From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.selwastor.com (mail.selwastor.com [192.241.231.50]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by huchra.bufferbloat.net (Postfix) with ESMTPS id 1906821F52C for ; Wed, 17 Jun 2015 15:31:04 -0700 (PDT) Received: from [192.168.3.94] (unknown [107.142.41.185]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.selwastor.com (Postfix) with ESMTPSA id 6184C40303; Wed, 17 Jun 2015 22:31:03 +0000 (UTC) Content-Type: text/plain; charset=iso-8859-1 Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\)) From: Ranganathan Krishnan In-Reply-To: Date: Wed, 17 Jun 2015 15:31:03 -0700 Content-Transfer-Encoding: quoted-printable Message-Id: <35B0D798-27F2-4146-A78A-AA0008C87DF9@selwastor.com> References: To: Dave Taht , Mitar , Christopher Byrd X-Mailer: Apple Mail (2.1510) Cc: "cerowrt-devel@lists.bufferbloat.net" Subject: Re: [Cerowrt-devel] [Ow-tech] Open secure wireless X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.13 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 17 Jun 2015 22:31:33 -0000 We have Chris Byrd from Riosec on the ow-tech mailing list. Check out this thread from him last year :=20 https://lists.eff.org/pipermail/ow-tech/2014-May/000031.html I have this feature enabled on the Openwireless APs. What is needed is a campaign with the Client manufactureres (Google, Cyanogen,=20 Apple etc) to get them to fix the bugs in their implementation that cause their clients to abort if no client certificate is installed -- = even though the connection would succeed since the server will never request the client cert.=20 If there is interest in sustaining such a campaign with the Client=20 manufacturers, I will be happy to contribute.=20 Cheers, Ranga On Jun 17, 2015, at 8:47 AM, Dave Taht wrote: > In the alphabet soup of wireless standards, I had not heard of 802.11u > before now. >=20 > http://www.riosec.com/articles/open-secure-wireless-20 >=20 >=20 > ---------- Forwarded message ---------- > From: Mitar > Date: Wed, Jun 17, 2015 at 4:29 AM > Subject: [Ow-tech] Open secure wireless > To: ow-tech@lists.eff.org >=20 >=20 > Hi! >=20 > Reading this old post: >=20 > https://www.eff.org/deeplinks/2011/04/open-wireless-movement >=20 > I wanted to point some research done on this some time ago: >=20 > http://www.riosec.com/articles/Open-Secure-Wireless > = http://www.riosec.com/articles/Open-Secure-Wireless/Open-Secure-Wireless.p= df >=20 > And also some progress: >=20 > http://www.riosec.com/articles/open-secure-wireless-20 >=20 > If you are not doing that already, I think EFF should get on board of > supporting those changes to the standard. >=20 > (BTW, originally, as presented in 1.0 paper, WiFi standard does allow > open and secure connections, just no operating system really > implements it because they all first prompt for the password, before > trying to connect to the encrypted WiFi network to figure out the > password is really required.) >=20 >=20 > Mitar >=20 > -- > http://mitar.tnode.com/ > https://twitter.com/mitar_m > _______________________________________________ > Ow-tech mailing list > Ow-tech@lists.eff.org > https://lists.eff.org/mailman/listinfo/ow-tech >=20 >=20 > --=20 > Dave T=E4ht > What will it take to vastly improve wifi for everyone? > https://plus.google.com/u/0/explore/makewififast > _______________________________________________ > Cerowrt-devel mailing list > Cerowrt-devel@lists.bufferbloat.net > https://lists.bufferbloat.net/listinfo/cerowrt-devel