WPA Encryption Cracked In 60 Seconds 322
carusoj writes "Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute. Last November, security researchers first showed how WPA could be broken, but the Japanese researchers have taken the attack to a new level. The earlier attack worked on a smaller range of WPA devices and took between 12 and 15 minutes to work. Both attacks work only on WPA systems that use the Temporal Key Integrity Protocol (TKIP) algorithm. They do not work on newer WPA 2 devices or on WPA systems that use the stronger Advanced Encryption Standard (AES) algorithm."
Cool (Score:2, Funny)
Re:Cool (Score:5, Insightful)
Re:Cool (Score:4, Funny)
Re:Cool (Score:4, Interesting)
I do the same but I have a coovaAP set up for the roaming to snag free WiFi near my home.
Keeps people out of my junk, and I can limit what they can do.
Re:Cool (Score:4, Funny)
I prefer to be sure that it is not safe than believe it is :)
"I'm safe. My secure wireless router is no where near Japan. There's no way they can pick up signals from me."
(This came from a guy who would only buy American electronics, because he really didn't want to watch Japanese game shows and doesn't speak Japanese, Thai. or Korean.)
Re: (Score:3, Interesting)
Actually no.
From wikipedia [wikipedia.org]:
About 70% of the people in Taiwan belong to the Hoklo ethnic group and speak both Standard Mandarin (officially recognized by the ROC as the National Language) and Taiwanese Minnan (commonly known as "Taiwanese"
Comment removed (Score:4, Insightful)
How about free secure wireless? (Score:2, Troll)
WiFi security is pretty dismal.
There's nothing at the level of https - where users can have confidential connections without messing about too much - no need even for "username and password".
With WiFi, either users have zero security, or they have to enter a username and password (and possibly jump through other hoops
Re: (Score:2)
Someone explained to me a good way which required 3 wireless routers...
I've long since forgotten what he said... pity that.
Re: (Score:2)
You only really need two...
1) Set up router A as an open access point and have it connect to your ISP
2) Set up router B as a private, secure access point
3) Hook up the rest of your network to router B
4) Set up router A to give traffic from B priority over any other traffic
5) Have router B connect to router A.
Secure for you and free for anybody that wants to use it.
Re:How about free secure wireless? (Score:4, Interesting)
And don't forget to set them for different channels.
Alternately, if you run dd-wrt, you can try setting up mutltiple virtual wireless networks [dd-wrt.com] and have them broadcast separate SSIDs [pennock.nl] so it looks like you've got two routers.
Re: (Score:2)
Re: (Score:2)
The only way I can think of doing it would be setting up two routers, one open with no security which hands out certificates or credentials access to the second which is secure, something like registering RADIUS credentials.
The way https works is by having certificates already install on the computer which say "I trust verisign" and then verisign signs the web site owners certificates. So there was fuss on the client, only not for the user, the fuss was done by the browser creators. You'd need a more sophis
Re: (Score:2)
Re: (Score:2)
Or...you can have some fun and USE WiFi to cause your own MITM [youtube.com] attacks...
Re:How about free secure wireless? (Score:4, Insightful)
As they say, locks are only good for honest people.
The main reason you want a strong lock is not because they're unbreakable, but because your neighbor should be the easier target.
Re:How about free secure wireless? (Score:5, Funny)
Re:How about free secure wireless? (Score:5, Funny)
Take that however you will.
Re: (Score:2)
Ah - the "If you want to outrun a bear, the key is not to outrun the bear - it's to outrun the person behind you" principle.
If you gain enough speed, you will also outrun the bear. The fact that others don't is not your concern in this context, and there's nothing you can do about it anyway.
Wardriving? (Score:2)
A return to the old wardriving days of yore?
Secure protocols for home wifi? (Score:4, Interesting)
Re:Secure protocols for home wifi? (Score:5, Informative)
This list [dd-wrt.com] is still accurate, if you apply the comment on #4 up to #5 as well.
And run DD-WRT.
Re:Secure protocols for home wifi? (Score:5, Informative)
It's probably not so much a matter of what base crypto they're using (a la AES, SHA, etc) but how they're implementing the key exchange when negotiating the connection. Implement good crypto wrong and you open the door. Initial negotiations between parties is a tricky, multistep affair for good security, to prevent MITM.
Re: (Score:2)
There's no mention of how this interacts with 802.1x authentication. For my WIFI network it's WPA with TKIP, but then you have to authenticate before you can talk which requires a certificate be installed on the machine. I have a group policy which grants all domain computers a key which they can't export. It's hard to tell if this extra step makes my wifi world a safer place or if they can just sniff that too.
Of course enough devices support WPA2 with AES now that I can probably switch the private wifi ov
Re:Secure protocols for home wifi? (Score:5, Insightful)
Wired ethernet. Not only is it vastly more secure, it's also an order of magnitude or two faster than wireless.
Re:Secure protocols for home wifi? (Score:5, Funny)
No wireless? Lame.
Re: (Score:2)
Not only is it vastly more secure, it's also an order of magnitude or two faster than wireless.
Really? Please show me this consumer-available wired ethernet that runs at 10 gigabit.
Re:Secure protocols for home wifi? (Score:5, Insightful)
Re: (Score:2)
Some people actually do stuff on their LAN.
Re:Secure protocols for home wifi? (Score:5, Informative)
When your options for your internet connection top out below 10mbps, does it matter that your LAN can only do 22? Or 144?
Yes, it matters.
It might not be needed for you, if all you use your PCs for is to use the internet, but not talk to each other heavily.
Others however have an internal autonomous network of machines that all talk to each other and only occasionally out to the internet.
Running a fileserver to play videos on your multiple entertainment PC devices on TVs, tossing large files around, running onsite+online backups... None of those things need an internet connection at all to do, yet there is a slight noticeable difference between doing them at 11mbit and doing them at 1000.
Re: (Score:2)
"I challenge you to show me an internet connection or even a hard drive that can get anywhere near a gigabit of throughput."
Book a flight to Amsterdam and I'll show you my Intel consumer SSD that runs at 250 MB/s *continuously*. In a cheap laptop with gigabit LAN. Or of course my RAM drive where I unzip movies to.
Besides, there is such a thing called latency, which I like to be low for any kind of application. Speed helps for that.
Re: (Score:2)
There's also 300MBit 802.11n wireless - just don't go expecting 300mbps of actual throughput. If it's anything like 802.11g, it'll probably hit 30-60% of that... 10-20% if you're unlucky enough to live in an area so densely populated with WiFi that there's no free non-overlapping frequencies.
Re: (Score:3, Informative)
Re: (Score:2)
I know! It makes you wonder what reason someone would have for prefering wireless, doesn't it. I mean, I can't think of a single advantage; can you?
;-)
For those with Aspergers or other difficulties picking up on these kind of things, I am being completely, 100%, totally, absolutely facetious
Re: (Score:2)
For those with Aspergers or other difficulties picking up on these kind of things, I am being completely, 100%, totally, absolutely facetious ;-)
Fortunately, it's easy to multitask facetiousness sitting outside on the desk with your laptop and a parasol in your drink.
Few of the reasons for wireless involve a sustained effort to get some real work done, unless your portable setup involves dual displays at eye level with the keyboard at elbow level.
For a lot of people a wireless router is the indoor complement of taking your textbooks on a beach vacation, for those who can't handle being 100% certain which one they're doing.
Re: (Score:2)
s/desk/deck
My turlexia is acting up again: replacing current words with prospective future words.
Re: (Score:2)
Did you know - the ethernet protocol works on Cat5 cable that hasn't been run past spiders! The spiders are actually deprecated now, sort of like the old vampire taps. Your network is vampire-free, right?
Re: (Score:3, Funny)
No spiders? That's madness! Who will fix the Web when it breaks?
Re: (Score:2)
Both attacks work only on WPA systems that use the Temporal Key Integrity Protocol (TKIP) algorithm. They do not work on newer WPA 2 devices or on WPA systems that use the stronger Advanced Encryption Standard (AES) algorithm.
Re: (Score:3, Insightful)
> They do not work on...
Yet.
I'm safe. (Score:5, Funny)
Re: (Score:2)
It was written for publication by The Maximegalon Institute of Slowly and Painfully Working Out the Surprisingly Obvious.
You don't want to know how the acronym is spelled in the Maximegalon native tongue.
Re:I'm safe. (Score:4, Informative)
Nintendo loves the ancient concept of having games statically link the system libraries and drivers (they still do that, even for the Wii). That's the reason - each WiFi-enabled game includes a copy of the WiFi setup screen and talks directly to the hardware. They've (shortsightedly) defined the DS hardware to support WEP only, and they can't change that now without breaking existing software.
I've already ranted about this before. Basically, Nintendo has locked themselves out of practically any update or improvement on both the DS and Wii fronts. For example, they will never be able to improve upon the Wii home menu, since a copy of it is bundled with every game and they can't replace it. The only exception to this rule are the IOS drivers for Wii titles, which are upgradable, but they make up for that by using retardedly low-level interfaces for them and apparently having policies in place of never touching existing versions of IOS except for security purposes (i.e. closing exploits). This is, say, why a system-level all-game background WiiSpeak VoIP will never, ever happen.
The rat race continues.. (Score:3, Insightful)
The question is can anything be secure in the long term if an attacker can monitor the conversation between alice and bob 24/7? Sometimes a bit of obscurity can go a long way. Good luck trying to sniff my shielded network cables. Yes, I've heard the tempest stories but I'm jumping to the conclusion that those techniques are only available to big $$ governements institutions and are not used by the random drive-by hacker (yet..)
Re: (Score:2)
Well, yeah. That's the whole point of protocols like SSL, and tools like GPG. Though they're not magical and you need to pay attention and not blindly click "Ok" to every self-signed cert.
Re: (Score:2)
Re:The rat race continues.. (Score:4, Insightful)
Knowing exactly how your cables are shielded doesn't help me snoop on anything passing through those cables.
Re: (Score:3, Insightful)
That's not a very intelligent question. Obviously, OTP can be secure in the long term for any definition of long term. Public key cryptography has always been secure, and probably will be until really really good quantum computers are developed. Symmetric key crypto is as secure as ever, and there's no indication this will change soon. Some cryptographic hash algorithms are less useful today, but most are still more than good enough.
So, yes, crypto can certainly be "secure" in the long term. Protocols with
Re: (Score:2)
Re:The rat race continues.. (Score:5, Insightful)
Actually, it is a mathematical fact that OTP is perfectly unbreakable. P=NP doesn't enter into it.
Re: (Score:2)
Only with sufficiently good random number generation.
Re: (Score:2)
True, but for practical purposes, it doesn't even have to be random. It just has to be unpredictable to your attacker ;-)
Re:The rat race continues.. (Score:5, Insightful)
Re: (Score:2)
So, you use your last OTP encoding to transfer the new set of pads securely?
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Or to be more specific:
Let's call the first OTP P1 and the new one P2.
We encrypt Message M1 with P1 by using M1^P1, then we send the new Pad P2 as P1^P2. Finally we send M2 encrypted with P2.
To guess a part of M2 with a known part of M1, you just do:
(M1^P1)^(P1^P2)^(P2^M2), and you get M1^(P1^P1)^(P2^P2)^M2 = M1^M2.
So each part of M1 you already know reveals a part of M2.
Re: (Score:2)
Fun fact: In one of Vernor Vinge's books, all crypto is cracked, so one of the big-money industries is in shipping OTP datasets across the universe. How cool is that?
Re:The rat race continues.. (Score:5, Insightful)
Oh, fer crying out loud, if you're going to use wikipedia notation, at least *check* wikipedia first [wikipedia.org]:
The Vernam-Mauborgne one-time pad was recognized early on as difficult to break, but its special status was only established by Claude Shannon some 25 years later. He proved, using information theory considerations, that the one-time pad has a property he termed perfect secrecy; that is, the ciphertext C gives absolutely no additional information about the plaintext
Re: (Score:3, Informative)
The question is can anything be secure in the long term if an attacker can monitor the conversation between alice and bob 24/7?
Yes. It's a basic assumption in communication security that your communication medium is insecure and can be monitored or modified at will by an attacker.
You can design an authentication/key exchange protocol so that the only way to access the data is to break the encryption algorithm, or via social engineering.
You can design an encryption algorithm so that it cannot be broken excep
Re: (Score:3, Insightful)
No, you can't guarantee it's secure.
I meant what I said and I said what I meant.
A perfect implementation with a mathematically secure algorithm can be broken over time.
You're absolutely right, over an arbitrary amount of time it can be broken. But you can make make mathematical statements about the average complexity of doing so. You can then get a good idea of what key size you need to make it secure in the long term for whatever definition of "long term" suits your purpose, just by making a few basic as
Re: (Score:2, Informative)
"Shielded Network Cables"
have virtually no impact on emissions from the cable, and do have no impact if your equipment doesn't have shielded connectors which is unlikely, a shield that is not properly grounded will create higher emissions and increase external noise pickup. Shielding on Ethernet cables is to limit noise going into the wire, and is only effective at lower frequencies, its mostly for keeping 50/60Hz mains noise off the wires.
You could install ferrites on the cable to limit common mode noise
Time to start working on WPA3? (Score:4, Interesting)
So, does this mean it's time to start working on whatever the replacement will be for WPA2? WPA is broken. . . but at least we can use WPA2 (for now). I'm guessing WPA2 will someday be broken, so we need to have something to replace it which has not (yet) been broken. Seems like wireless security rests on a never-ending game of move the goal, before the goal is reached (where the 'goal' for crackers is to crack the 'current' security protocol).
Although, thinking about this more, it makes me wonder - does anyone ever 'record' encrypted traffic from targets of interest, in the hopes that, maybe right now they can't crack it, but maybe in 2 or 3 years, they'll be able to crack it, and if they have a 'recording' of the cyphertext, which they can later decrypt, they can get possibly interesting info/data (data could very easily still be useful and interesting 3 or 5 years from now, particularly things like state/corporate secrets, but even more mundane info like people's social security numbers, answers to online password 'reset' security questions, etc).
I suppose that if I could think of it, someone else already has, and already is doing it.
So, from that standpoint, even if the security researchers stay 'ahead' of the blackhats, the blackhats can still get useful info within a relatively useful amount of time. Just because you've upgraded to WPA2 or WPA+AES, doesn't mean you're completely protected, if someone snagged encrypted traffic in the past which was 'secured' by TKIP.
Re: (Score:2, Informative)
How does the VPN help? (Score:3, Interesting)
Are you *positive* that the VPN connection is uncrackable? If it's going over wireless, then if someone is recording the cyphertext, they will be able to recover the VPN cyphertext out of the WPA cyphertext. If they then know of a way to recover the 'cleartext' from the VPN cyphertext, then you are still leaking your data. If the VPN system is so secure, why aren't we using it for the wireless connection? That is, make the wireless network a VPN using the same algorithms you use for your VPN?
Re:How does the VPN help? (Score:5, Insightful)
Are you *positive* that the VPN connection is uncrackable? If it's going over wireless, then if someone is recording the cyphertext, they will be able to recover the VPN cyphertext out of the WPA cyphertext. If they then know of a way to recover the 'cleartext' from the VPN cyphertext, then you are still leaking your data. If the VPN system is so secure, why aren't we using it for the wireless connection? That is, make the wireless network a VPN using the same algorithms you use for your VPN?
While I am not commenting on the security or lack of security in a VPN connection, I believe I can answer this. The simple fact is, most routers can't handle the encryption load of a full blown VPN, especially one with multiple users. Even dedicated routers that are made to handle this can only handle 5 or 10 at a time until you start plopping down the big bucks for the serious VPN routers.
So using VPN level of encryption on a home router is not going to happen until processing power is increased dramatically on the cheap CPUs they use.
Re:How does the VPN help? (Score:4, Informative)
Are you *positive* that the VPN connection is uncrackable?
No, and nobody ever is. Which is why security protocols are so conservatively deployed. Protocols are proposed and analyzed by lots of people who are (hopefully) much smarter than you or I. Protocols that withstand years of this scrutiny and review are slowly trusted more and more (EG: SSL) over other protocols that get picked apart. (like WEP)
If it's going over wireless, then if someone is recording the cyphertext, they will be able to recover the VPN cyphertext out of the WPA cyphertext. If they then know of a way to recover the 'cleartext' from the VPN cyphertext, then you are still leaking your data.
This whole paragraph makes no sense at all, and makes it clear that you do not understand encryption, especially dual-key cryptography. Please RTFM.
If the VPN system is so secure, why aren't we using it for the wireless connection? That is, make the wireless network a VPN using the same algorithms you use for your VPN?
WEP, WPA, and AES are protocols that logically establish a sort of Virtual Private Network on otherwise public radio waves. The main difference between these protocols and a true VPN is that they aren't layered on top of IP, like a VPN, but are instead layered on the datagram protocol of the radio signal itself. The problem is that WEP was quickly implemented and was never really peer reviewed. Thus, it had numerous flaws that were discovered very quickly.
From a security standpoint, WEP is sort of like locking your ground-floor window. It allows you to announce your intention of privacy, but it's quite easily compromised by somebody with the digital equivalent of the nearest rock.
Re: (Score:2)
Perhaps you just didn't understand the paragraph. The post I was responding to suggested layering a
Re: (Score:2)
I route my OpenVPN traffic through an SSH port forward routed through an OpenVPN connection routed through an SSH port forwarded connection routed through an OpenVPN connection routed through an SSH port forwarded connection routed through an OpenVPN connection routed through an SSH port forwarded connection routed through an OpenVPN connection routed through an SSH port forwarded connection routed through an OpenVPN connection routed WEP.
Re: (Score:2)
>If they then know of a way to recover the 'cleartext' from the VPN cyphertext
Thats quite a jump. I'd like to see some cites that IPSEC cracking is this easy. The idea behind VPN is that, yes, your potential attackers can see all the cyphertext they want, but cannot decypher or compromise the tunnel (outside a DDOS).
Re: (Score:2)
Re: (Score:2)
Don't forget that both WEP and WPA/TKIP are using proprietary algorithms and stream ciphers. Using proprietary crypto has always been a bad thing, and using it with a stream cipher is worse. WEP/WPA failing so fast does not mean that WPA2 using the much safer AES standard (in a security proven mode) should fail as fast.
If you look at the Wikipedia site you can quickly see that TKIP was implemented for easy upgrades of WEP. Seems they took it a bit too easy.
Re: (Score:2)
Don't forget that both WEP and WPA/TKIP are using proprietary algorithms and stream ciphers. Using proprietary crypto has always been a bad thing, and using it with a stream cipher is worse.
The real problem with proprietary ciphers is that they are usually secret black boxes. RC4 may be proprietary but it is no more secret than say, CSS. The difference is CSS was revealed to be crap where RC4, even after it was "outed" was found to be pretty decent for its time. I definitely agree that proprietary ciphers that aren't open for review shouldn't be trusted for anything, but that's really not relevant to problems with RC4 in WEP/WPA. RC4 had a good run but is showing its age, so it's time to move
Re:Time to start working on WPA3? (Score:5, Interesting)
Although, thinking about this more, it makes me wonder - does anyone ever 'record' encrypted traffic from targets of interest, in the hopes that, maybe right now they can't crack it, but maybe in 2 or 3 years, they'll be able to crack it, and if they have a 'recording' of the cyphertext, which they can later decrypt, they can get possibly interesting info/data (data could very easily still be useful and interesting 3 or 5 years from now, particularly things like state/corporate secrets, but even more mundane info like people's social security numbers, answers to online password 'reset' security questions, etc).
One of the parts of Neal Stephenson's "Cryptonomicon" I enjoyed the most was when one character sent another character a message encoded with, as I recall, 4096-bit security, and the character receiving it, while his computer was decoding it, went through the mental gymnastics of comparing the speed of prime factoring algorithms, taking into account Moore's Law and how many new computers were coming online, to conclude that whatever was in the message, it was meant to stay secret for at least 40 years, as opposed to the sender's usual 10 year threshold, making the recipient particularly nervous about the contents.
Re: (Score:2)
yep.... (Score:2, Funny)
That's why I don't even bother with passwords on my wireless at ... Hello Friends! Please to hand over your credit and debit card informations at this time, I am thanking you not a lot. My name is Desmund Boutrous-Boutrous Gali Johnson IV and I have some news of the not so happy sort. Your uncle, and my business mentor and/or friend, McGuyver has been known to be passed away at this time going forth.
Please to send me monies by any means as possible soonest.
Wamerst thoughts and heated Regards, BBGIV
(that'
As usual (Score:5, Informative)
And the most important piece of information comes at the very end of the summary (just not to diminish the sensation or prevent FUD):
They do not work on newer WPA 2 devices or on WPA systems that use the stronger Advanced Encryption Standard (AES) algorithm.
It wasn't broken (Score:5, Informative)
Re: (Score:3, Insightful)
They've found a way to decrypt TINY packets only a few bytes long (like ARP) and inject fake ones of the same length.
So no real traffic sniffing, and definitely no WPA key recovery.
I cant see really how this would be a useful tool in aircrack as you have no way of doing anything else with the network!
Wireless Routers (Score:2, Informative)
Minor nitpick with the article: WPA is a general wireless security protocol[1] which isn't limited to wireless routers. Regular APs (Access Points) use it, as of course do wireless clients.
[1] Actually, to nitpick myself, WPA isn't even technically a protocol, it's a certification program which confirms that particular devices implement the IEEE 802.11i standard
hacked in 60 seconds... (Score:2)
Experiences (Score:2)
After spending some time working with crappy home routers, I've decided encryption isn't worth the hassle. If I want to ensure my communication isn't intercepted by a hostile third party, I'll use a wire instead. If I want to limit access to the internet, I'll use a MAC ACL instead. The routers aren't hefty enough to deal with anything more than light surfing with encryption active.
Re: (Score:2, Insightful)
What? A 7 year old Linksys WRT54G can handle 24-30Mbps with AES encryption, current versions are even faster, and if you choose wisely you can find 80-90Mbps home routers from Dlink/Netgear today.
These routers are more than adequate for more than "light surfing".
Re: (Score:2)
Sure, it can handle it, but it can't handle it well. Connections start bugging out and eventually you end up with problems.
Horribly engineered devices, consumer wireless routers.
I was having continuous problems doing simple things like trying to watch streaming video with my old dl-514 with any sort of encryption enabled. Multiple firmwares didn't resolve the problem completely, so I tried removing encryption and using access control lists to prevent casual unauthorized use. Right away I found a much more s
Re: (Score:2)
Most of the models of the era are bad. I had a few brands, and it wasn't common to find much stability.
Re: (Score:2)
Trivial on a lot of platforms to MAC spoof, so your ACL won't do anything for you security-wise against anybody that knows what they're doing.
I have a better security... (Score:5, Funny)
I just made my SSID "Logon for only $3.99 per minute"
Haven't ever seen my neighbors log on even once.
_
Not new (Score:5, Informative)
TKIP was fundamentally broken, by design. We knew that. TKIP was invented as an intermediate encryption that could run on the same hardware that WEP ran on. It allowed router manufacturers to use something better than WEP without having to beef-up their hardware. It worked well, and bought several years before it was completely broken. Anyone who has a router using TKIP bought at a bad time, and is stuck with something that's only a little better than WEP. The solution is to buy a router that supports WPA2, which has real AES encryption.
Other protocols available (Score:5, Informative)
TKIP (Timed Key Interchange Protocol, for those who don't know) does have a weak spot. This is that the new key is sent out from the access point on a regular basis. Cisco's implementation (supported by most companies that supply 802.11a equipment) makes two changes. One is that the time value set is a maximum value (the key change interval is actually random). The other is that the new key is sent via the encrypted session. You therefore have to have cracked the old key to receive the new key.
It will be interesting to see if that is discussed when the paper is presented.
Re:How Long? (Score:5, Informative)
Backtrack really doesn't "do" anything, it's just an awesome integration of separate tools.
aircrack is the base package that would most probably implement this.
Re: (Score:2, Informative)
Manpages.
Re: (Score:2, Troll)
If you are too oblivious to be able to look up the documentation for whatever individual security tools you want to use, then you probably have no business using them in the first place.
Re: (Score:2)
There's tons of info out there.
Heck, start with youtube. Look for an earlier post I did where I threw in a sample link to a video showing SSL MITM and DNS spoofing...
Re:so, uh, (Score:4, Informative)
Re: (Score:2, Informative)
Re: (Score:2)
Re:mac address whitelist filters? (Score:4, Informative)
MAC filters are worthless, always have been (it's trivial to change the MAC on a device to a whitelisted one). And I don't see any evidence that WPA2/AES is "fast becoming insecure", as this attack specifically doesn't work against that setup.
Re: (Score:2, Insightful)
Sneakernet key exchange? (Score:2)
n/t
Re: (Score:2)
There is always WPA2-Enterprise which requires a RADIUS server. The advantage is that there is no need to worry about one "master" key. The disadvantage is that if a username/password combination is guessed, one can get on the network.
Re: (Score:2)
The disadvantage is that if a username/password combination is guessed, one can get on the network.
Isn't that generally a problem with any system?
Still, WPA2 w/RADIUS can be smart card enabled, so that helps.