|WikiProject Computing / Networking / Security||(Rated C-class, Mid-importance)|
In "RFC 2284 has been obsoleted by RFC 3748", should 'obseleted' by replaced by 'superceded' ? I've not heard obseleted before, but I'm hesitant to replace it in case it has some specific/technical meaning here.
- Yes, in IETF usage, "obsoleted" is the word that is used. E.g., RFC 3748 reads "This document obsoletes RFC 2284".Derek Balsam 14:22, 4 September 2006 (UTC)
Generation of Keying material
This article describes (only) how a user is authenticated to a network. Although this is not part of the ieee802.1x standard, the authentication exchange will often establish a secret key (pairwise master key) between the authenticator and the supplicant. In the case of WPA, this key is later used to derive the keys used for encrypting the connection. I think it would be good to mention this, as it helps undestanding the relationship between 802.1x and other standards. What do others think? Jonas Wagner (talk) 09:23, 18 June 2010 (UTC)
This article needs information regarding 802.1X implementations for Unix systems (Solaris, AIX, HP-UX, IRIX, Tru64, and others.) — Preceding unsigned comment added by 220.127.116.11 (talk) 11:16, 21 July 2011 (UTC)
MAC Bypass section relevance?
Although I do understand how this particular section is indirectly related to the topic, it seems to me as if a specific feature offered by network appliances that is not actually part of 802.1X itself seems a bit tangential and does not particularly contribute to the understanding of 802.1X. I propose that this section be removed; further input from others would be appreciated. Jonathan FarnhamJ 01:00, 6 February 2013 (UTC)
- It does not strike me as irrelevant. Perhaps it is misplaced. It actually points out a significant weakness of 802.1X. You create a potentially large security hole and/or administrative headache connecting devices to your network that don't support 802.1X. There are many such devices. -—Kvng 15:46, 10 February 2013 (UTC)
- Yes, this I understand-- however, in the example you give, it is the absence of 802.1X authentication in specific devices, rather than an issue with 802.1X itself that is the issue. Perhaps a "shortcomings" type of section might be good, with this particular facet included, however, it doesn't really fit into the Vulnerabilities section, and it definitely is misplaced where it currently is. Jonathan FarnhamJ 22:16, 10 February 2013 (UTC)