-
Notifications
You must be signed in to change notification settings - Fork 274
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
is this possible !!!!!!!!!!!!!!!!????? #104
Comments
… On 15 Feb 2019, at 06:48, mina nageh salama ***@***.***> wrote:
https://www.youtube.com/watch?v=HoihKhQWZ7k&feature=youtu.be
!!!!!!!!!
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.
|
This has been possible for many years. It depend on the underlying authentication mechanism and the validation of the certificates in the clients. All started in Shmoocon in 2008, almost 11 years ago. Check these: |
@singe @CapitanShinChan And does this one |
It’s all in the wiki link I sent you.
|
@singe |
You control EAP modes with the radius config as documented at https://github.com/sensepost/hostapd-mana/wiki/Creating-PSK-or-EAP-Networks#eap_user_file the default config supports GTC. mana_wpe can only be 1 or 0 for on or off.
This project is deprecated. Please open future requests on the hostapd-mana issue tracker. Please also spend some time reading the docs and testing before asking questions.
|
@singe |
@singe @CapitanShinChan |
@singe thanks I appreciate every response :) simplest hostapd.conf driver=hostap eap_user_file `* PEAP,GTC,TTLS `"t" GTC,TTLS-PAP "1234test" [2] |
And what if I want to make it use Should my eap_user_file |
@singe @CapitanShinChan btw is the identity encrypted ??! |
No, the identity is not encrypted, since it's send before the TLS tunnel is established. In order to be secure, you have to verify the certificate of the server. |
The identity is only sent for tracking of the session purposes before the TLS tunnel is established. A proper configured AAA server (RADIUS in this case) would allow you to use anonymous identities, which most of clients support. If you want more details about how this works, take a look to the RFC: https://tools.ietf.org/html/rfc3748 |
@CapitanShinChan thanks .. |
https://www.youtube.com/watch?v=HoihKhQWZ7k&feature=youtu.be
!!!!!!!!!
The text was updated successfully, but these errors were encountered: