• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Wi-Fi Alliance Confirms WPA3 Arrival Later This Year

Joined
Sep 22, 2017
Messages
889 (0.34/day)
Wi-Fi Alliance introduces enhancements and new features for Wi-Fi Protected Access, the essential family of Wi-Fi CERTIFIED security technologies for more than a decade. Wi-Fi Alliance is launching configuration, authentication, and encryption enhancements across its portfolio to ensure Wi-Fi CERTIFIED devices continue to implement state of the art security protections.

WPA2 provides reliable security used in billions of Wi-Fi devices every day, and will continue to be deployed in Wi-Fi CERTIFIED devices for the foreseeable future. Wi-Fi Alliance will continue enhancing WPA2 to ensure it delivers strong security protections to Wi-Fi users as the security landscape evolves. Advanced Wi-Fi applications will rely on WPA2 with Protected Management Frames, broadly adopted in the current generation of Wi-Fi CERTIFIED devices, to maintain the resiliency of mission-critical networks. New testing enhancements will also reduce the potential for vulnerabilities due to network misconfiguration, and further safeguard managed networks with centralized authentication services.


Building on the widespread adoption and success of WPA2, Wi-Fi Alliance will also deliver a suite of features to simplify Wi-Fi security configuration for users and service providers, while enhancing Wi-Fi network security protections. Four new capabilities for personal and enterprise Wi-Fi networks will emerge in 2018 as part of Wi-Fi CERTIFIED WPA3. Two of the features will deliver robust protections even when users choose passwords that fall short of typical complexity recommendations, and will simplify the process of configuring security for devices that have limited or no display interface. Another feature will strengthen user privacy in open networks through individualized data encryption. Finally, a 192-bit security suite, aligned with the Commercial National Security Algorithm (CNSA) Suite from the Committee on National Security Systems, will further protect Wi-Fi networks with higher security requirements such as government, defense, and industrial.

"Security is a foundation of Wi-Fi Alliance certification programs, and we are excited to introduce new features to the Wi-Fi CERTIFIED family of security solutions," said Edgar Figueroa, president and CEO of Wi-Fi Alliance. "The Wi-Fi CERTIFIED designation means Wi-Fi devices meet the highest standards for interoperability and security protections."

"Wi-Fi security technologies may live for decades, so it's important they are continually updated to ensure they meet the needs of the Wi-Fi industry," said Joe Hoffman, SAR Insight & Consulting. "Wi-Fi is evolving to maintain its high-level of security as industry demands increase."

View at TechPowerUp Main Site
 

qubit

Overclocked quantum bit
Joined
Dec 6, 2007
Messages
17,865 (2.87/day)
Location
Quantum Well UK
System Name Quantumville™
Processor Intel Core i7-2700K @ 4GHz
Motherboard Asus P8Z68-V PRO/GEN3
Cooling Noctua NH-D14
Memory 16GB (2 x 8GB Corsair Vengeance Black DDR3 PC3-12800 C9 1600MHz)
Video Card(s) MSI RTX 2080 SUPER Gaming X Trio
Storage Samsung 850 Pro 256GB | WD Black 4TB | WD Blue 6TB
Display(s) ASUS ROG Strix XG27UQR (4K, 144Hz, G-SYNC compatible) | Asus MG28UQ (4K, 60Hz, FreeSync compatible)
Case Cooler Master HAF 922
Audio Device(s) Creative Sound Blaster X-Fi Fatal1ty PCIe
Power Supply Corsair AX1600i
Mouse Microsoft Intellimouse Pro - Black Shadow
Keyboard Yes
Software Windows 10 Pro 64-bit
This was inevitable after the vulnerability inherent in WPA2 was discovered recently.

Wi-Fi is currently switched off because of this and will stay off until I buy a WPA3 router.
 
Joined
Oct 2, 2004
Messages
13,791 (1.87/day)
It's going to take few years before WPA3 is even adopted by devices. Just having WPA3 capable router means nothing if clients connecting to it don't understand WPA3...
 
Joined
May 29, 2012
Messages
537 (0.12/day)
System Name CUBE_NXT
Processor i9 12900K @ 5.0Ghz all P-cores with E-cores enabled
Motherboard Gigabyte Z690 Aorus Master
Cooling EK AIO Elite Cooler w/ 3 Phanteks T30 fans
Memory 64GB DDR5 @ 5600Mhz
Video Card(s) EVGA 3090Ti Ultra Hybrid Gaming w/ 3 Phanteks T30 fans
Storage 1 x SK Hynix P41 Platinum 1TB, 1 x 2TB, 1 x WD_BLACK SN850 2TB, 1 x WD_RED SN700 4TB
Display(s) Alienware AW3418DW
Case Lian-Li O11 Dynamic Evo w/ 3 Phanteks T30 fans
Power Supply Seasonic PRIME 1000W Titanium
Software Windows 11 Pro 64-bit
This was inevitable after the vulnerability inherent in WPA2 was discovered recently.

Wi-Fi is currently switched off because of this and will stay off until I buy a WPA3 router.
The flaw discovered in WPA2 was not only patched, but specifically affected the client side of the AP/client equation. So long as you have WPS disabled and use a strong, random password you're still perfectly safe with WPA2.
 
Joined
Jul 5, 2013
Messages
28,260 (6.75/day)
Wi-Fi Alliance Confirms WPA3 Arrival Later This Year
About damn time! WPA2 has been vulnerable for years.
It's going to take few years before WPA3 is even adopted by devices. Just having WPA3 capable router means nothing if clients connecting to it don't understand WPA3...
Nah. All the major OS's will get driver, protocol and software patches swiftly. Older Android devices though...

The flaw discovered in WPA2 was not only patched, but specifically affected the client side of the AP/client equation. So long as you have WPS disabled and use a strong, random password you're still perfectly safe with WPA2.
That is not completely correct. While that vulnerability has been patched, thus keeping each wifi connection private, it is still possible to capture packets and thus the network access credentials and steal wifi access to the internet. This is a decently serious problem that needs a solution. Hopefully they get it right.
 
Last edited:
Joined
Feb 21, 2006
Messages
2,240 (0.33/day)
Location
Toronto, Ontario
System Name The Expanse
Processor AMD Ryzen 7 5800X3D
Motherboard Asus Prime X570-Pro BIOS 5013 AM4 AGESA V2 PI 1.2.0.Cc.
Cooling Corsair H150i Pro
Memory 32GB GSkill Trident RGB DDR4-3200 14-14-14-34-1T (B-Die)
Video Card(s) XFX Radeon RX 7900 XTX Magnetic Air (24.12.1)
Storage WD SN850X 2TB / Corsair MP600 1TB / Samsung 860Evo 1TB x2 Raid 0 / Asus NAS AS1004T V2 20TB
Display(s) LG 34GP83A-B 34 Inch 21: 9 UltraGear Curved QHD (3440 x 1440) 1ms Nano IPS 160Hz
Case Fractal Design Meshify S2
Audio Device(s) Creative X-Fi + Logitech Z-5500 + HS80 Wireless
Power Supply Corsair AX850 Titanium
Mouse Corsair Dark Core RGB SE
Keyboard Corsair K100
Software Windows 10 Pro x64 22H2
Benchmark Scores 3800X https://valid.x86.fr/1zr4a5 5800X https://valid.x86.fr/2dey9c 5800X3D https://valid.x86.fr/b7d
The flaw discovered in WPA2 was not only patched, but specifically affected the client side of the AP/client equation. So long as you have WPS disabled and use a strong, random password you're still perfectly safe with WPA2.

^^^ This.

Only a router running in reaper / bridge mode has to worry about the KRACK issue. In router mode it not a problem its the client devices you have to worry about and most of them are patched now..
 

qubit

Overclocked quantum bit
Joined
Dec 6, 2007
Messages
17,865 (2.87/day)
Location
Quantum Well UK
System Name Quantumville™
Processor Intel Core i7-2700K @ 4GHz
Motherboard Asus P8Z68-V PRO/GEN3
Cooling Noctua NH-D14
Memory 16GB (2 x 8GB Corsair Vengeance Black DDR3 PC3-12800 C9 1600MHz)
Video Card(s) MSI RTX 2080 SUPER Gaming X Trio
Storage Samsung 850 Pro 256GB | WD Black 4TB | WD Blue 6TB
Display(s) ASUS ROG Strix XG27UQR (4K, 144Hz, G-SYNC compatible) | Asus MG28UQ (4K, 60Hz, FreeSync compatible)
Case Cooler Master HAF 922
Audio Device(s) Creative Sound Blaster X-Fi Fatal1ty PCIe
Power Supply Corsair AX1600i
Mouse Microsoft Intellimouse Pro - Black Shadow
Keyboard Yes
Software Windows 10 Pro 64-bit
The flaw discovered in WPA2 was not only patched, but specifically affected the client side of the AP/client equation. So long as you have WPS disabled and use a strong, random password you're still perfectly safe with WPA2.
Not quite, since the problem was in the protocol itself, not the implementation. lexluthermiester has explained the problem nicely below.

That is not completely correct. While that vulnerability has been patched, thus keeping each wifi connection private, it is still possible to capture packets and thus the network access credentials and steal wifi access to the internet. This is a decently serious problem that needs a solution. Hopefully they get it right.
 
Top