If you’ve ever used the wireless in a public place, you know how easy it is to grab information during the initial wireless handshake between the client and the AP. With WPA2, this handshake isn’t secure with open wireless networks. With the advent of WPA3, there is a new option for open networks – OWE, or Opportunistic Wireless Encryption.
Rowell Dionicio takes a quick look at how OWE is going to help with securing the communications between AP and client. He’s got some great packet captures showing how the whole exchange works and how the encryption happens transparently to the client. As Rowell says here:
Guest enterprise networks can feel more safe when browsing the web. Public spaces are less susceptible to sniffing since traffic is encrypted. Even the coffee shop can be safer. Remember the days of Firesheep? A Firefox browser extension allowed someone to hijack someone else’s Facebook, Amazon, and Twitter accounts. This was done over an open Wi-Fi connection.
Read more: Securing Open WiFi with OWE
- Design: Is It One Site or Two? - October 15, 2019
- Investing in the CWNE - October 15, 2019
- Wi-Fi6 Ratification: Not So Fast My Friend - October 14, 2019
- Connectivity Solved with Aryaka - October 11, 2019
- All-In on AI With Mist and Juniper - October 10, 2019
- Firefox DNS-over-HTTPS for the Enterprise - October 9, 2019
- When Is Something SD-WAN? - October 8, 2019
- Supply-Chain Security and Trust - October 3, 2019
- Using SD-WAN to Unify Communications with NEC and InfoVista - October 3, 2019
- Customer FAQ: Is NAT Security? Should I Remove My Public IPv4 From My Internal Network? - October 1, 2019