To. Professor
Hello,
Here is CIST,The Korea University.
My name is Hyun-seung Park.
I'm studying Wireless Security.
I studied your Mailing List.
I want to know, How use EAP-Kerberos in situation no using ID/PW
If you don't busy, I want to receive your answer
I was unaware EAP had anything remotely to do with Kerberos.
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos
Saber == Saber Zrelli [EMAIL PROTECTED] writes:
Saber I was referring to a KDC instead of an IAKERB proxy. My
Saber thoughts are that these proxying functionalities should be
Saber moved to the KDC of the visited realm. But this would be
Saber another topic that I wish to start
Saber Zrelli wrote:
I was referring to a KDC instead of an IAKERB proxy. My thoughts are
that these proxying functionalities should be moved to the KDC of
the visited realm. But this would be another topic that I wish to
start soon.
Why would you want to have the KDC from one realm act as a
Hi ,
In the IAKERB draft, the followins is said :
===
6. The IAKERB proxy protocol :
...
The IAKERB proxy is responsible for locating an appropriate KDC using the realm
information in the KDC request message it received from the client.
...
I appologize for my
is not registered in
the local DB. Hence there is need to extend the proxy properties to
perform inter-realm operations (to communicate with the user's home
realm ) for authenticating roaming users.
The EAP-KERBEROS method would allow the use of Kerberos in several
EAP based frameworks ( IPSEC
Saber == Saber Zrelli [EMAIL PROTECTED] writes:
Saber when some visiting user would like to connect to a foreign
Saber wireless network, In addition to the bootstrapping problem,
Saber the actual protocol defined by IAKERB does not allow the
Saber operator to authenticate the
Kerberos in wireless authentication otherwise?
I'd be glad if you tell me your ideas, and especially if you see the
need for an EAP Kerberos method.
Best regards,
Thomas
PS.
I'm aware of the property catalogue for an EAP method, which is intended
to be used in wireless networks ( http
In general you want to combine case 1 and case 2. So that if the user
has no ticket you get one, then you use that to get a ticket for the
accesspoint. You certainly never want to give the access point or EAP
server the password.
I'd recommend talking to Derek Atkins about your proposal.
.
Is this situation realistic?
Where could one use Kerberos in wireless authentication otherwise?
I'd be glad if you tell me your ideas, and especially if you see the
need for an EAP Kerberos method.
Best regards,
Thomas
PS. I'm aware of the property catalogue for an EAP method, which
Sent: 14 July 2005 22:44
To: kerberos@mit.edu
Subject: EAP-Kerberos
Hi Chris, Saber, Sam, all,
(sth went wrong with my first email, I try it again)
I read your discussion in the Kerberos Mailing List regarding Kerberos
for Wireless Authentication (June 2005). In February 05, I already
thought
Shri == Shri Lohia [EMAIL PROTECTED] writes:
Shri 1) Where can I
Shri find the definition of EAP kerberos interface specs.
I'm not aware of any EAP standards-track or IETF work for Kerberos.
There is GSSAPI work, but I would describe it as very immature and not
a good starting point
Title: EAP - Kerberos for Wireless AP
1) Where can I find the definition of EAP kerberos interface specs.
2) Any one implemented Kerberos client on VxWorks for embedded systems such as Wireless Access Point
Thanks
Shri Lohia
13 matches
Mail list logo