Prateek Gupta wrote:
> User A sends the NSIS request with its keyed hash (generated using User
> A's key) appended to it to the NSIS server. Now the NSIS server needs to
> authenticate that request with a Radius server.

  Can you point to a specification saying how this hashing works?

> Is there a way to do this i.e. how to generate a AAA message with the
> information available i.e. a string, its keyed hash and User A's id ?
> Assuming that the Radius server has keys of all legitimate users.

  Yes.

http://www.freeradius.org/freeradius-client/

  Alan DeKok.
--
  http://deployingradius.com       - The web site of the book
  http://deployingradius.com/blog/ - The blog
- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to