Securely storing EAP passwords
Oleks
oleks at oleks.info
Mon Jan 8 08:16:12 PST 2018
Hi,
I am an avid fan of wpa_supplicant!
I am maintaining a somewhat used configuration for Eduroam at
https://github.com/oleks/eduroam-wpa_supplicant, where I use PEAP for
authentication.
I was wondering why MD4 is (seeemingly) the only available hashing
mechanism for the `password` field? Is this a relic of EAP or PEAP?
If MD4 _is_ the only option, then why doesn't `wpa_supplicant.conf`
support subshells so that the password (or hash) may be retrieved via
another program (e.g., `pass`)?
Are there merely some features of `wpa_supplicant.conf` that I haven't
discovered yet?
--
Oleks
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.infradead.org/pipermail/hostap/attachments/20180108/4ae95e8c/attachment.sig>
More information about the Hostap
mailing list