Severe flaw in WPA2 - cracked
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-15-2017 11:27 PM
when can we expect to see update for this https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-tra...
153 REPLIES 153
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-16-2017 08:11 AM
I’m sure someone is justifiying a slow response by saying that the client side must also be updated and that Apple and Google have yet to release a fix. To that person I say, provide me with free ongoing support and I will accept that answer.
I selected Ruckus because I wanted premium support when faced with these kinds of issues. I’m not getting that and we all need to pound this thread, email and call until they release a fix. This is not acceptable.
I selected Ruckus because I wanted premium support when faced with these kinds of issues. I’m not getting that and we all need to pound this thread, email and call until they release a fix. This is not acceptable.
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-16-2017 08:12 AM
Still nothing on their security page. Their response to this is a joke.
https://www.ruckuswireless.com/security
https://www.ruckuswireless.com/security
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-16-2017 08:52 AM
If you want a chuckle then email security@ruckuswireless.com and you'll get an Out of Office reply.
Nice to know that security is handled by a single person and that they chose to go on vacation on the day that this vulnerability was to be disclosed.
Ruckus, and other vendors, have known about this vulnerability since July, and also knew well in advance about the disclosure date.
Hi All,
Nice to know that security is handled by a single person and that they chose to go on vacation on the day that this vulnerability was to be disclosed.
Ruckus, and other vendors, have known about this vulnerability since July, and also knew well in advance about the disclosure date.
Hi All,
I will be on PTO from 14-Oct to 23-Oct would have limited accesst to emails / calls. Please expect delays in my responses.
For Security Issues: mail to security@ruckuswireless.com
For any other queries: contact Keshava.Murthy@brocade.com
Regards,
Hemant Bhatnagar
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-17-2017 12:27 PM
Just for kicks and grins, I found his LinkedIn... anyone want to pester him on Vaca? https://www.linkedin.com/in/bhatnagarhemant
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-17-2017 01:51 PM
I had no idea that Ruckus offshored their development. That explains SO MUCH. Cheap bastards. In all my experience with offshore development, there's good tech talent, but they lack a certain amount of imagination. I don't know if that's the result of an education that values STEM above all else or if it's cultural or what, but I can really see the attitudes I've encountered with Indian devs ("well what user would do that? that makes no sense, don't worry!") being terrible with security ("who would send THAT packet? That's crazy! we're following the spec, go away!").

