9
> > > a59ced6736a8
> > > > Finished request 3
> > > > Going to the next request
> > > > --- Walking the entire request list ---
> > > > Waking up in 6 seconds...
> > > > --- Walking the entire request list ---
> > > > Cleaning up request 3 ID 141 with timestamp 401ff7eb
> > > > Nothing to do.  Sleeping until we see a request.
> > > > rad_recv: Access-Request packet from host 
> > > 172.20.162.223:1188, id=142, length=164
> > > >         User-Name = "host/dtc"
> > > >         Cisco-AVPair = "ssid=RCDOgroupwn01"
> > > >         NAS-IP-Address = 172.20.162.223
> > > >         Called-Station-Id = "000c309426eb"
> > > >         Calling-Station-Id = "000dbc7a8f75"
> > > >         NAS-Identifier = "DTC-AP1200-NB01"
> > > >         NAS-Port = 38
> > > >         Framed-MTU = 1400
> > > >         NAS-Port-Type = Wireless-802.11
> > > >         Service-Type = Login-User
> > > >         EAP-Message = 0x0202000d01686f73742f647463
> > > >         Message-Authenticator = 
> 0x11e0cb79817988fdf7ca364f59997be4
> > > > modcall: entering group authorize
> > > >   modcall[authorize]: module "preprocess" returns ok
> > > >   modcall[authorize]: module "chap" returns noop
> > > >   rlm_eap: EAP packet type notification id 2 length 13
> > > >   rlm_eap: EAP Start not found
> > > >   modcall[authorize]: module "eap" returns updated
> > > >     rlm_realm: No '@' in User-Name = "host/dtc", looking up 
> > > realm NULL
> > > >     rlm_realm: No such realm "NULL"
> > > >   modcall[authorize]: module "suffix" returns noop
> > > >     users: Matched DEFAULT at 66
> > > >   modcall[authorize]: module "files" returns ok
> > > >   modcall[authorize]: module "mschap" returns noop
> > > > modcall: group authorize returns updated
> > > >   rad_check_password:  Found Auth-Type EAP
> > > > auth: type "EAP"
> > > > modcall: entering group authenticate
> > > >   rlm_eap:  list_clean deleted one item
> > > >   rlm_eap:  list_clean deleted one item
> > > >   rlm_eap: EAP packet type notification id 2 length 13
> > > >   rlm_eap: EAP Start not found
> > > >   rlm_eap: EAP Identity
> > > >   rlm_eap: processing type tls
> > > >   rlm_eap_tls: Initiate
> > > >   rlm_eap_tls: Start returned 1
> > > >   modcall[authenticate]: module "eap" returns ok
> > > > modcall: group authenticate returns ok
> > > > Login OK: [host/dtc] (from client Rinc port 38 cli 000dbc7a8f75)
> > > > Sending Access-Challenge of id 142 to 172.20.162.223:1188
> > > >         EAP-Message = 0x010300060d20
> > > >         Message-Authenticator = 
> 0x00000000000000000000000000000000
> > > >         State = 
> > > 0x4767724bb96d1fdd57b36352a38f1c6876f81f400621311e5712eed8ca30
> > > e44ad983acd7
> > > > Finished request 4
> > > > Going to the next request
> > > > --- Walking the entire request list ---
> > > > Waking up in 6 seconds...
> > > > --- Walking the entire request list ---
> > > > Cleaning up request 4 ID 142 with timestamp 401ff876
> > > > Nothing to do.  Sleeping until we see a request.
> > > > rad_recv: Access-Request packet from host 
> > > 172.20.162.223:1189, id=143, length=202
> > > >         User-Name = "host/dtc"
> > > >         Cisco-AVPair = "ssid=RCDOgroupwn01"
> > > >         NAS-IP-Address = 172.20.162.223
> > > >         Called-Station-Id = "000c309426eb"
> > > >         Calling-Station-Id = "000dbc7a8f75"
> > > >         NAS-Identifier = "DTC-AP1200-NB01"
> > > >         NAS-Port = 38
> > > >         Framed-MTU = 1400
> > > >         State = 
> > > 0x4767724bb96d1fdd57b36352a38f1c6876f81f400621311e5712eed8ca30
> > > e44ad983acd7
> > > >         NAS-Port-Type = Wireless-802.11
> > > >         Service-Type = Authenticate-Only
> > > >         EAP-Message = 0x0204000d01686f73742f647463
> > > >         Message-Authenticator = 
> 0xb9cb3f98bbf671456645759bc7533abf
> > > > modcall: entering group authorize
> > > >   modcall[authorize]: module "preprocess" returns ok
> > > >   modcall[authorize]: module "chap" returns noop
> > > >   rlm_eap: EAP packet type notification id 4 length 13
> > > >   rlm_eap: EAP Start not found
> > > >   modcall[authorize]: module "eap" returns updated
> > > >     rlm_realm: No '@' in User-Name = "host/dtc", looking up 
> > > realm NULL
> > > >     rlm_realm: No such realm "NULL"
> > > >   modcall[authorize]: module "suffix" returns noop
> > > >     users: Matched DEFAULT at 66
> > > >   modcall[authorize]: module "files" returns ok
> > > >   modcall[authorize]: module "mschap" returns noop
> > > > modcall: group authorize returns updated
> > > >   rad_check_password:  Found Auth-Type EAP
> > > > auth: type "EAP"
> > > > modcall: entering group authenticate
> > > >   rlm_eap: EAP packet type notification id 4 length 13
> > > >   rlm_eap: EAP Start not found
> > > >   rlm_eap: EAP Identity
> > > >   rlm_eap: processing type tls
> > > >   rlm_eap_tls: Initiate
> > > >   rlm_eap_tls: Start returned 1
> > > >   modcall[authenticate]: module "eap" returns ok
> > > > modcall: group authenticate returns ok
> > > > Login OK: [host/dtc] (from client Rinc port 38 cli 000dbc7a8f75)
> > > > Sending Access-Challenge of id 143 to 172.20.162.223:1189
> > > >         EAP-Message = 0x010500060d20
> > > >         Message-Authenticator = 
> 0x00000000000000000000000000000000
> > > >         State = 
> > > 0x3ed631d08bb0b5f9503904318f7713ec94f81f40c195be6b10b2ef322368
> > > 76fe033abea5
> > > > Finished request 5
> > > > Going to the next request
> > > > --- Walking the entire request list ---
> > > > Waking up in 6 seconds...
> > > > 
> > > > Owen L. Wieck
> > > > Network Administrator
> > > > Ricardo, Inc.
> > > > 
> > > > "Those who give up liberty for the sake of security deserve 
> > > neither liberty nor security."
> > > > --Ben Franklin
> > > > 
> > > > 
> > > > - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
> > > - - - - - - - - - - - - - - - - - - -  - - - - - - - - - - - 
> > > - - - - - - - - - - - - - - - - - - - - - -
> > > > This e-mail and any files transmitted with it are 
> > > confidential and intended solely for the use of the 
> > > individual or entity to whom they are addressed.  If you have 
> > > received this email in error please notify the sender 
> > > immediately and delete this e-mail from your system.  Please 
> > > note that any views or opinions presented in this email are 
> > > solely those of the author and do not necessarily represent 
> > > those of Ricardo (save for reports and other documentation 
> > > formally approved and signed for release to the intended 
> > > recipient).  Only Directors or Duly Authorised Officers are 
> > > authorised to enter into legally binding obligations on 
> > > behalf of Ricardo unless the obligation is contained within a 
> > > Ricardo Purchase Order.  Ricardo may monitor outgoing and 
> > > incoming e-mails and other telecommunications on its e-mail 
> > > and telecommunications systems.  
> > > > By replying to this e-mail you give your consent to such 
> > > monitoring.  The recipient should check this email and any 
> > > attachments for the presence of viruses.  Ricardo accepts no 
> > > liability for any damage caused by any virus transmitted by 
> > > this email.  'Ricardo' means Ricardo Plc and its 
> subsidiary companies.
> > > > 
> > > > Ricardo plc is a public limited company registered in 
> > > England with registered number 00222915. The registered 
> > > office of Ricardo plc is Bridge Works, Shoreham-by-Sea, West 
> > > Sussex, BN43 5FG.
> > > > - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
> > > - - - - - - - - - - - - - - - - - - -- - - - - - - - - - - - 
> > > - - - - - - - - - - - - - - - - - - - - - - 
> > > > 
> > > > - 
> > > > List info/subscribe/unsubscribe? See 
> > > http://www.freeradius.org/list/users.html
> > > -- 
> > > 
> > > --Mike
> > > 
> > > -----------------------------------
> > > Michael Griego
> > > Wireless LAN Project Manager
> > > The University of Texas at Dallas
> > > 
> > > 
> > > 
> > > - 
> > > List info/subscribe/unsubscribe? See 
> > > http://www.freeradius.org/list/users.html
> > > 
> > 
> > - 
> > List info/subscribe/unsubscribe? See 
> http://www.freeradius.org/list/users.html
> -- 
> 
> --Mike
> 
> -----------------------------------
> Michael Griego
> Wireless LAN Project Manager
> The University of Texas at Dallas
> 
> 
> 
> - 
> List info/subscribe/unsubscribe? See 
> http://www.freeradius.org/list/users.html
> 

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to