Not to mention, these are still authentication AND encryption mechanisms, not just encryption. I think the original poster was wanting just an encryption method without the authentication. This doesn't really solve that.
Ryan H Turner Senior Network Engineer The University of North Carolina at Chapel Hill CB 1150 Chapel Hill, NC 27599 +1 919 445 0113 Office +1 919 274 7926 Mobile -----Original Message----- From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Turner, Ryan H Sent: Wednesday, November 20, 2013 3:16 PM To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU Subject: Re: [WIRELESS-LAN] 802.1x vs web-portal My problem with these approaches is their proprietary nature. I wonder how this has been addressed/discussed in the IEEE groups... Ryan H Turner Senior Network Engineer The University of North Carolina at Chapel Hill CB 1150 Chapel Hill, NC 27599 +1 919 445 0113 Office +1 919 274 7926 Mobile -----Original Message----- From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Curtis, Bruce Sent: Wednesday, November 20, 2013 3:05 PM To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU Subject: Re: [WIRELESS-LAN] 802.1x vs web-portal On Nov 20, 2013, at 10:46 AM, Curtis K. Larsen (UIT-Network) <curtis.k.lar...@utah.edu> wrote: > I wonder if this might be closer to what you are looking for: > > http://theruckusroom.typepad.com/files/dynamic-psk-fs.pdf > > It definitely looks interesting. > > -Curtis Larsen Aerohive also has something that does not require an 802.1x supplicant but allows a unique password on each device. http://www.aerohive.com/solutions/technology-behind-solution/simplified-strong-authentication > > From: The EDUCAUSE Wireless Issues Constituent Group Listserv > [WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] on behalf of Coehoorn, Joel > [jcoeho...@york.edu] > Sent: Wednesday, November 20, 2013 9:24 AM > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU > Subject: Re: [WIRELESS-LAN] 802.1x vs web-portal > > <rant>What I really want to provide is an HTTPS-like experience for my users > that just works: an SSL layer that doesn't care who you are, but still > provides meaningful encryption for the last 50 meters where your traffic is > moving through the air for anyone nearby to snoop. > > I'm annoyed that so many encryption solutions are coupled to authentication. > The two don't need to be linked. You don't have to log into an https site to > get encrypted traffic, and you shouldn't have to log into a wifi network to > get encryption either. > > My ideal scenario is that someday I'll be able to install the same wildcard > ssl certificate that we purchase for our web sites to each access point or at > a controller, change a setting for an SSID to use this certificate for > encryption, and as long the certificate is from a well-known/reputable > vendor, user devices will just work. > > I include guest devices in this category. I want someone -- anyone, but > especially visiting admissions candidates --- to be able to turn on their > device for the first time and have the experience be easy: no capture, no > guest registration, no prompt to agree to terms of service, just choose the > SSID and they're online. > > Sure, I could use a shared key scenario and just publish the key, but that's > not the same thing. If anyone knows the key, anyone can decrypt the traffic, > and it still requires an extra step to get online. > > I honestly couldn't care less about the authentication part of this. I don't > need to know right away that it was Jane Smith's computer committing whatever > nefarious deed. The immediate reaction to that kind of thing is the same > regardless of the name of the person behind it. As long as I can target a MAC > address or have reasonably static IP addresses (I do), I'm happy enough using > a captive portal rule on a specific machine after the fact to identify a user > for those times when enforcement issues come up. College-owned machines here > do log user names all the time, so it's just student-owned devices where this > is necessary. > > Sadly, I don't believe this kind of wifi exists today. Certificate-based 1x > comes close, but the need to install/configure devices with a supplicant > breaks it. I would settle for 1x, if I could count on it working for my > students. Personally, I place blame on the WiFi Alliance, certifying devices > that don't work for this feature as well as they should. > > Currently, we're working to provide two WiFi options: one that's > completely open (and I mean completely), and one that uses 1x and > prompts for a user's Active Directory login. Anyone can walk on campus > and get online at a basic level. Really. I don't care. Guest (and even > neighbor) use is a drop in the bucket compared to what our regular > students demand. But if you need encryption you'd better hope the site > or service supports https. We encourage students to use the 1x SSID > whenever they can, and try to educate about the importance of > encryption. Most don't care, and choose the open network, but at least > the option is open to them.</rant> > > > > > > Joel Coehoorn > Director of Information Technology > York College, Nebraska > 402.363.5603 > jcoeho...@york.edu > > > The mission of York College is to transform lives through > Christ-centered education and to equip students for lifelong service > to God, family, and society > > > On Wed, Nov 20, 2013 at 8:54 AM, Ian McDonald <i...@st-andrews.ac.uk> wrote: > Isn't that really a client supplicant issue though? You can send back a > reason for authfailure, and then the client could prompt for a replacement > password. > > -- > ian > -----Original Message----- > From: Fleming, Tony > Sent: 20-11-2013, 14:22 > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU > Subject: Re: [WIRELESS-LAN] 802.1x vs web-portal > > I can tell you we use dot1x here with AD credentials and it doesn't lend > itself to a good end-user experience. Our security policy requires password > expiration after 60 days. When a student's password expires we see an > increase of wireless related complaints (typically blaming the > performance/signal of the wireless network) not realizing their password has > expired and new credentials need to be applied in their wireless profile. > The other AD credential issue we have is related to lock-out. If a student > mistypes his/her password to lock-out their account all of their devices stop > connecting to the wireless network. > > Having said that, we are eyeing certificate based 802.1x. Not having a lot of > experience with PKI we are trying to gauge the effort level of deployment. > Not trying to highjack the thread here - but I am curious if anyone has some > real world experience spinning-up a PKI (from scratch) using CloudPath with > certificates. What is the effort level? > > Tony > > -----Original Message----- > From: The EDUCAUSE Wireless Issues Constituent Group Listserv > [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Jason Cook > Sent: Wednesday, November 20, 2013 1:30 AM > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU > Subject: Re: [WIRELESS-LAN] 802.1x vs web-portal > > List seems to sum it up pretty well. > > I think user wise dot1x is better ....... "once setup". So while it may be > more of a pain to configure for some users, once configured the experience is > much better as they walk on to campus and are connected. > > Having a captive portal is probably a good option for those that can't get > dot1x working . > > I'm interested in the 10% though, do you get them all connected in the > end? 10% seems quite a high percentage > > -- > Jason Cook > Technology Services > The University of Adelaide, AUSTRALIA 5005 Ph : +61 8 8313 4800 > > > -----Original Message----- > From: The EDUCAUSE Wireless Issues Constituent Group Listserv > [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Hanset, > Philippe C > Sent: Wednesday, 20 November 2013 9:56 AM > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU > Subject: Re: [WIRELESS-LAN] 802.1x vs web-portal > > from the top of my head... > > ###What's bad for the user: > > -Captive portal: no encryption over the air, pesky re-authentication > and timeouts, no authentication of the infrastructure (yes, when you > accept that SSL Cert from RADIUS you actually authenticate the > infrastructure) > > -802.1X: finicky supplicants, and, without a good installer, long > config instructions. Strongly authenticated (can't escape the system > ;-) > > ###What's bad for the network engineer (and user stuff as well...): > > -Captive portal: CPU capacity of portal (802.11ac!!!), clients taking > IP addresses and air time even if not authenticated, authentication > can be defeated > > -802.1X: bugs from various vendors. A pain the troubleshoot when not > working. Certificate Expiration and help desk calls resulting from it > > add yours! > > Philippe > > Philippe Hanset > www.eduroam.us > > > On Nov 19, 2013, at 2:10 PM, Jeff Kell <jeff-k...@utc.edu> wrote: > > > On 11/19/2013 4:05 PM, Peter P Morrissey wrote: > >> Can anyone name an application that does not have strong encryption? > >> > >> I'm not arguing against 802.1x, because it works very well for us as users > >> don't have to authenticate constantly on a portal, and we seem to do a > >> very good job getting them on initially, but I am having a hard time > >> understanding the encryption benefits lately. > > > > Does FireSheep or Ettercap ring any bells? > > > > Jeff > > > > ********** > > Participation and subscription information for this EDUCAUSE Constituent > > Group discussion list can be found athttp://www.educause.edu/groups/. > > > > ********** > Participation and subscription information for this EDUCAUSE Constituent > Group discussion list can be found athttp://www.educause.edu/groups/. > > ********** > Participation and subscription information for this EDUCAUSE Constituent > Group discussion list can be found athttp://www.educause.edu/groups/. > > ********** > Participation and subscription information for this EDUCAUSE Constituent > Group discussion list can be found athttp://www.educause.edu/groups/. > > ********** > Participation and subscription information for this EDUCAUSE Constituent > Group discussion list can be found athttp://www.educause.edu/groups/. > > ********** Participation and subscription information for this EDUCAUSE > Constituent Group discussion list can be found at > http://www.educause.edu/groups/. > ********** Participation and subscription information for this EDUCAUSE > Constituent Group discussion list can be found > athttp://www.educause.edu/groups/. --- Bruce Curtis bruce.cur...@ndsu.edu Certified NetAnalyst II 701-231-8527 North Dakota State University ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.