The Following 3 Users Say Thank You to pali For This Useful Post: | ||
|
2016-01-05
, 18:25
|
Posts: 175 |
Thanked: 210 times |
Joined on Mar 2013
|
#22
|
$ gconftool -s -t boolean /system/osso/connectivity/IAP/<UUID>/EAP_disable_certificate_check true
The Following User Says Thank You to Malakai For This Useful Post: | ||
|
2016-01-05
, 19:57
|
Community Council |
Posts: 683 |
Thanked: 1,227 times |
Joined on Sep 2010
@ Mbabane
|
#23
|
So I was thinking that maybe I had to get the certificate on the N900, and I was asking myself how to do that. From what I got to read on the web about the way EAP-PEAP/EAP-GTC is working and guessing that my ISP is using RADIUS to authenticate the users, am I right by telling that the certificate in question is on the RADIUS server, as the encryption should be between my N900 and that server?
Could I use wireshark to get more info about this during the connection to the access point? (I don't know if wireshark exists on the N900).
....
Oh, and my ISP won't give me more info, as for them it is working (I can connect and I have access to the Internet), so it's my problem if I have a pop-up on the N900.
The Following User Says Thank You to sicelo For This Useful Post: | ||
|
2016-01-06
, 20:52
|
Posts: 175 |
Thanked: 210 times |
Joined on Mar 2013
|
#24
|
|
2016-01-06
, 21:35
|
Community Council |
Posts: 683 |
Thanked: 1,227 times |
Joined on Sep 2010
@ Mbabane
|
#25
|
|
2016-04-04
, 19:17
|
Posts: 2,154 |
Thanked: 8,464 times |
Joined on May 2010
|
#26
|
The Following 4 Users Say Thank You to pali For This Useful Post: | ||
|
2016-04-05
, 06:35
|
Community Council |
Posts: 683 |
Thanked: 1,227 times |
Joined on Sep 2010
@ Mbabane
|
#27
|
|
2016-04-05
, 06:57
|
Community Council |
Posts: 683 |
Thanked: 1,227 times |
Joined on Sep 2010
@ Mbabane
|
#28
|
Tags |
maemo 5, wpa-eap, wpa2-eap |
|
You are using EAP-PEAP/EAP-GTC. It means that there are two layers. First is EAP-PEAP which create encrypted TLS tunnel in which is send EAP-GTC.
Username (alias identity) is send unencrypted plain-text in EAP-PEAP and this can be sniffed. But password (together with username) is send in EAP-GTC. It is plain-text too, but in second layer, now encrypted with TLS in tunnel (from EAP-PEAP). And in case that TLS is secure, then password is send securely (in encrypted tunnel).