diff options
author | Andreas Steffen <andreas.steffen@strongswan.org> | 2013-07-19 20:07:32 +0200 |
---|---|---|
committer | Andreas Steffen <andreas.steffen@strongswan.org> | 2013-07-19 20:07:32 +0200 |
commit | 2b1ac51c9c4d79356ddae8e601f5ca8342808fd1 (patch) | |
tree | 4313ad0a204cb5494ab502162ff0da9d0c9ccedd /testing | |
parent | 645e9291f03a4d4714a1e27d8fea83643f6cb48a (diff) | |
download | strongswan-2b1ac51c9c4d79356ddae8e601f5ca8342808fd1.tar.bz2 strongswan-2b1ac51c9c4d79356ddae8e601f5ca8342808fd1.tar.xz |
fixed typo5.1.0rc1
Diffstat (limited to 'testing')
-rw-r--r-- | testing/tests/tnc/tnccs-11-radius-pts/description.txt | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/testing/tests/tnc/tnccs-11-radius-pts/description.txt b/testing/tests/tnc/tnccs-11-radius-pts/description.txt index 51dd03362..f71837b6d 100644 --- a/testing/tests/tnc/tnccs-11-radius-pts/description.txt +++ b/testing/tests/tnc/tnccs-11-radius-pts/description.txt @@ -7,7 +7,7 @@ At the outset the gateway authenticates itself to the clients by sending an IKEv The strong EAP-TTLS tunnel protects the ensuing weak client authentication based on <b>EAP-MD5</b>. In a next step the EAP-TNC protocol is used within the EAP-TTLS tunnel to determine the health of <b>carol</b> and <b>dave</b> via the <b>IF-TNCCS 1.1</b> client-server interface. -The communication between the OS and Attestation IMC and the Attestion IMV is based on the +The communication between the OS and Attestation IMC and the Attestation IMV is based on the <b>IF-M</b> protocol defined by <b>RFC 5792 PA-TNC</b>. <p> <b>carol</b> passes the health test and <b>dave</b> fails. Based on these measurements the clients |