Most of our features and services are available only to members, so we encourage you to login or register a new account. Registration is free, fast and simple. You only need to provide a valid email. Being a member you'll gain access to all member forums and features, post a message to ask question or provide answer, and share or find resources related to mobile phones, tablets, computers, game consoles, and multimedia.
All that and more, so what are you waiting for, click the register button and join us now! Ito ang website na ginawa ng pinoy para sa pinoy!
greedy mga telcos dito sa pinas.. sa pagkakaalam ko may nag-open na congressman (don't remember his name) na bakit daw mahal ang singil with slow speed compare nga sa ibang bansa..
this from a reliable source... this is true.. but I don't know what day or time or months that this new security can be implemented. but expect this.. a new security injected to the modem with root script... only legit connection can connect to the base station.. so no more hacking/snipping/illegal connection..
---
how ever.. many tech and co-symbianizer zan resoved this.. anything is possible guys
Masasabi ko lang is parang may katotohanan na ito... dahil ang fresh pullout na nabrrow ko is ganun, ang settng may nakalgay pa na w/ security certificate. Nga-nga nalng..... imba kasi.
else
kaya nga mahalin nyo ang mga tech nyo dito na sybianizer talaga... wag yung babatikusin dahil sila lang ang marunong nito...lalo na ang mga nag protesta nung kamakailan lang....kung tayo lang hindi natin yan magagawa dahil nakikibasa lang tayo sa kung anong tuts at software na ma gagawa nila...kung ganyan ang mangyayari...mag aaply nlng ako ng plan kung magiging ganito na ang globe....
- - - Updated - - -
sana mag kamali sila na mag inject sa modem ko..hahah e open nyo na mga ports nyo baka ma inject na kayo ng certificate ng booom!
15.2.3 Mutual Authentication as Defined in 802.16e
The PKMv2 protocol uses the same basis as PKMv1. One of the main differences is the authentication: PKMv2 uses mutual authentication; i.e. the MS also authenticates the BS in order to prevent the connection to a ‘false’ BS. The BS and MS mutual authentication is the process of:
the BS authenticating a client's MS identity;
the MS authenticating the BS identity;
the BS providing the authenticated MS with an AK;
the BS providing the authenticated MS with the identities and properties of primary and static SAs.
The key management protocol uses either X.509 digital certificates or EAP for authentication. Therefore, two distinct authentication protocol mechanisms are supported by PKMv2:
RSA authentication. This protocol is based on X.509 certificates.
Extensible Authentication Protocol (EAP) authentication (RFC 3748 [39] and RFC 2716 [51]). The EAP uses particular kinds of credential (subscriber identity module, password, token-based, X.509 certificate or other) depending on the EAP method implemented. The EAP methods that are to be used are outside the scope of the standard. Yet. the standard [2] indicates that the EAP method selected should fulfil the ‘mandatory criteria’ listed in Section 2.2 of RFC 4017 [52]. It seems that, for the moment, EAP-TLS [51] is the only EAP algorithm that fulfils these criterias.
...
15.2.5 Management of the Authorisation Key in PKMv2
Due to PKMv2 there are two different authentication protocols (RSA-based or EAP-based) and two sources of keying materials: RSA and EAP.
15.2.5.1 RSA-based Authorisation
The RSA-based authorisation process yields the Pre-PAK (Pre-Primary AK) as described above. The Pre-PAK is sent by the BS to the MS encrypted with the public key of the MS certificate. Pre-PAK is used to generate the PAK.
15.2.5.2 EAP-based Authentication
An RSA mutual authorisation may take place before the EAP exchange. In that case, the EAP messages may be protected by an ElK (EAP Integrity Key) derived from the Pre-PAK. The product of the EAP exchange is the MSK (Master Key). The MS and the authenticator derive a PMK by truncating the MSK and an optional ElK.
In order to prevent a man-in-the-middle attack, the MS and the BS must negotiate a double EAP mode (also known as authenticated EAP after EAP) and use the ElK generated during the first round of EAP.
agree ako sa taas ko,.
para kay ts parang pwede at nangyayari na nga siguro ito sa ngayon,. ang mga new modem nila like bm623m nila dito samin hindi ko na ma scan kahit alam ko wan ip nila di ko mapasok,. ibig sabihin ginawa na nilang
secured mga modem na bagong labas,. ang ina alam ko lang i panu hugutin yung certificate na yan sa mga legit kung totoo man yan,.
"KAPE PA TS" yan na ata madalas dito sa sb sinasabi kapagka mayron pa,. kapagka wala "PLEASE HELP Di ako maka ganito ganyan",. hehe peace bato bato sa langit,. sinsabi ko lang anu napapansin ko,.