<div dir="ltr"><div>Thanks for that Paul, another job to add to the list :)</div><div> </div><div>Regards</div><div>Jason A Reid</div></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Tue, Jan 8, 2013 at 7:39 AM, Paul Gear <span dir="ltr"><<a href="mailto:ausnog@libertysys.com.au" target="_blank">ausnog@libertysys.com.au</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div text="#000000" bgcolor="#FFFFFF"><div class="im">
<div>On 01/07/2013 10:01 PM, Jason Reid
wrote:<br>
</div>
<blockquote type="cite">
<div dir="ltr">Interesting that TKIP support is an issue - some of
our older WAPs with TKIP only are having issues with
iphone/ipads only (wintel/androids ok)...</div>
<div class="gmail_extra"><br>
<br>
<div class="gmail_quote">
On Mon, Jan 7, 2013 at 4:53 PM, Thomas Jackson <span dir="ltr"><<a href="mailto:thomas@thomax.com.au" target="_blank">thomas@thomax.com.au</a>></span>
wrote:<br>
<blockquote class="gmail_quote">
A colleague was talking about this the other day -
apparently they had some<br>
iPad 2 units working perfectly until upgrading them and
their new iPhone 5s<br>
wouldn't connect at all.<br>
<br>
In the end, he found out that TKIP support (which is what
their APs were<br>
configured to use) seems to have vanished, and AES was the
only supported<br>
cipher. After swapping over, suddenly everything started
working again.<br>
</blockquote>
</div>
</div>
</blockquote>
<br></div>
I'm surprised it works at all. The IEEE and the Wi-Fi Alliance
deprecated it starting from 2009. [1] There were attacks published
against TKIP with WPA [2] [3], and my understanding is that these
were later extended to work against the WPA2 version of TKIP as well
(although i haven't managed to find the reference).<br>
<br>
Turning off TKIP in all equipment that supports it (and replacing
equipment that doesn't) is the only viable course of action, IMO.<br>
<br>
Regards,<br>
Paul<br>
<br>
[1] <a href="http://en.wikipedia.org/wiki/Temporal_Key_Integrity_Protocol" target="_blank">http://en.wikipedia.org/wiki/Temporal_Key_Integrity_Protocol</a><br>
[2]
<a href="http://jwis2009.nsysu.edu.tw/location/paper/A%20Practical%20Message%20Falsification%20Attack%20on%20WPA.pdf" target="_blank">http://jwis2009.nsysu.edu.tw/location/paper/A%20Practical%20Message%20Falsification%20Attack%20on%20WPA.pdf</a><br>
[3]
<a href="http://www.networkworld.com/news/2009/082709-new-attack-cracks-common-wi-fi.html" target="_blank">http://www.networkworld.com/news/2009/082709-new-attack-cracks-common-wi-fi.html</a><br>
</div>
<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br><br clear="all"><br>-- <br>Jason Reid
</div>