Content deleted Content added
Undid revision 581461011 by 82.153.98.74 (talk) |
No edit summary |
||
Line 36:
As with other 802.1X and EAP types, dynamic encryption can be used with PEAP.
A CA certificate must be used at each client to authenticate the server to each client before the client submits authentication credentials. If the CA certificate is not validated, in general it is trivial to introduce a fake Wireless Access Point which then allows gathering [[MS-CHAPv2]] of handshakes <ref name="Man-in-the-Middle in Tunneled Authentication Protocols">{{
== PEAPv1 with EAP-GTC ==
|