RE: Weak Security

2020-12-02 Thread Michael Holden
+1 Kill WEP and TKIP Please beware of enabling WPA3 or OWE! Can’t wait to be able to use them, but there are still some serious driver issues out there. For instance, the Google Pixel 3 used to (may still) kernel panic and reboot the phone when connecting to a WPA3-Personal SSID. No error, no war

RE: Weak Security

2020-12-02 Thread Jason Cook
Same here, can’t remember when we removed TKIP… a few years back now. No calls /complaints/issues… -- Jason Cook Information Technology and Digital Services The University of Adelaide, AUSTRALIA 5005 --- This email message is intended only f

RE: Weak Security

2020-12-02 Thread Jennifer Minella
+1 on removing TKIP as an option and staying with AES as a minimum. TKIP has been deprecated for years and even in a BYOD/high ed environment, it is exceptionally unlikely any devices won’t support the AES/CCMP suite; if they *don’t* support it, you may not wan them on that network anyway 😊 With

RE: Weak Security

2020-12-01 Thread Floyd, Brad
Bruce, We removed TKIP (and WPA) in favor of AES (CCMP) (and WPA2) from all of our configs a little over 7 years ago. We faced zero challenges and gained the increased connection rates (HT). The IEEE 802.11n standard prohibited using high-throuhput if WEP or TKIP is configured. This limited conn

RE: Weak Security

2020-12-01 Thread Enfield, Chuck
We stopped supporting TKIP years ago. No issues that I’m aware of. Chuck Enfield Manager, Wireless & Cellular Penn State IT 814-863-8715 From: The EDUCAUSE Wireless Issues Community Group Listserv On Behalf Of Entwistle, Bruce Sent: Tuesday, December 1, 2020 7:14 PM To: WIRELESS-LAN@LISTSERV.E