{"id":444,"date":"2019-04-15T12:09:44","date_gmt":"2019-04-15T09:09:44","guid":{"rendered":"http:\/\/194.204.18.93:9991\/?p=444"},"modified":"2020-04-09T15:12:33","modified_gmt":"2020-04-09T12:12:33","slug":"koik-zoneflex-802-11ac-wave2-ap-d-saavad-wpa3-toetuse-2","status":"publish","type":"post","link":"https:\/\/blog.3kgroup.ee:443\/?p=444","title":{"rendered":"K\u00f5ik ZoneFlex 802.11ac Wave2  AP-d saavad WPA3 toetuse"},"content":{"rendered":"\n<p>K\u00f5ik viimastel aastatel tootmisse lastud 802.11ac Wave2 (Multi User Mimo toetusega) Ruckuse tugijaamad saavad endale l\u00e4hiajal WPA3 turvastandardi uuenduse. See standard lahendab \u00a0praegused WPA3 standardiga seotud turvaohud. PSK poolel on probleemiks olnud lihtsate paroolida \u00e4raarvamine. \u00dcldine n\u00f5rk koht on olnud protokolli handshake algoritmi \u00a0haavatavus.<\/p>\n\n\n\n<p>WPA3 personal  hakkab kasutama uut autentimise algoritmi: Simultaneous Authentication of Equals (SAE), see algoritm ei v\u00f5imdalda enam teha  WPA PSK parooli \u00e4raarvamise r\u00fcnnakuid, nagu erinevate s\u00f5nade proovimine jne. Crack-ng siis enam ei t\u00f6\u00f6ta, sest kasutusel on igaks autentimise sessiooniks uus turvaline elliptiliste k\u00f5verate ja Diffie Helmanni v\u00f5tmevahetuse algoritmi toodetud sessioon. (Elliptic Curve Diffie Hellman (ECDH)\u00a0). Seega omas arvutis protsessi simuleerida enam pole v\u00f5imalik. <\/p>\n\n\n\n<p>WPA3 enerprise saab juurde 192 bitise kr\u00fcpteerimise, mis on positiivne samm k\u00f5rge turvalisusega organisatsioonide jaoks.<\/p>\n\n\n\n<p>WPA3 seadmed peavad \u00fchilduma ka WPA2 sertifitseeritud seadmetega, seega WPA1 kantakse n\u00fc\u00fcd maha. WPA3 seadmed on siseseadmetest <a href=\"https:\/\/blog.3kgroup.ee:443\/tag\/wpa3\/\">R510, R720,R320,R730,R610,M510..<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>K\u00f5ik viimastel aastatel tootmisse lastud 802.11ac Wave2 (Multi User Mimo toetusega) Ruckuse tugijaamad saavad endale l\u00e4hiajal WPA3 turvastandardi uuenduse. See standard lahendab \u00a0praegused WPA3 standardiga seotud turvaohud. PSK poolel on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":446,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[23],"tags":[24,5,66],"class_list":["post-444","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tootjate-support-teeenused","tag-ruckus","tag-wi-fi","tag-wpa3"],"acf":[],"_links":{"self":[{"href":"https:\/\/blog.3kgroup.ee:443\/index.php?rest_route=\/wp\/v2\/posts\/444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.3kgroup.ee:443\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.3kgroup.ee:443\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.3kgroup.ee:443\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.3kgroup.ee:443\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=444"}],"version-history":[{"count":7,"href":"https:\/\/blog.3kgroup.ee:443\/index.php?rest_route=\/wp\/v2\/posts\/444\/revisions"}],"predecessor-version":[{"id":2311,"href":"https:\/\/blog.3kgroup.ee:443\/index.php?rest_route=\/wp\/v2\/posts\/444\/revisions\/2311"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.3kgroup.ee:443\/index.php?rest_route=\/wp\/v2\/media\/446"}],"wp:attachment":[{"href":"https:\/\/blog.3kgroup.ee:443\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.3kgroup.ee:443\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.3kgroup.ee:443\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}