<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic When will we be able to disable EAPOL retries per SSID to protect unpatched 
devices against KRACK? in Unleashed</title>
    <link>https://community.ruckuswireless.com/t5/Unleashed/When-will-we-be-able-to-disable-EAPOL-retries-per-SSID-to/m-p/8528#M538</link>
    <description>When will we be able to disable EAPOL retries to protect unpatched devices from KRACK?&lt;BR /&gt;&lt;BR /&gt;People can do this on&amp;nbsp;Cisco APs:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://blogs.cisco.com/security/wpa-vulns" rel="nofollow" target="_blank" title="Link: https://blogs.cisco.com/security/wpa-vulns"&gt;https://blogs.cisco.com/security/wpa-...&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Even cheap APs running LEDE support this:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://git.lede-project.org/?p=source.git;a=commit;h=d501786ff25684208d22b7c93ce60c194327c771" rel="nofollow" target="_blank" title="Link https//gitlede-projectorg/psourcegitacommithd501786ff25684208d22b7c93ce60c194327c771"&gt;https://git.lede-project.org/?p=sourc...&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;It is ridiculous that devices connected to a $50 Linksys would be more secure than devices connected to a $1000 Ruckus.&lt;BR /&gt;
I know that the WIPS helps, but that only checks every N seconds. That gives plenty of time for exploit scripts to run and penetrate deeper. I can imagine my wireless smart outlets being manipulated to run up electric bills, among other nefarious things.&lt;BR /&gt;&lt;BR /&gt;Do I really need to deploy a $50 Linksys running third party firmware to protect my vulnerable devices?

If Ruckus either cannot or will give us this mitigation, could it at least enable a competent third party like LEDE to provide firmware for their APs? Management would be a pain, but at least the connected client devices would be secure.</description>
    <pubDate>Thu, 30 Nov 2017 20:30:13 GMT</pubDate>
    <dc:creator>shiningarcanine</dc:creator>
    <dc:date>2017-11-30T20:30:13Z</dc:date>
    <item>
      <title>When will we be able to disable EAPOL retries per SSID to protect unpatched 
devices against KRACK?</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/When-will-we-be-able-to-disable-EAPOL-retries-per-SSID-to/m-p/8528#M538</link>
      <description>When will we be able to disable EAPOL retries to protect unpatched devices from KRACK?&lt;BR /&gt;&lt;BR /&gt;People can do this on&amp;nbsp;Cisco APs:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://blogs.cisco.com/security/wpa-vulns" rel="nofollow" target="_blank" title="Link: https://blogs.cisco.com/security/wpa-vulns"&gt;https://blogs.cisco.com/security/wpa-...&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Even cheap APs running LEDE support this:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://git.lede-project.org/?p=source.git;a=commit;h=d501786ff25684208d22b7c93ce60c194327c771" rel="nofollow" target="_blank" title="Link https//gitlede-projectorg/psourcegitacommithd501786ff25684208d22b7c93ce60c194327c771"&gt;https://git.lede-project.org/?p=sourc...&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;It is ridiculous that devices connected to a $50 Linksys would be more secure than devices connected to a $1000 Ruckus.&lt;BR /&gt;
I know that the WIPS helps, but that only checks every N seconds. That gives plenty of time for exploit scripts to run and penetrate deeper. I can imagine my wireless smart outlets being manipulated to run up electric bills, among other nefarious things.&lt;BR /&gt;&lt;BR /&gt;Do I really need to deploy a $50 Linksys running third party firmware to protect my vulnerable devices?

If Ruckus either cannot or will give us this mitigation, could it at least enable a competent third party like LEDE to provide firmware for their APs? Management would be a pain, but at least the connected client devices would be secure.</description>
      <pubDate>Thu, 30 Nov 2017 20:30:13 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/When-will-we-be-able-to-disable-EAPOL-retries-per-SSID-to/m-p/8528#M538</guid>
      <dc:creator>shiningarcanine</dc:creator>
      <dc:date>2017-11-30T20:30:13Z</dc:date>
    </item>
    <item>
      <title>Re: When will we be able to disable EAPOL retries per SSID to protect unpatched 
devices against KRACK?</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/When-will-we-be-able-to-disable-EAPOL-retries-per-SSID-to/m-p/8529#M539</link>
      <description>Hello Richard,&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;Please see most recent update details on our WPA2 KRACK Support resource center page:&lt;BR /&gt;&lt;A href="https://support.ruckuswireless.com/krack-ruckus-wireless-support-resource-center" rel="nofollow"&gt;https://support.ruckuswireless.com/krack-ruckus-wireless-support-resource-center&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;and in the Release Notes for KRACK Vulnerabilty Fix:&lt;BR /&gt;&lt;A href="https://support.ruckuswireless.com/documents/2065-smartzone-release-notes-for-krack-vulnerability-fix" rel="nofollow" target="_blank"&gt;https://support.ruckuswireless.com/documents/2065-smartzone-release-notes-for-krack-vulnerability-fi...&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;pointing CUs to the SZ 3.1.2 - 3.6 Software Release AP CLI Scripts (WPA2 KRACK patch):&lt;BR /&gt;&lt;A href="https://support.ruckuswireless.com/software/1487-smartzone-3-1-2-3-6-software-release-ap-cli-scripts-wpa2-krack-patch" rel="nofollow" target="_blank"&gt;https://support.ruckuswireless.com/software/1487-smartzone-3-1-2-3-6-software-release-ap-cli-scripts...&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Which allow you to disable EAPOL retries, and protect non-updated clients.</description>
      <pubDate>Thu, 30 Nov 2017 21:18:03 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/When-will-we-be-able-to-disable-EAPOL-retries-per-SSID-to/m-p/8529#M539</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2017-11-30T21:18:03Z</dc:date>
    </item>
    <item>
      <title>Re: When will we be able to disable EAPOL retries per SSID to protect unpatched 
devices against KRACK?</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/When-will-we-be-able-to-disable-EAPOL-retries-per-SSID-to/m-p/8530#M540</link>
      <description>I am running Ruckus unleashed, which is why I marked this post as applying to Ruckus unleashed. How do the scripts for smart zone apply to that?</description>
      <pubDate>Thu, 30 Nov 2017 22:02:07 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/When-will-we-be-able-to-disable-EAPOL-retries-per-SSID-to/m-p/8530#M540</guid>
      <dc:creator>shiningarcanine</dc:creator>
      <dc:date>2017-11-30T22:02:07Z</dc:date>
    </item>
  </channel>
</rss>

