Annotation of embedaddon/strongswan/testing/tests/ikev2/rw-eap-ttls-radius/description.txt, revision 1.1.1.1

1.1       misho       1: The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each to gateway <b>moon</b>.
                      2: At the outset the gateway authenticates itself to the clients by sending an IKEv2
                      3: <b>RSA signature</b> accompanied by a certificate.
                      4: <b>carol</b> and <b>dave</b> then set up an <b>EAP-TTLS</b> tunnel each via <b>moon</b> to
                      5: the FreeRADIUS server <b>alice</b> authenticated by an X.509 AAA certificate.
                      6: The strong EAP-TTLS tunnel protects the ensuing weak client authentication based on <b>EAP-MD5</b>.
                      7: <b>carol</b> presents the correct MD5 password and succeeds whereas <b>dave</b> chooses the
                      8: wrong password and fails.

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>