We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
An anonymous reader writes "I have been asked by management via auditors and regulatory compliance to deploy an 802.1X wired network at my work. This project has been going on for some time and with little success. The biggest problems we have seen is that the native windows supplicant does not work all that well and completely breaks down if you try to RDP in to a machine (which the support desk does all the time). It also has no support for EAP-TTLS/PAP, which we need as our user accounts are stored in Kerberos (MIT's). I have looked at a few other supplicants from Juniper and Cisco, but then stumbled upon XSupplicant from Open1X and read on their email list today that they have released 2.0 for Windows XP.
Doing a little bit more reading I found out that this release comes on the heals of the announcement that Aruba Networks and HP Procurve have joined Open1X and the OpenSEA Alliance along with Extreme Networks, Identity Engines, Infoblox, Ja.net, Symantec, TippingPoint, and Trapeze to further secure network authentication via 802.1X. So with all of these vendors backing XSupplicant, does that mean it is pretty solid?
I guess my big questions are, who is deploying 802.1X?, what are people's views of 802.1X? and does it really make the edge of my network more secure or are the auditors just up in the night?
An anonymous reader writes "Cory Doctorow, founder of Boing Boing, says he doesn't have a problem in principle with the automated network defense systems that guard the Internet against malware, spamigation bots, and other network nasties. However, in his article 'The Future of Internet Immune Systems,' he bemoans the problems caused by 'Internet autoimmune disorder' — where the network defenses designed to block network attacks are automated and instantaneous, but the systems in place to reverse erroneous lockdowns are manual and unresponsive."