Re: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Max McGrath
Extreme Network's responseL https://extremeportal.force.com/ExtrArticleDetail?n=18005 -- Max McGrath Network Administrator Carthage College 262-551- mmcgr...@carthage.edu On Mon, Oct 16, 2017 at 6:34 PM, Schuette, David wrote: > Ae

RE: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Schuette, David
Aerohive's response https://www3.aerohive.com/support/security-bulletins/Product-Security-Announcement-Aerohives-Response-to-KRACK-10162017.html?_ga=2.40289697.2082952693.1508196685-659670165.1508196685 Thanks David David Schuette Network-Data Security Manager Information Technology Services M

Re: Big flaw in WPA2

2017-10-16 Thread Richard Nedwich
Ruckus has posted an official response in a Blog Post here: https://theruckusroom.ruckuswireless.com/wi-fi/2017/10/16/commonsense-approach-uncommon-problem/ Further, please find a Cloudpath KB article on the Ruckus support site here: https://support.ruckuswireless.com/documents/2039-faq-security

RE: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Mike Cunningham
:40 AM > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU > Subject: Re: [WIRELESS-LAN] Big flaw in WPA2 > > > >From Cisco: > > > > https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ > cisco-sa-20171016-wpa > > > > > > / Stephen Belcher

RE: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Hector J Rios
LESS-LAN@LISTSERV.EDUCAUSE.EDU> Subject: Re: [WIRELESS-LAN] Big flaw in WPA2 >From Cisco: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa / Stephen Belcher Assistant Director of Network Operations WVU Information Technology Services One Waterfront Place

Re: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Sweetser, Frank E
en Belcher Sent: Monday, October 16, 2017 10:40 AM To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU Subject: Re: [WIRELESS-LAN] Big flaw in WPA2 >From Cisco: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa / Stephen Belcher Assistant Director of Netw

Re: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Stephen Belcher
6, 2017 10:40 AM > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU > Subject: Re: [WIRELESS-LAN] Big flaw in WPA2 > > > >From Cisco: > > > > https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa > > > > > > / Stephen Belcher &g

Re: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Chuck Anderson
ay, October 16, 2017 10:40 AM > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU > Subject: Re: [WIRELESS-LAN] Big flaw in WPA2 > > > >From Cisco: > > > > https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa > > > > > &

RE: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Mike Cunningham
om Cisco: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa / Stephen Belcher Assistant Director of Network Operations WVU Information Technology Services One Waterfront Place / PO Box 6500 Morgantown, WV 26506 (304) 293-8440 office (681) 214-338

Fwd: [mobility] time for WPA3?

2017-10-16 Thread Philippe Hanset
All, In light of the WPA2 exploit, I want to share an email exchange that I had with a colleague. Basically at the minimum disable 802.11r > >> On 10-16-17 18:21, Philippe Hanset wrote: >> So is it correct to state the following: >> 1) WPA2 is vulnerable > > Well, it wasn't properly implemente

Re: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Stephen Belcher
>From Cisco: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa / Stephen Belcher Assistant Director of Network Operations WVU Information Technology Services One Waterfront Place / PO Box 6500 Morgantown, WV 26506 (304) 293-8440 office (

Re: Big flaw in WPA2

2017-10-16 Thread Richard Nedwich
Ruckus is providing a response today. ** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/discuss.

Re: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Blake Krone
Very bad idea. You are trading encryption for something that I could spoof in no time and be on your network faster than it would take for me to read about the wpa2 compromise. > On Oct 16, 2017, at 9:56 AM, Tim Tyler wrote: > > This brings up an issue where I have philosophically wondered if

RE: [WIRELESS-LAN] Big flaw in WPA2- Cisco Statement

2017-10-16 Thread Lee H Badman
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa Lee Badman | Network Architect Certified Wireless Network Expert (#200) Information Technology Services 206 Machinery Hall 120 Smith Drive Syracuse, New York 13244 t 315.443.3003 f 315.443.4325 e

Re: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Yahya M. Jaber
Cisco said they will release an official statement today. Yahya Jaber. CCIE Wireless. 055-869-7555 ITNC Engineering. KAUST. Sent from an Android On Oct 16, 2017 17:10, "Norton, Thomas (Network Operations)" wrote: For Aruba folks: http://community.arubanetworks.com/aruba/attachments/aruba/

Re: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Norton, Thomas (Network Operations)
For Aruba folks: http://community.arubanetworks.com/aruba/attachments/aruba/unified-wired-wireless-access/74698/1/WPA2%20Vulnerability%20IDS%20feature.pdf T.J. Norton Wireless Network Architect – Team Lead Network Services – Wireless (434) 592-6552 [http://www.liberty.edu/media/1616/40themail

RE: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Tim Tyler
This brings up an issue where I have philosophically wondered if mac address authentication isn’t better than 802.11x (wpa2). The reason isn’t because it guards the network better. But if one does get hacked at the point of accessing the network, the consequences are way less. One isn’t giving a

RE: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Lee H Badman
Just keep in mind that an attacker still needs to be strategically positioned (physically) to pull this off, and there are no known cases yet of it happening. Not to say it won’t/can’t but it’s easy to get sucked in to the panic if just going off of headlines. Lee Badman | Network Architect Ce

Re: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Norton, Thomas (Network Operations)
So basically those are work around as in the interim, so don’t use 802.11r, mesh, or clarify engine. Fun stuff! Lee said it Best, let the panic begin lol T.J. Norton Wireless Network Architect Network Operations (434) 592-6552 [http://www.liberty.edu/media/1616/40themail/wordmark-for-email.jpg]

RE: Big flaw in WPA2

2017-10-16 Thread McClintic, Thomas
This seems contradicting… Workarounds === All vulnerabilities described in this advisory may be mitigated by disabling certain features: - For ArubaOS, ensure that 802.11r is disabled by verifying that any configured SSID profile does not contain a "dot11r-profile". From the comman

RE: Big flaw in WPA2

2017-10-16 Thread Lee H Badman
Let the panic begin. From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Turner, Ryan H Sent: Monday, October 16, 2017 7:51 AM To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU Subject: [WIRELESS-LAN] Big flaw in WPA2 https://arstechnica.

Re: [WIRELESS-LAN] Big flaw in WPA2

2017-10-16 Thread Norton, Thomas (Network Operations)
Yeah man, not good! Looks like has a fix out already. https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.arubanetworks.com%2Fsupport-services%2Fsecurity-bulletins%2F&data=02%7C01%7Ctnorton7%40liberty.edu%7C4d81ad0b15a14283e3ca08d5148c52a8%7Cbaf8218eb3024465a9934a39c97251b2%7C0%7C

Big flaw in WPA2

2017-10-16 Thread Turner, Ryan H
https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/ Ryan Turner Manager of Network Operations, ITS The University of North Carolina at Chapel Hill +1 919 274 7926 Mobile +1 919 445 0113 Office ** Participation an