You mean, something like 802.11u?
http://en.wikipedia.org/wiki/IEEE_802.11u




On Wed, Nov 20, 2013 at 3:18 PM, Turner, Ryan H <rhtur...@email.unc.edu>wrote:

> Not to mention, these are still authentication AND encryption mechanisms,
> not just encryption.  I think the original poster was wanting just an
> encryption method without the authentication.  This doesn't really solve
> that.
>
> Ryan H Turner
> Senior Network Engineer
> The University of North Carolina at Chapel Hill
> CB 1150 Chapel Hill, NC 27599
> +1 919 445 0113 Office
> +1 919 274 7926 Mobile
>
> -----Original Message-----
> From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:
> WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Turner, Ryan H
> Sent: Wednesday, November 20, 2013 3:16 PM
> To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> Subject: Re: [WIRELESS-LAN] 802.1x vs web-portal
>
> My problem with these approaches is their proprietary nature.  I wonder
> how this has been addressed/discussed in the IEEE groups...
>
> Ryan H Turner
> Senior Network Engineer
> The University of North Carolina at Chapel Hill CB 1150 Chapel Hill, NC
> 27599
> +1 919 445 0113 Office
> +1 919 274 7926 Mobile
>
> -----Original Message-----
> From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:
> WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Curtis, Bruce
> Sent: Wednesday, November 20, 2013 3:05 PM
> To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> Subject: Re: [WIRELESS-LAN] 802.1x vs web-portal
>
> On Nov 20, 2013, at 10:46 AM, Curtis K. Larsen (UIT-Network) <
> curtis.k.lar...@utah.edu> wrote:
>
> > I wonder if this might be closer to what you are looking for:
> >
> > http://theruckusroom.typepad.com/files/dynamic-psk-fs.pdf
> >
> > It definitely looks interesting.
> >
> > -Curtis Larsen
>
>   Aerohive also has something that does not require an 802.1x supplicant
> but allows a unique password on each device.
>
>
> http://www.aerohive.com/solutions/technology-behind-solution/simplified-strong-authentication
>
> >
> > From: The EDUCAUSE Wireless Issues Constituent Group Listserv
> > [WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] on behalf of Coehoorn, Joel
> > [jcoeho...@york.edu]
> > Sent: Wednesday, November 20, 2013 9:24 AM
> > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> > Subject: Re: [WIRELESS-LAN] 802.1x vs web-portal
> >
> > <rant>What I really want to provide is an HTTPS-like experience for my
> users that just works: an SSL layer that doesn't care who you are, but
> still provides meaningful encryption for the last 50 meters where your
> traffic is moving through the air for anyone nearby to snoop.
> >
> > I'm annoyed that so many encryption solutions are coupled to
> authentication. The two don't need to be linked. You don't have to log into
> an https site to get encrypted traffic, and you shouldn't have to log into
> a wifi network to get encryption either.
> >
> > My ideal scenario is that someday I'll be able to install the same
> wildcard ssl certificate that we purchase for our web sites to each access
> point or at a controller, change a setting for an SSID to use this
> certificate for encryption, and as long the certificate is from a
> well-known/reputable vendor, user devices will just work.
> >
> > I include guest devices in this category. I want someone -- anyone, but
> especially visiting admissions candidates --- to be able to turn on their
> device for the first time and have the experience be easy: no capture, no
> guest registration, no prompt to agree to terms of service, just choose the
> SSID and they're online.
> >
> > Sure, I could use a shared key scenario and just publish the key, but
> that's not the same thing. If anyone knows the key, anyone can decrypt the
> traffic, and it still requires an extra step to get online.
> >
> > I honestly couldn't care less about the authentication part of this. I
> don't need to know right away that it was Jane Smith's computer committing
> whatever nefarious deed. The immediate reaction to that kind of thing is
> the same regardless of the name of the person behind it. As long as I can
> target a MAC address or have reasonably static IP addresses (I do), I'm
> happy enough using a captive portal rule on a specific machine after the
> fact to identify a user for those times when enforcement issues come up.
> College-owned machines here do log user names all the time, so it's just
> student-owned devices where this is necessary.
> >
> > Sadly, I don't believe this kind of wifi exists today. Certificate-based
> 1x comes close, but the need to install/configure devices with a supplicant
> breaks it. I would settle for 1x, if I could count on it working for my
> students. Personally, I place blame on the WiFi Alliance, certifying
> devices that don't work for this feature as well as they should.
> >
> > Currently, we're working to provide two WiFi options: one that's
> > completely open (and I mean completely), and one that uses 1x and
> > prompts for a user's Active Directory login. Anyone can walk on campus
> > and get online at a basic level. Really. I don't care. Guest (and even
> > neighbor) use is a drop in the bucket compared to what our regular
> > students demand. But if you need encryption you'd better hope the site
> > or service supports https. We encourage students to use the 1x SSID
> > whenever they can, and try to educate about the importance of
> > encryption. Most don't care, and choose the open network, but at least
> > the option is open to them.</rant>
> >
> >
> >
> >
> >
> > Joel Coehoorn
> > Director of Information Technology
> > York College, Nebraska
> > 402.363.5603
> > jcoeho...@york.edu
> >
> >
> > The mission of York College is to transform lives through
> > Christ-centered education and to equip students for lifelong service
> > to God, family, and society
> >
> >
> > On Wed, Nov 20, 2013 at 8:54 AM, Ian McDonald <i...@st-andrews.ac.uk>
> wrote:
> > Isn't that really a client supplicant issue though? You can send back a
> reason for authfailure, and then the client could prompt for a replacement
> password.
> >
> > --
> > ian
> > -----Original Message-----
> > From: Fleming, Tony
> > Sent:  20-11-2013, 14:22
> > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> > Subject: Re: [WIRELESS-LAN] 802.1x vs web-portal
> >
> > I can tell you we use dot1x here with AD credentials and it doesn't lend
> itself to a good end-user experience. Our security policy requires password
> expiration after 60 days. When a student's password expires we see an
> increase of wireless related complaints (typically blaming the
> performance/signal of the wireless network) not realizing their password
> has expired and new credentials need to be applied in their wireless
> profile.
> > The other AD credential issue we have is related to lock-out. If a
> student mistypes his/her password to lock-out their account all of their
> devices stop connecting to the wireless network.
> >
> > Having said that, we are eyeing certificate based 802.1x. Not having a
> lot of experience with PKI we are trying to gauge the effort level of
> deployment.
> > Not trying to highjack the thread here - but I am curious if anyone has
> some real world experience spinning-up a PKI (from scratch) using CloudPath
> with certificates. What is the effort level?
> >
> > Tony
> >
> > -----Original Message-----
> > From: The EDUCAUSE Wireless Issues Constituent Group Listserv
> > [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Jason Cook
> > Sent: Wednesday, November 20, 2013 1:30 AM
> > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> > Subject: Re: [WIRELESS-LAN] 802.1x vs web-portal
> >
> > List seems to sum it up pretty well.
> >
> > I think user wise dot1x is better ....... "once setup". So while it may
> be more of a pain to configure for some users, once configured the
> experience is much better as they walk on to campus and are connected.
> >
> > Having a captive portal is probably a good option for those that can't
> get dot1x working .
> >
> > I'm interested in the 10% though, do you get them all connected in the
> > end? 10% seems quite a high percentage
> >
> > --
> > Jason Cook
> > Technology Services
> > The University of Adelaide, AUSTRALIA 5005 Ph    : +61 8 8313 4800
> >
> >
> > -----Original Message-----
> > From: The EDUCAUSE Wireless Issues Constituent Group Listserv
> > [mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Hanset,
> > Philippe C
> > Sent: Wednesday, 20 November 2013 9:56 AM
> > To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> > Subject: Re: [WIRELESS-LAN] 802.1x vs web-portal
> >
> > from the top of my head...
> >
> > ###What's bad for the user:
> >
> > -Captive portal: no encryption over the air, pesky re-authentication
> > and timeouts, no authentication of the infrastructure  (yes, when you
> > accept that SSL Cert from RADIUS you actually authenticate the
> > infrastructure)
> >
> > -802.1X: finicky supplicants, and, without a good installer, long
> > config instructions. Strongly authenticated (can't escape the system
> > ;-)
> >
> > ###What's bad for the network engineer (and user stuff as well...):
> >
> > -Captive portal: CPU capacity of portal (802.11ac!!!), clients taking
> > IP addresses and air time even if not authenticated, authentication
> > can be defeated
> >
> > -802.1X: bugs from various vendors. A pain the troubleshoot when not
> > working. Certificate Expiration and help desk calls resulting from it
> >
> > add yours!
> >
> > Philippe
> >
> > Philippe Hanset
> > www.eduroam.us
> >
> >
> > On Nov 19, 2013, at 2:10 PM, Jeff Kell <jeff-k...@utc.edu> wrote:
> >
> > > On 11/19/2013 4:05 PM, Peter P Morrissey wrote:
> > >> Can anyone name an application that does not have strong encryption?
> > >>
> > >> I'm not arguing against 802.1x, because it works very well for us as
> users don't have to authenticate constantly on a portal, and we seem to do
> a very good job getting them on initially, but I am having a hard time
> understanding the encryption benefits lately.
> > >
> > > Does FireSheep or Ettercap ring any bells?
> > >
> > > Jeff
> > >
> > > **********
> > > Participation and subscription information for this EDUCAUSE
> Constituent Group discussion list can be found athttp://
> www.educause.edu/groups/.
> > >
> >
> > **********
> > Participation and subscription information for this EDUCAUSE Constituent
> Group discussion list can be found athttp://www.educause.edu/groups/.
> >
> > **********
> > Participation and subscription information for this EDUCAUSE Constituent
> Group discussion list can be found athttp://www.educause.edu/groups/.
> >
> > **********
> > Participation and subscription information for this EDUCAUSE Constituent
> Group discussion list can be found athttp://www.educause.edu/groups/.
> >
> > **********
> > Participation and subscription information for this EDUCAUSE Constituent
> Group discussion list can be found athttp://www.educause.edu/groups/.
> >
> > ********** Participation and subscription information for this EDUCAUSE
> Constituent Group discussion list can be found at
> http://www.educause.edu/groups/.
> > ********** Participation and subscription information for this EDUCAUSE
> Constituent Group discussion list can be found athttp://
> www.educause.edu/groups/.
>
> ---
> Bruce Curtis                         bruce.cur...@ndsu.edu
> Certified NetAnalyst II                701-231-8527
> North Dakota State University
>
> **********
> Participation and subscription information for this EDUCAUSE Constituent
> Group discussion list can be found at http://www.educause.edu/groups/.
>
> **********
> Participation and subscription information for this EDUCAUSE Constituent
> Group discussion list can be found at http://www.educause.edu/groups/.
>
> **********
> Participation and subscription information for this EDUCAUSE Constituent
> Group discussion list can be found at http://www.educause.edu/groups/.
>

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to