Re: [WIRELESS-LAN] [External] Re: [WIRELESS-LAN] Weak Security

2020-12-03 Thread Jesse Thomas
+1 for us as well - we disabled WPA and TKIP many years ago and have not
had any issues with client connectivity.


--
Jesse Thomas
Network & Systems Administrator
Hamilton College
315-859-4211


On Thu, Dec 3, 2020 at 9:38 AM Smith, Nayef  wrote:

> +1 to Chuck's comment.  No issues here.
>
> Nayef Z. Smith | *Emory LITS* *Network Services* | Suite 1700 | 1762
> Clifton Road | Atlanta GA 30322 | Voice: 404-727-6019
> --
> *From:* The EDUCAUSE Wireless Issues Community Group Listserv <
> WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU> on behalf of Enfield, Chuck <
> cae...@psu.edu>
> *Sent:* Tuesday, December 1, 2020 7:33 PM
> *To:* WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU <
> WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU>
> *Subject:* [External] Re: [WIRELESS-LAN] Weak Security
>
>
> We stopped supporting TKIP years ago.  No issues that I’m aware of.
>
>
>
> Chuck Enfield
>
> Manager, Wireless & Cellular
>
> Penn State IT
>
> 814-863-8715
>
>
>
> *From:* The EDUCAUSE Wireless Issues Community Group Listserv <
> WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU> *On Behalf Of *Entwistle, Bruce
> *Sent:* Tuesday, December 1, 2020 7:14 PM
> *To:* WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
> *Subject:* [WIRELESS-LAN] Weak Security
>
>
>
> Apple devices that are updating to IOS 14 are now reporting that wireless
> security is weak.   We are currently using a combination of WPA/TKIP and
> WPA2/AES for security, but are considering the move to WPA2/AES only.  I
> was looking to see what others have done and what challenges you faced in
> making these changes.
>
>
>
> https://discussions.apple.com/thread/251805737
> <https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdiscussions.apple.com%2Fthread%2F251805737&data=04%7C01%7Ccae104%40PSU.EDU%7C6c35cd8bde074a78f09c08d896572965%7C7cf48d453ddb4389a9c1c115526eb52e%7C0%7C1%7C637424648389657921%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=J4UUgLhzUijFxAeqdwMmllBh2v7ldMkVX11EUwhw7fo%3D&reserved=0>
>
>
>
> Thank you
>
> Bruce Entwistle
>
> Network Manager
>
> University of Redlands
>
>
>
> **
> Replies to EDUCAUSE Community Group emails are sent to the entire
> community list. If you want to reply only to the person who sent the
> message, copy and paste their email address and forward the email reply.
> Additional participation and subscription information can be found at
> https://www.educause.edu/community
> <https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=04%7C01%7Ccae104%40PSU.EDU%7C6c35cd8bde074a78f09c08d896572965%7C7cf48d453ddb4389a9c1c115526eb52e%7C0%7C1%7C637424648389667917%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=%2FMxKQJqWkI2g3XWWi507GiShJqR%2FjjThb8Ygr5UgjJs%3D&reserved=0>
>
> **
> Replies to EDUCAUSE Community Group emails are sent to the entire
> community list. If you want to reply only to the person who sent the
> message, copy and paste their email address and forward the email reply.
> Additional participation and subscription information can be found at
> https://www.educause.edu/community
>
> --
>
> This e-mail message (including any attachments) is for the sole use of
> the intended recipient(s) and may contain confidential and privileged
> information. If the reader of this message is not the intended
> recipient, you are hereby notified that any dissemination, distribution
> or copying of this message (including any attachments) is strictly
> prohibited.
>
> If you have received this message in error, please contact
> the sender by reply e-mail message and destroy all copies of the
> original message (including attachments).
>
> **
> Replies to EDUCAUSE Community Group emails are sent to the entire
> community list. If you want to reply only to the person who sent the
> message, copy and paste their email address and forward the email reply.
> Additional participation and subscription information can be found at
> https://www.educause.edu/community
>

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community


Re: [External] Re: [WIRELESS-LAN] Weak Security

2020-12-03 Thread Smith, Nayef
+1 to Chuck's comment.  No issues here.

Nayef Z. Smith | Emory LITS Network Services | Suite 1700 | 1762 Clifton Road | 
Atlanta GA 30322 | Voice: 404-727-6019

From: The EDUCAUSE Wireless Issues Community Group Listserv 
 on behalf of Enfield, Chuck 

Sent: Tuesday, December 1, 2020 7:33 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU 
Subject: [External] Re: [WIRELESS-LAN] Weak Security


We stopped supporting TKIP years ago.  No issues that I’m aware of.



Chuck Enfield

Manager, Wireless & Cellular

Penn State IT

814-863-8715



From: The EDUCAUSE Wireless Issues Community Group Listserv 
 On Behalf Of Entwistle, Bruce
Sent: Tuesday, December 1, 2020 7:14 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Weak Security



Apple devices that are updating to IOS 14 are now reporting that wireless 
security is weak.   We are currently using a combination of WPA/TKIP and 
WPA2/AES for security, but are considering the move to WPA2/AES only.  I was 
looking to see what others have done and what challenges you faced in making 
these changes.



https://discussions.apple.com/thread/251805737<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdiscussions.apple.com%2Fthread%2F251805737&data=04%7C01%7Ccae104%40PSU.EDU%7C6c35cd8bde074a78f09c08d896572965%7C7cf48d453ddb4389a9c1c115526eb52e%7C0%7C1%7C637424648389657921%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=J4UUgLhzUijFxAeqdwMmllBh2v7ldMkVX11EUwhw7fo%3D&reserved=0>



Thank you

Bruce Entwistle

Network Manager

University of Redlands



**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at 
https://www.educause.edu/community<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=04%7C01%7Ccae104%40PSU.EDU%7C6c35cd8bde074a78f09c08d896572965%7C7cf48d453ddb4389a9c1c115526eb52e%7C0%7C1%7C637424648389667917%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=%2FMxKQJqWkI2g3XWWi507GiShJqR%2FjjThb8Ygr5UgjJs%3D&reserved=0>

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community



This e-mail message (including any attachments) is for the sole use of
the intended recipient(s) and may contain confidential and privileged
information. If the reader of this message is not the intended
recipient, you are hereby notified that any dissemination, distribution
or copying of this message (including any attachments) is strictly
prohibited.

If you have received this message in error, please contact
the sender by reply e-mail message and destroy all copies of the
original message (including attachments).

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community


RE: Weak Security

2020-12-02 Thread Michael Holden
+1 Kill WEP and TKIP
Please beware of enabling WPA3 or OWE!
Can’t wait to be able to use them, but there are still some serious driver 
issues out there.
For instance, the Google Pixel 3 used to (may still) kernel panic and reboot 
the phone when connecting to a WPA3-Personal SSID. No error, no warning, just 
reboots the device, it’s a really sweet denial of service actually.
We also have many reports of various device types requesting passwords when 
connecting to OWE SSID’s.
Can’t wait to be able to use them, it’ll just take a while before we can deploy 
without worry; Or be able to blame the device manufacturers for not updating 
their drivers for years.

For those of you using Aruba and Aruba ClearPass, if you are looking at the 
SSID name in the service, OWE SSID’s will prepend OWE_ to the SSID, so make 
sure you’re using Contains or a RegEx if possible rather than Equals 😊

A friendly PSA:
While you’re at it, you may want to take 1 and 2 mbps rates off your 2.4 GHz; 
Unless you have specific devices that require it (scan guns, emergency pull 
strings, and industrial / HVAC devices come to mind).
They travel quite a ways, and user experience is poor at best when connected at 
1/2 mbps.
If you support printers in your RESNET beware of all 1-11 rates off, we’ve seen 
some printers with g/n 2.4 radios will still require to connect at 6 mbps then 
negotiate up.


From: The EDUCAUSE Wireless Issues Community Group Listserv 
 On Behalf Of Jennifer Minella
Sent: Wednesday, December 2, 2020 5:35 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Weak Security

+1 on removing TKIP as an option and staying with AES as a minimum. TKIP has 
been deprecated for years and even in a BYOD/high ed environment, it is 
exceptionally unlikely any devices won’t support the AES/CCMP suite; if they 
*don’t* support it, you may not wan them on that network anyway 😊 With the new 
Wi-Fi security standards out, including WPA3 (in addition to Open 
Enhanced/OWE), even our current AES will be at the low end of the security 
totem pole (down the road).

___
Jennifer Minella, CISSP, HP MASE
VP of Engineering & Security
Carolina Advanced Digital, Inc.
www.cadinc.com<https://linkprotect.cudasvc.com/url?a=http%3a%2f%2fwww.cadinc.com%2f&c=E,1,nt0Sp7vMVP_lWyooc18Ceq12DBciMj3iPVNOwvJMwv3ouHvR6m3RHOYWKNYbaUYcSPXARTkgm19mNp3Fw0cisscWzsVFX07c-63z9_uJvg,,&typo=1>
j...@cadinc.com<mailto:j...@cadinc.com>
919.460.1313 Main Office
919.539.2726 Mobile/text
[CAD LOGO EMAIL SIG]

From: Entwistle, Bruce 
mailto:bruce_entwis...@redlands.edu>>
Sent: Tuesday, December 1, 2020 7:14 PM
Subject: Weak Security

Apple devices that are updating to IOS 14 are now reporting that wireless 
security is weak.   We are currently using a combination of WPA/TKIP and 
WPA2/AES for security, but are considering the move to WPA2/AES only.  I was 
looking to see what others have done and what challenges you faced in making 
these changes.

https://discussions.apple.com/thread/251805737

Thank you
Bruce Entwistle
Network Manager
University of Redlands


**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at 
https://www.educause.edu/community<https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fwww.educause.edu%2fcommunity&c=E,1,7Q9kaIfRVTp6Ny1ts8xgNamt1vVgpqGXHmwYw3ld9X-2I7WKActRMXHtJxUJLVp-cLWx9mD3nISOp-2tGxF_V2xqbR5sz7t80TxO8yA7AlE9ZUVnkFT66hsskQ,,&typo=1>

Visit 
https://cadinc.com/blog<https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fcadinc.com%2fblog&c=E,1,coXjH99Jk0qHR-uWIqZGPmup-LO5f1wXnulIF30lsEN0phOqJJC8x6k82nfyOygL1oX9umro2EXDaxMPFRpF6bZOtTlciANuw5Swjcju0aWxoGuUdLE,&typo=1>
 for tech articles and news.

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at 
https://www.educause.edu/community<https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fwww.educause.edu%2fcommunity&c=E,1,qIJ9nyLY3P6W5vQ-aeUsh673cVBBLDmXyhML8khNRRZb_-RZwZPvYc_PFGPO14dCrqI-Z-OAYI1uUeGOuI54fIygvW7rIRL0ppe48pCSnFAeF443nBVcy5g,&typo=1>

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community


RE: Weak Security

2020-12-02 Thread Jason Cook
Same here, can’t remember when we removed TKIP… a few years back now.

No calls /complaints/issues…

--
Jason Cook
Information Technology and Digital Services
The University of Adelaide, AUSTRALIA 5005
---
This email message is intended only for the addressee(s) and contains 
information which may be confidential and/or copyright.  If you are not the 
intended recipient please do not read, save, forward, disclose, or copy the 
contents of this email. If this email has been sent to you in error, please 
notify the sender by reply email and delete this email and any copies or links 
to this email completely and immediately from your system.  No representation 
is made that this email is free of viruses.  Virus scanning is recommended and 
is the responsibility of the recipient.

From: The EDUCAUSE Wireless Issues Community Group Listserv 
 On Behalf Of Floyd, Brad
Sent: Wednesday, 2 December 2020 11:05 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Weak Security

Bruce,
We removed TKIP (and WPA) in favor of AES (CCMP) (and WPA2) from all of our 
configs a little over 7 years ago. We faced zero challenges and gained the 
increased connection rates (HT). The IEEE 802.11n standard prohibited using 
high-throuhput if WEP or TKIP is configured. This limited connection rates to 
54 Mbps. The URL is correct, TKIP is weak (and broken).
Thanks,
Brad

From: The EDUCAUSE Wireless Issues Community Group Listserv 
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Entwistle, Bruce
Sent: Tuesday, December 01, 2020 6:14 PM
To: 
WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU<mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU>
Subject: [WIRELESS-LAN] Weak Security


[EXTERNAL SENDER]

Apple devices that are updating to IOS 14 are now reporting that wireless 
security is weak.   We are currently using a combination of WPA/TKIP and 
WPA2/AES for security, but are considering the move to WPA2/AES only.  I was 
looking to see what others have done and what challenges you faced in making 
these changes.

https://discussions.apple.com/thread/251805737

Thank you
Bruce Entwistle
Network Manager
University of Redlands


**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community


RE: Weak Security

2020-12-02 Thread Jennifer Minella
+1 on removing TKIP as an option and staying with AES as a minimum. TKIP has 
been deprecated for years and even in a BYOD/high ed environment, it is 
exceptionally unlikely any devices won’t support the AES/CCMP suite; if they 
*don’t* support it, you may not wan them on that network anyway 😊 With the new 
Wi-Fi security standards out, including WPA3 (in addition to Open 
Enhanced/OWE), even our current AES will be at the low end of the security 
totem pole (down the road).

___
Jennifer Minella, CISSP, HP MASE
VP of Engineering & Security
Carolina Advanced Digital, Inc.
www.cadinc.com<http://www.cadinc.com/>
j...@cadinc.com<mailto:j...@cadinc.com>
919.460.1313 Main Office
919.539.2726 Mobile/text
[CAD LOGO EMAIL SIG]

From: Entwistle, Bruce 
Sent: Tuesday, December 1, 2020 7:14 PM
Subject: Weak Security

Apple devices that are updating to IOS 14 are now reporting that wireless 
security is weak.   We are currently using a combination of WPA/TKIP and 
WPA2/AES for security, but are considering the move to WPA2/AES only.  I was 
looking to see what others have done and what challenges you faced in making 
these changes.

https://discussions.apple.com/thread/251805737

Thank you
Bruce Entwistle
Network Manager
University of Redlands


**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community
Visit https://cadinc.com/blog for tech articles and news.

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community


Re: [WIRELESS-LAN] Weak Security

2020-12-02 Thread Jonathan Waldrep
 It is worth noting that WPA2 requires AES/CCMP support, where TKIP is
optional. To give an idea of clients that support it, WPA2 support was
added in Windows XP SP3 (2008), possibly with a hotfix before that.

On 02/12/2020 10:39, James Helzerman wrote:

Hi.  Our first roll out for 802.1x used WPA2 AES and we have had zero
issues.  All clients these days (and for many years) support it.

-Jimmy

--
James Helzerman
Wireless Network Engineer
University of Michigan - ITS

On Tue, Dec 1, 2020 at 9:56 PM Entwistle, Bruce <
0139f1156e70-dmarc-requ...@listserv.educause.edu> wrote:

> Apple devices that are updating to IOS 14 are now reporting that wireless
> security is weak.   We are currently using a combination of WPA/TKIP and
> WPA2/AES for security, but are considering the move to WPA2/AES only.  I
> was looking to see what others have done and what challenges you faced in
> making these changes.
>
>
>
> https://discussions.apple.com/thread/251805737
>
>
>
> Thank you
>
> Bruce Entwistle
>
> Network Manager
>
> University of Redlands
>
>
>
> **
> Replies to EDUCAUSE Community Group emails are sent to the entire
> community list. If you want to reply only to the person who sent the
> message, copy and paste their email address and forward the email reply.
> Additional participation and subscription information can be found at
> https://www.educause.edu/community
>


-- 
James Helzerman
Wireless Network Engineer
University of Michigan - ITS
Phone: 734-615-9541

**
Replies to EDUCAUSE Community Group emails are sent to the entire community
list. If you want to reply only to the person who sent the message, copy
and paste their email address and forward the email reply. Additional
participation and subscription information can be found at
https://www.educause.edu/community

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community


Re: [WIRELESS-LAN] Weak Security

2020-12-02 Thread James Helzerman
Hi.  Our first roll out for 802.1x used WPA2 AES and we have had zero
issues.  All clients these days (and for many years) support it.

-Jimmy

--
James Helzerman
Wireless Network Engineer
University of Michigan - ITS

On Tue, Dec 1, 2020 at 9:56 PM Entwistle, Bruce <
0139f1156e70-dmarc-requ...@listserv.educause.edu> wrote:

> Apple devices that are updating to IOS 14 are now reporting that wireless
> security is weak.   We are currently using a combination of WPA/TKIP and
> WPA2/AES for security, but are considering the move to WPA2/AES only.  I
> was looking to see what others have done and what challenges you faced in
> making these changes.
>
>
>
> https://discussions.apple.com/thread/251805737
>
>
>
> Thank you
>
> Bruce Entwistle
>
> Network Manager
>
> University of Redlands
>
>
>
> **
> Replies to EDUCAUSE Community Group emails are sent to the entire
> community list. If you want to reply only to the person who sent the
> message, copy and paste their email address and forward the email reply.
> Additional participation and subscription information can be found at
> https://www.educause.edu/community
>


-- 
James Helzerman
Wireless Network Engineer
University of Michigan - ITS
Phone: 734-615-9541

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community


RE: Weak Security

2020-12-01 Thread Floyd, Brad
Bruce,
We removed TKIP (and WPA) in favor of AES (CCMP) (and WPA2) from all of our 
configs a little over 7 years ago. We faced zero challenges and gained the 
increased connection rates (HT). The IEEE 802.11n standard prohibited using 
high-throuhput if WEP or TKIP is configured. This limited connection rates to 
54 Mbps. The URL is correct, TKIP is weak (and broken).
Thanks,
Brad

From: The EDUCAUSE Wireless Issues Community Group Listserv 
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Entwistle, Bruce
Sent: Tuesday, December 01, 2020 6:14 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Weak Security


[EXTERNAL SENDER]

Apple devices that are updating to IOS 14 are now reporting that wireless 
security is weak.   We are currently using a combination of WPA/TKIP and 
WPA2/AES for security, but are considering the move to WPA2/AES only.  I was 
looking to see what others have done and what challenges you faced in making 
these changes.

https://discussions.apple.com/thread/251805737

Thank you
Bruce Entwistle
Network Manager
University of Redlands


**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community


RE: Weak Security

2020-12-01 Thread Enfield, Chuck
We stopped supporting TKIP years ago.  No issues that I’m aware of.

Chuck Enfield
Manager, Wireless & Cellular
Penn State IT
814-863-8715

From: The EDUCAUSE Wireless Issues Community Group Listserv 
 On Behalf Of Entwistle, Bruce
Sent: Tuesday, December 1, 2020 7:14 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: [WIRELESS-LAN] Weak Security

Apple devices that are updating to IOS 14 are now reporting that wireless 
security is weak.   We are currently using a combination of WPA/TKIP and 
WPA2/AES for security, but are considering the move to WPA2/AES only.  I was 
looking to see what others have done and what challenges you faced in making 
these changes.

https://discussions.apple.com/thread/251805737<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdiscussions.apple.com%2Fthread%2F251805737&data=04%7C01%7Ccae104%40PSU.EDU%7C6c35cd8bde074a78f09c08d896572965%7C7cf48d453ddb4389a9c1c115526eb52e%7C0%7C1%7C637424648389657921%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=J4UUgLhzUijFxAeqdwMmllBh2v7ldMkVX11EUwhw7fo%3D&reserved=0>

Thank you
Bruce Entwistle
Network Manager
University of Redlands


**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at 
https://www.educause.edu/community<https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=04%7C01%7Ccae104%40PSU.EDU%7C6c35cd8bde074a78f09c08d896572965%7C7cf48d453ddb4389a9c1c115526eb52e%7C0%7C1%7C637424648389667917%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=%2FMxKQJqWkI2g3XWWi507GiShJqR%2FjjThb8Ygr5UgjJs%3D&reserved=0>

**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community


Weak Security

2020-12-01 Thread Entwistle, Bruce
Apple devices that are updating to IOS 14 are now reporting that wireless 
security is weak.   We are currently using a combination of WPA/TKIP and 
WPA2/AES for security, but are considering the move to WPA2/AES only.  I was 
looking to see what others have done and what challenges you faced in making 
these changes.

https://discussions.apple.com/thread/251805737

Thank you
Bruce Entwistle
Network Manager
University of Redlands


**
Replies to EDUCAUSE Community Group emails are sent to the entire community 
list. If you want to reply only to the person who sent the message, copy and 
paste their email address and forward the email reply. Additional participation 
and subscription information can be found at https://www.educause.edu/community