<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OWE network traffic security in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485971#M296624</link>
    <description>&lt;P&gt;No, with OWE, each user has unique keys, and one user can not decrypt the traffic of another.&lt;/P&gt;&lt;P&gt;The only possible attack is that the attacker gets active into the connection (MitM). Then the traffic can bee seen natively. But the credentials are still protected if the splash page is delivered over HTTPS.&lt;/P&gt;</description>
    <pubDate>Sun, 09 Mar 2025 09:49:30 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2025-03-09T09:49:30Z</dc:date>
    <item>
      <title>OWE network traffic security</title>
      <link>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485967#M296620</link>
      <description>&lt;P&gt;Hey All,&lt;/P&gt;&lt;P&gt;I want to get away from the one password to rule the wifi and instead use the AD Login splash page. If i set my network up with OWE and have the captive portal strenght set to block all access until sign-on is complete is my network secure? Or because its still an "open" network im vulnerable to being attacked by anyone.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tyler&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 17:18:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485967#M296620</guid>
      <dc:creator>fraynchize</dc:creator>
      <dc:date>2024-05-07T17:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: OWE network traffic security</title>
      <link>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485968#M296621</link>
      <description>&lt;P&gt;Hi Tyler, &lt;BR /&gt;&lt;BR /&gt;1. OWE is part of WPA3 authentication which requires client devices to use data encryption upon associating to the AP.&lt;/P&gt;&lt;P&gt;2. After association the client will be redirected to the &lt;A href="https://documentation.meraki.com/MR/MR_Splash_Page/Splash_Page_Traffic_Flow_and_Troubleshooting#Sign-On_Splash_Page" target="_self" rel="nofollow noopener noreferrer"&gt;AD Logon Splash Page&lt;/A&gt; where they will have to enter a username and password to authenticate to the AD server.&lt;/P&gt;&lt;P&gt;3. The client will enter their username and password. The AP will receive that information and then send that off to your server.&lt;/P&gt;&lt;P&gt;4. Your server will accept or deny the credentials. If denied the server will indicate that to the AP and the AP will deny you access to the network. If your credentials are accepted your server will send a message to the AP telling it to allow you into the network. &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;5. If you have your captive portal strength set to "block all access until sign-on is complete" then until users complete their sign-on they will not be allowed to access anything in the network (save for what is in your walled garden).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Additional Resources: &lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://documentation.meraki.com/MR/Wi-Fi_Basics_and_Best_Practices/802.11_Association_Process_Explained" target="_self" rel="nofollow noopener noreferrer"&gt;802.11 Process Explained&lt;/A&gt; - Note: If WPA/WPA2 or 802.1X authentication is required on the wireless network, the mobile station will not be able to send data until dynamic keying and authentication have taken place after the 802.11 Association is complete.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In our &lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Wireless_Encryption_and_Authentication_Overview" target="_self" rel="nofollow noopener noreferrer"&gt;documentation&lt;/A&gt; we state the following, "To associate to a wireless network, a client must have the correct encryption keys (association requirements). Once associated the wireless client may need to enter information (network sign-on method) before accessing resources on the wireless network."&lt;BR /&gt;&lt;BR /&gt;More on OWE from our &lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Wireless_Encryption_and_Authentication_Overview#Opportunistic_Wireless_Encryption" target="_self" rel="nofollow noopener noreferrer"&gt;documentation.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hopefully this answers your question &lt;SPAN class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 21:53:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485968#M296621</guid>
      <dc:creator>MariaP8</dc:creator>
      <dc:date>2024-05-07T21:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: OWE network traffic security</title>
      <link>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485969#M296622</link>
      <description>&lt;P&gt;OWE gives you wireless encryption without authentication, and the Splash page gives you authentication without wireless encryption. Combining both leaves you individually vulnerable to attacks on the other. An attacker on the wireless side can still make himself a MitM to interact with the wireless data in cleartext form.&lt;/P&gt;&lt;P&gt;If it is for internal users (as you are talking about AD login), implementing 802.1X is the only secure way to combine both.&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 00:36:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485969#M296622</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2024-05-08T00:36:35Z</dc:date>
    </item>
    <item>
      <title>Re: OWE network traffic security</title>
      <link>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485970#M296623</link>
      <description>&lt;P&gt;So, that means that for non already wireless user; the splash screen login is encrypted via the previous OWE negotiation/encryption, am I right?&lt;/P&gt;&lt;P&gt;But someone already auth in the wifi network could in theory sniff network traffic and get the splash screen credentials?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 09:17:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485970#M296623</guid>
      <dc:creator>xveral</dc:creator>
      <dc:date>2025-03-09T09:17:01Z</dc:date>
    </item>
    <item>
      <title>Re: OWE network traffic security</title>
      <link>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485971#M296624</link>
      <description>&lt;P&gt;No, with OWE, each user has unique keys, and one user can not decrypt the traffic of another.&lt;/P&gt;&lt;P&gt;The only possible attack is that the attacker gets active into the connection (MitM). Then the traffic can bee seen natively. But the credentials are still protected if the splash page is delivered over HTTPS.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 09:49:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485971#M296624</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2025-03-09T09:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: OWE network traffic security</title>
      <link>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485972#M296625</link>
      <description>&lt;P&gt;Thanks for the clarification! &lt;/P&gt;</description>
      <pubDate>Sun, 09 Mar 2025 10:35:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/owe-network-traffic-security/m-p/5485972#M296625</guid>
      <dc:creator>xveral</dc:creator>
      <dc:date>2025-03-09T10:35:35Z</dc:date>
    </item>
  </channel>
</rss>

