Michael, maybe you can clear up some confusion for me on this. In the bulletin above, Ruckus is saying: "No Ruckus products are affected unless deployed in Mesh or Point-to-Point topologies, or
802.11r is enabled."
However, a blog post, also from Ruckus, says the following:
- Vulnerabilities exist on both sides of the 4-way handshake relationship (client and AP) and both sides need to be patched.
- Until client vendors provide updates, disabling 802.11r can help mitigate the attack by eliminating one source of vulnerability (Fast BSS Transitions, otherwise known as 802.11r roaming).
Does turning off 802.11r mitigate the issue, or does it eliminate the issue? Semantics, but extremely important semantics.
If vulnerabilities exist on both sides of the 4-way handshake, and vendors need to patch them to make them secure (and Ruckus uses WPA)... ??? The blog post and the official statement appear to be contradicting each other. I'd prefer NOT to go back and tell my bosses that I was wrong with what I told them last night.
Thanks,