If you’ve ever used the wireless in a public place, you know how easy it is to grab information during the initial wireless handshake between the client and the AP. With WPA2, this handshake isn’t secure with open wireless networks. With the advent of WPA3, there is a new option for open networks – OWE, or Opportunistic Wireless Encryption.
Rowell Dionicio takes a quick look at how OWE is going to help with securing the communications between AP and client. He’s got some great packet captures showing how the whole exchange works and how the encryption happens transparently to the client. As Rowell says here:
Guest enterprise networks can feel more safe when browsing the web. Public spaces are less susceptible to sniffing since traffic is encrypted. Even the coffee shop can be safer. Remember the days of Firesheep? A Firefox browser extension allowed someone to hijack someone else’s Facebook, Amazon, and Twitter accounts. This was done over an open Wi-Fi connection.
Read more: Securing Open WiFi with OWE
- Moving Past The Edge with Aruba SD-Branch - February 26, 2020
- Does SPB Mean “Secure Path Bridging”? - February 12, 2020
- Cloud Isn’t Your Key To Compliance - February 10, 2020
- Breaking IoT Security - February 7, 2020
- Answers at Your Fingertips with Forward Networks - February 4, 2020
- Priming Your Application Performance with Intel Application Device Queues - January 29, 2020
- Is Cisco SD Access Intent Based Networking? - January 28, 2020
- Captivating Wireless Connectivity with Cisco OpenRoaming - January 22, 2020
- Does the Apple Airport Extreme Use VLANs? - January 21, 2020
- Predicting Data Patterns with Cradlepoint - January 16, 2020