File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / strongswan / testing / tests / swanctl / rw-eap-peap-mschapv2 / description.txt
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Wed Jun 3 09:46:48 2020 UTC (4 years, 5 months ago) by misho
Branches: strongswan, MAIN
CVS tags: v5_9_2p0, v5_8_4p7, HEAD
Strongswan

The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each to gateway <b>moon</b>.
The strong mutual authentication is based on <b>EAP-PEAP</b> only (without a separate IKEv2
authentication) with the gateway being authenticated by a server certificate during the
EAP-TLS tunnel setup (phase1 of EAP-PEAP). This tunnel protects the ensuing weak client
authentication based on <b>EAP-MSCHAPv2</b> (phase2 of EAP-PEAP).
<p/>
Client <b>carol</b> presents the correct MSCHAPv2 password and succeeds whereas client
<b>dave</b> chooses the wrong password and fails.

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>