- 1 Post
- 0 Reply Likes
Posted 1 year ago
- 2 Posts
- 2 Reply Likes
This is rather frustrating.
- 3 Posts
- 1 Reply Like
- 3 Posts
- 2 Reply Likes
Maybe switching our campus wifi infrastructure to Ruckus was a BAD idea last year. Fortunately I only started with a few buildings. If they don't put out a patch ASAP, it's good riddance Ruckus and Hello Aruba or someone else.
- 25 Posts
- 7 Reply Likes
- 7 Posts
- 11 Reply Likes
I, too, don't understand how you can have 2.5 months to come up with something and "wait til the end of the day" is what they came up with.
You KNOW there is a MAJOR issue. You KNOW your customers and competitors will be looking at your response. You know exactly WHEN the announcement will be made. And yet, you have NOTHING available.
"At Ruckus Support, we value Security above all else. The WPA2 vulnerabilities were just released to the public, but Ruckus engineers have had this information for much longer and have been working tirelessly to address, correct, and test patches for all of our systems. We will have these available very soon. Thank you for your patience, we want to make sure we get this one right."
There, took me 2 minutes.
- 3 Posts
- 1 Reply Like
- 3 Posts
- 0 Reply Likes
Please help with a firmware update for the ZF7363 and ZF7321 models for this new vulnerability found in WPA-2. Is there any way to contact them or all those who are registered will we get an email automatically when they have the update to know that is already available?
- 3 Posts
- 1 Reply Like
Brad
- 3 Posts
- 0 Reply Likes
Please help with a firmware update for the ZF7363 and ZF7321 models for this new vulnerability found in WPA-2. Is there any way to contact them or all those who are registered will we get an email automatically when they have the update to know that is already available?
Michael Brado, Official Rep
- 2671 Posts
- 368 Reply Likes
Here is what I can tell you after all the other Wi-Fi company announcements that should elliviate some concerns.
- 7 Posts
- 11 Reply Likes
- 16 Posts
- 21 Reply Likes
- 2 Posts
- 2 Reply Likes
- 3 Posts
- 2 Reply Likes
- 16 Posts
- 21 Reply Likes
Michael Brado, Official Rep
- 2671 Posts
- 368 Reply Likes
eliminates vulnerability to attack of AP-to-client traffic. The krackattacks.com site describe it as:
“it works by exploiting a four-way handshake that's used to establish a key for encrypting traffic. During the third step, the key can be resent multiple times. When it's resent in certain ways, a cryptographic nonce can be reused in a way that completely undermines the encryption.”
WPA2/AES - attacker can decrypt and replay wi-fi packets.
WPA2/Auto-TKIP - attacker can decrypt, replay and inject frames
It requires that the attacker be physically in range of your APs, performing a man-in-the-middle impersonation
of a true AP mac address.
WLAN configuration options on WLANs, default setting is 802.11r Fast Roaming disabled. (SZ 3.5.1).
This is a Client vulnerability issue. A man-in-the-middle with AP sending your SSID and using your AP
MAC address. If one of your clients joins this malicious AP, there is a hole in the client that allows the
client to connect even if the passphrase is not correct(!).
After this happens this, and only this single client, can be sniffed.
Our product is designed to alert Admins if such a rogue AP is present. Only AP manufacturers who use their
APs as RAPs in Mesh (ie connecting to Guest WLAN) are vulnerable (as Aruba stated).
Things to think about:
1) all current certs and Wi-Fi passwords are still secure (attacker doesn't get the pw)
2) AES does not allow for code injection (tkip does, don't use it).
3) Android 6 has more issues that might make this attack easier.
4) Disabling 802.11r will mitigate the attack
5) Patching either side (client or distribution system) stops the attack from happening on WLAN
6) MITM attacks can happen if attacker inserts a new cert, end user is prompted with cert error.
7) Do not move to WEP
Still waiting for a corporate Security message I can post to Support and will share here. Thanks.
- 3 Posts
- 5 Reply Likes
- 16 Posts
- 21 Reply Likes
Put simply, most other vendors have a fix or at the very least a statement as of hours ago on this. Regardless of how critical other vendors thought this would be they have addressed their end. I don't resonate with updating our endpoints instead, turning off the 802.11r feature on our devices, or anything other than fixing the vulnerability through firmware. You should have already deployed your new firmware/patches and put your obligation to rest. It's concerning this is not remotely the case.
- 1 Post
- 0 Reply Likes
- 7 Posts
- 11 Reply Likes
- 1 Post
- 4 Reply Likes
They were given notice at the same time as every other company.
- 13 Posts
- 8 Reply Likes
Here's what the message to management should be, and it should STING:
- Ubiquiti had a fix before you
- Ubiquiti sent an email blast to customers before you informing them of the vulnerability and the fix
- Mikrotik had a fix before you - yes, the Latvians beat you too
- Both companies called out above are seen as barely beyond consumer grade stuff in some circles (and in some Ruckus sales pitches)
- All the enterprise vendors had a fix out before you (but Ubiquiti is the one that should embarrass you)
- Many of your customers read about this elsewhere and are aware that you had the information about this problem in-hand back in August
- 1 Post
- 1 Reply Like
Michael Brado, Official Rep
- 2671 Posts
- 368 Reply Likes
https://support.ruckuswireless.com/documents/2039-faq-security-advisory-cp-101617-802-11r-vulnerabil...
- 7 Posts
- 11 Reply Likes
This advisory is full of grammatical errors, contradictions, and the very first line expresses doubt this is even a problem. Waiting all this time to come out with this just furthers the idea that there was no plan and someone started slapping this response together at 8am this morning.
Michael Brado, Official Rep
- 2671 Posts
- 368 Reply Likes
Abhi Maras, Employee
- 21 Posts
- 13 Reply Likes
- 1 Post
- 1 Reply Like
Michael Brado, Official Rep
- 2671 Posts
- 368 Reply Likes
https://support.ruckuswireless.com/documents/2040-faq-security-bulletin-101617-wpa2-vulnerability-kr...
- 7 Posts
- 11 Reply Likes
However, a blog post, also from Ruckus, says the following:
- Vulnerabilities exist on both sides of the 4-way handshake relationship (client and AP) and both sides need to be patched.
- Until client vendors provide updates, disabling 802.11r can help mitigate the attack by eliminating one source of vulnerability (Fast BSS Transitions, otherwise known as 802.11r roaming).
If vulnerabilities exist on both sides of the 4-way handshake, and vendors need to patch them to make them secure (and Ruckus uses WPA)... ??? The blog post and the official statement appear to be contradicting each other. I'd prefer NOT to go back and tell my bosses that I was wrong with what I told them last night.
Thanks,
- 1 Post
- 1 Reply Like
- 7 Posts
- 14 Reply Likes
Almost every other manufacturer has firmware fixes available and you don’t. Even Netgear does for their consumer routers!
It is beyond belief that you clearly did not take this seriously, and STILL don’t it would seem.
Time to dump Ruckus. This is not an enterprise product, and certainly not enterprise level support.
- 215 Posts
- 50 Reply Likes
- 25 Posts
- 7 Reply Likes
A month ago, I inherited a position in a company where the wireless network is done with 6x Ruckus R500 Wireless APs.
Yesterday I contacted Ruckus support and they promised firmware by the end of the day. I have to say, that first impression I got from Ruckus is not an enterprise class and will probably move to ubiquiti.
- 90 Posts
- 29 Reply Likes
- 25 Posts
- 7 Reply Likes
- 215 Posts
- 50 Reply Likes
Here is a good URL on availability of client device patches: https://www.bleepingcomputer.com/news/security/list-of-firmware-and-driver-updates-for-krack-wpa2-vulnerability/
- 25 Posts
- 7 Reply Likes
- 16 Posts
- 21 Reply Likes
- 215 Posts
- 50 Reply Likes
- 7 Posts
- 15 Reply Likes
1. No out of office notification if someone mails to your security contact ([email protected])
This E-mail has to go to an high priorized and monitored queue in an ticket
system,
2. That your support people and partners would inform one or two day's before
the public disclosure.
3. That you have the right communication for all your customers ready and put
it in the right time on the right places (webside, newsletter, twitter...)
4. That you have your firmware fixes ready to deploy and if it is possible
some advanced monitoring ready for this issue and for broken clients.
and nothing had happened. If they would know from the problem since yesterday we can discuss, but not sitting since months on it....
- 25 Posts
- 7 Reply Likes
Michael Brado, Official Rep
- 2663 Posts
- 368 Reply Likes
- 20 Posts
- 4 Reply Likes
- 25 Posts
- 7 Reply Likes
https://forums.ruckuswireless.com/ruckuswireless/topics/r500-slow-troughput-high-latency-high-packet...
- 7 Posts
- 15 Reply Likes
I have read the Ruckus Security Advisory and also
https://theruckusroom.ruckuswireless.com/wi-fi/2017/10/16/commonsense-approach-uncommon-problem/ and many other stuff.
This all show ruckus in a very bad light. Can we still trust?
Ruckus was informed many weeks/months ago about this issue and the disclosure date.
But the customers was left alone!!
I was informed since two day's (CET timezone) about this issue. I waited for
the public disclosure yesterday and opened a case at ruckus cause no information
about it was found online.
All other major vendors did have the updates ready and informed their customers
at the same time the issue was going public. They had their communication ready
and send it out to their partners and customers at the right time.
Ruckus didn't they don't even inform the partners!!
What I as customer with contract and as partner has expected:
1. No out of office notification if someone mails to your security contact ([email protected])
This E-mail has to go to an high priorized and monitored queue in an ticket
system,
2. That your support people and partners would inform one or two day's before
the public disclosure.
3. That you have the right communication for all your customers ready and put
it in the right time on the right places (webside, newsletter, twitter...)
4. That you have your firmware fixes ready to deploy and if it is possible
some advanced monitoring ready for this issue and for broken clients.
What I now expect:
1. really fast update availability, even for older systems and without contract*
2. transparent communication what went wrong and why
3. better documentation and reporting how to fix the problem in our company's,
not even on the wireless system side:
* How to detect clients with this problem
* For which clients are updates available
I'm located in germany, the public disclosure was now nearly 24hour away,
even the radio stations here broadcast informations about this issue faster
then you.
At this morning the German Federal Office for Information Security has send out
an public announcement that all people should update their clients and
accesspoints / routers if possible or contact their vendors for updates.
The phones are ringing with customers, cto's and so on. All want to have a
status about this issue and a dead line then it is fixed.
Yes the major problem are the client's, but the accespoints and controllers
should be fixed also and I expect that I get some help from my wireless system
to detect the problem on the clients if I have a managed wireless solution
not one single accesspoint.
Our company has already rolled out the patcheѕ for our clients.
Even microsoft has the patches already in place.
For me it looks like ruckus has ignored the advisory and now the
try to react on it. This has nothing todo with enterprise support!!
There is absolute no excuse for this!!
For me the trust in your security support is gone, and there must
be very good arguments that we will stay with ruckus after our contract
ended.
* cause how it was happend (see what I expected)
- 90 Posts
- 29 Reply Likes
How can you ask Ruckus to list what clients are affected??
Calm down, and be professional - there has been tons of security issues in IT in the past, and the world is not ending due to that.
If you have customers that rely on WPA only, then they deserve to be under attack.
- 20 Posts
- 4 Reply Likes
- 90 Posts
- 29 Reply Likes
Yes, the post above, in which this is a reply to, asks:
* How to detect clients with this problemRuckus can never be the one to provide that info.
* For which clients are updates available
- 32 Posts
- 6 Reply Likes
Regards,
Alex
- 7 Posts
- 15 Reply Likes
Q: Can I detect if someone is attacking my network or devices?
A: Aruba software checks for replay counter mismatches on a per
client basis and will produce a log message if detection is triggered. The log message begins with “Replay Counter Mismatches“, followed by additional details.
Aruba has also released new RFProtect (WIDS) features and signatures to help detect attacks.
for example.
Also it should be no problem to build a list with patches for the major systems
and publish them.
If I read this right:
"Here, the client will install an all-zero encryption key instead of reinstalling the real key."
They work with an all-zero key can this not be detected from the wirless system?
- 16 Posts
- 21 Reply Likes
Wow Jakob, do you work at Ruckus?
I appreciate they finally took the time to tell us not to worry about anything unless you use features that are turned off by default, or mesh networking </sarcasm>. Thanks for assuming most costumers don't care as they would rarely deploy a mesh network, right?
https://www.ruckuswireless.com/rucktionary/mesh-networking-and-smartmesh
http://www.ruckussecurity.com/Smart-Mesh-Networking.asp
http://ruckus-www.s3.amazonaws.com/pdf/appnotes/bpg-wireless-mesh.pdf
You can't flaunt it and be proud of this as a value add, and then chastise customers for using it when there's a security issue you have no urgency to address.
- 12 Posts
- 7 Reply Likes
- 12 Posts
- 7 Reply Likes
- 8 Posts
- 1 Reply Like
Michael Brado, Official Rep
- 2663 Posts
- 368 Reply Likes
- 2 Posts
- 1 Reply Like
Or..?
- 8 Posts
- 1 Reply Like
- 20 Posts
- 4 Reply Likes
- 2 Posts
- 1 Reply Like
https://ruckus-www.s3.amazonaws.com/pdf/security/faq-security-advisory-id-101617-v1.2.txt
- 3 Posts
- 5 Reply Likes
- 12 Posts
- 4 Reply Likes
In a couple more days those snickers are going to turn into turn into something much more damaging. Because you're such a big player in the wifi market, you're already getting mocked for not having a fix ready when it was announced, but at least right now you're lumped in with tons of other companies.
As the days go on those other companies are going to deliver their patches and you're going to be left out in the rain, tossing excuses and copy pasta to frustrated sysadmins with leftover end of year budgets they'll rightfully decide to spend somewhere else.
We love our Ruckus products but your lack of progress in this matter means to be secure, we may have to turn off our products, and we can't have that in our organization, so we're simply forced to switch vendors.
- 1 Post
- 4 Reply Likes
- 65 Posts
- 17 Reply Likes
In addition can I borrow some of your budget dollars so I can jump vendors whenever I'm unhappy with their performance. Thats a luxury that I cannot afford, time or money wise. :)
- 16 Posts
- 21 Reply Likes
- 215 Posts
- 50 Reply Likes
On the basis that all this vendor bashing seems to be falling on deaf ears, on the basis that no one other than Michael from the vendor has bothered to comment on their own forum and we still dont have a patch. I would suggest that the tit for tat between users is pointless.
Remember, we all want the same thing.
Maybe we would be better spending our time offering advice to each other on how to mitigate the threat in the meat time until a patch is released because ultimately, it will come out before anyone on this thread has a chance to switch vendor.
- 16 Posts
- 21 Reply Likes
I'm not "unlucky" because I have regulations to keep in mind. You would be lucky if your users just browse Facebook all day like Todd. Just because you are subject to regulations doesn't mean you have additional budget/staff to put a WIDS/WIPS in place, they typically spend that on a robust properly configured AP (that gets timely support). In our case we don't administer every customer network post sales cycle. The only thing more frustrating than how Ruckus has handled this is the people trivializing their commitment to the issue and it's resolution.
Follow me here... Their official release plays down the vulnerability and then says:
"Ruckus will be releasing security patches to address all above mentioned vulnerabilities. It is recommended that customers upgrade their network(s) with these patches as soon as they become available."
If it isn't a big deal, and doesn't affect your customers, why patch it at all - ever? Because it IS worth fixing... Sometime... When you decide to switch partners in this case, it's not because a patch isn't available at that moment, it's because of the damage done.
- 215 Posts
- 50 Reply Likes
This is my opinion:
Is it a valid vulnerability? Yes.
Does it need to be patched? Yes.
Even after the patch is the full threat nullified? Not unless you have 100% governance over every client on your WLAN's and can ensure they are all patched.
Is it relatively difficult to actually take advantage of? Yes.
Even if you are attacked, is it likely to cause a large scale security breach? Unless you are unlucky enough to have them capture traffic on a single MiTM attack for a user who is sending sensitive data upstream on an unpatched client, in an areas serviced by unpatched mesh AP's or a WLAN configured with 802.11r, no.
I appreciate it is annoying, and i have had to answer questions today from my customers about how long it has taken Ruckus to post an advisory and how long it will take for a patch but thats part of being in tech. There's a serious security treat almost every month, this month its WiFi's turn.
Yes Ruckus' comms haven't been what would be expected of a top enterprise WiFi vendor, and im sure that many of us will be having conversations with our reps over the coming days but hopefully they will learn from this.
- 16 Posts
- 21 Reply Likes
None taken really, and I agree with your points above. I think it's another question of industry whether or not the big issue is if you could potentially snoop something significant in clear text to bring down the organization. In our case it isn't really about that.
The thing about regular security threats in IT is that you typically spend your money with folks you expect to fix things in a timely manner and exhibit exceptional communication. I don't think we hit either of those marks as we can both agree. So do you stick with somebody that predominately works in the industry they have a lackluster response in? Is this due to all the mergers, etc that have happened over the past year with them? I don't know, nor frankly do I care. I expect more from the company than device up-time.
- 90 Posts
- 29 Reply Likes
Hell, that is what all users do on 99% of all hospitality locations around the world on a daily basis.
We see customers that just moved from WEP to WPA because their old creditcard terminals did not support other than WEP..
So, if it's not more important than that, maybe we should help remind the customers that they need to make sure the Apps they use are secure...
- 16 Posts
- 21 Reply Likes
Don't assume I am only talking about guest wifi. I haven't said anything to imply that.
Do you know how VPNs actually work? I don't often use them inside of the same network over wifi <eye roll>.
That's really the key distinction here... It doesn't matter if they are using WEP/WPA/WPA2... That's not to say it's a good idea to be using anything other than WPA2. The attack surface is still there for properly configured access point(s). Where's my new firmware?
Not every application utilizes encryption to their back end, especially when the service is LAN side. I have said this repeatedly, but it is yet another question of your industry, and what applications you require to operate.
The customers don't typically know anything about their application other than its business value to them and the fact that they need it for operations. Even if they do care, they may not have a choice between secure/insecure applications to provide security over the wire regardless of price.
- 90 Posts
- 29 Reply Likes
All I'm saying is: If security is that important for your customers, that they are calling you even before the scope of this vulnerability is out in the open (it's still a lab case), then they should already be using Apps that use SSL communication directly between the client app and the backend.
Oh, and if you've read the krack site, it's mostly a clientside issue
- 20 Posts
- 4 Reply Likes
I think another aspect of this is the PR side. When the CIO says they have people asking "does this affect us" it shouldn't require a long explanation of "yes, but only if you're not using VPN, not using secure apps, etc etc.
- 16 Posts
- 21 Reply Likes
You can play Ruckus' cards all you want. "It's still a lab case..." Really? If I could prove there was another WPA2 vulnerability to where you could steal the PSK, but it wasn't in the wild yet, would you expect Ruckus to have a patch before somebody packaged up in a nice little tool for script kiddies? Would you care if you could just update Windows to mitigate the new threat? Apparently you wouldn't, and that makes you incompetent and naive in network security. I won't address your other noise again about apps using SSL.
Nobody is arguing that we shouldn't have to patch our clients, but even they have stated to patch BOTH. Well we can't do that yet. According to the latest word that will be two weeks away at the earliest for 'some' devices. Now we are waiting on a managers response about how everything is just fine, so long as 'xyz' is in place, or not in use. That's not acceptable. If you wanted to reassure everyone of the risks to certain features and the network safety otherwise, that should have been in the day one security brief assuring us of this with an ETA date on the firmware releases and which models.
An example of how to respond correctly (even spelling out which things aren't effected if that's your stance):
https://help.ubnt.com/hc/en-us/articles/115013737328-Ubiquiti-Devices-KRACK-Vulnerability
- 90 Posts
- 29 Reply Likes
All I'm saying is: keep the perspective! This thread is going nuts over how all wifi is suddenly useless, when facts is, it's not!This thread is going nuts over how all security is suddenly compromised and peoples highly secret communications is at risk, and I'm simply pointing out: It the communications it that secret, you should have other security measures in place!
I'm not fond if how Ruckus is handling this either, but stop making the world come to and end over this, when in fact it's not.
- 16 Posts
- 21 Reply Likes
Michael Brado, Official Rep
- 2671 Posts
- 368 Reply Likes
(In response to questions such as “where is my patch” and “why is this taking so long”?)
Providing patches for affected products is our first concern and we understand its urgency to your business. We expect patches for most firmware releases to be available on October 30th, with all patches to be completed by November 15th. In the interim, the following steps will minimize risk:
- Disable 802.11rwherever enabled. This step eliminates the short-term need for patches to Ruckus infrastructure in all but the two scenarios described below.
- Enable rogue detectionmechanisms and ensure clients connecting to a rogue AP are de-authenticated.
- Patch client devices asthose patches become available. Unpatched clients will continue to be a risk tonetwork security, regardless of what other steps are taken.
With the above steps taken, two Ruckus use cases and products continue to pose a network security risk: meshed APs and point-to-point links. That risk is minimized through use of rogue AP detection and subsequent corrective action.
Full protection against KRACK will be assured once all infrastructure software has been updated (and 802.11r re-enabled) and all clients have been updated.
Note: Ruckus will provide software updates to anyone requesting them, regardless ofsupport contract status.
- 51 Posts
- 12 Reply Likes
- 7 Posts
- 15 Reply Likes
have you seen my statement to this issue. I think your statement can be the seen as first step to bring it on track. Especially:
"Note: Ruckus will provide software updates to anyone requesting them, regardless of support contract status."
Plese take a look at my posting:
https://t.co/uVikcz9kRF
Can you give some statements to this?
Now tthe problem exists that ruckus was not ready for this problem. So let us not do
the fingerpointing let us find solutions. As described in my posting I see some expections:
1. really fast update availability, even for older systems and without contract*
2. transparent communication what went wrong and why
3. better documentation and reporting how to fix the problem in our company's,
not even on the wireless system side:
* How to detect clients with this problem
* For which clients are updates available
You have us shown point 1 about the speed we can discuss but it is
necessary that the patches are stable and working. So If you have startet with
the development too late the dates you announced are fine from my point if view.
Now my points 2 and 3 is missing. Can you tell us something about it and can you make it public please?
To get the trust from your userbase it is necessary to show us what went wrong and why and what will be take in place to prevent this happening the next time.
- 1 Post
- 0 Reply Likes
Note: Ruckus will provide software updates to anyone requesting them, regardless ofsupport contract status.
How exactly would this happen, should I open a ticket for our contract-less ZD5000 controllers, and Ruckus will provide update images?
- 36 Posts
- 5 Reply Likes
- 20 Posts
- 4 Reply Likes
- 16 Posts
- 5 Reply Likes
As per your earlier statement "Note: Ruckus will provide software updates to anyone requesting them, regardless of support contract status"
Can you please explain the process of how to perform software updates on ZD's with expired contracts. Who we may have to contact etc etc.
I have the following ZD's i'd like to upgrade when the patches are made available approx. Oct 30.
ZD 1106 9.8
ZD 1200 9.9
ZD 1200 9.13
Michael Brado, Official Rep
- 2663 Posts
- 368 Reply Likes
The WPA2 patch firmware will also be provided to customers who don't currently
have active support contracts, * but you will need to create a "Guest" account on our
Support portal. Please do this in advance if you don't have one now.
All Guest users should to be able to access/read the Ruckus Warranty and Software
License Agreement on our Programs page for example, which is Published with Available
to Anyone status:
https://support.ruckuswireless.com/programs
Login and test the above link, or if prompted to login, please Register with us here:
https://support.ruckuswireless.com/registration
First patch firmware will be made available on Monday (10/30/17). Thanks and best
regards.
- 215 Posts
- 50 Reply Likes
Michael Brado, Official Rep
- 2663 Posts
- 368 Reply Likes
Licensing/Entitlement that is ordinarily enforced in order to perform an upgrade on a ZD, that checks with our server, will provide No Entitlement Required
for 30 days.
All current ZD customers can take advantage of this opportunity for upgrades.
Please try an upgrade Robert, and confirm you could do so ok? (meaning our 30 days open entitlement is working)
- 215 Posts
- 50 Reply Likes
When did the 30 days timer start?
For the entitlement check, what if the ZD doesn't have access to check with the server and the local license file has expired?
Realize im throwing curve balls but we have multiple customers who all have very different scenarios.
- 16 Posts
- 5 Reply Likes
I contacted Ruckus Support via https://support.ruckuswireless.com/contact-us I started an online chat session and explained the scenario. The rep I originally spoke to said he would have to escalate it to the engineers and someone would contact me. Within a very short period of time (can't recall but it was fast), someone reached out to me via email to let me know they'd contact me by phone in 15 mins. I explained the situation, then replied to their original email with my ZD serial numbers.
They replied a short time later with 3 entitlement files (aka support contracts) and I could upload those to the Administer >> Support tabs on each ZD.
Two of the entitlement files were for one day only (they were the oldest ZD's I had without a support contract. I had to follow the support path which mean updating from 9.8.x -> 9.9.x ->9.10.x -> 9.12 -> 10.0.1.0 (or something very similar, refer to the update documents to see the exact path you need to follow)
The rep told me they would expire in one day whether or not I would use them and he wanted me to perform the first update with him over the phone so he knew it was going to work. Once I performed the first update successfully I let the rep go so I could let him assist other people. It took a bit of time to follow the support path but I was able to successfully upgrade the ZD's without support contract thanks to the Support Team at Ruckus.
The ZD's support contract expired on the next day but everything was up to date. The third support contract was for a bit longer, but none of them was for 30 days.
I have to say, I am not a fan of the 10.0.x UI... I really miss the dash board with all the important info like Serial Number, Software Version, Up Time and the customized widgets we could setup. The important factor is the systems are now protected.
Regardless, the updates were successful thanks to Ruckus for letting us do that!
- 215 Posts
- 50 Reply Likes
- 215 Posts
- 50 Reply Likes
- 16 Posts
- 5 Reply Likes
We do residential homes and small businesses so the impact wasn't high risk to our clients. The businesses knew it was important enough that a 4 minute or less interruption was worth the small downtime.
The third ZD support contract was extended for longer than a day (not saying how much longer)... not sure if this was a mistake but don't want to get the rep into trouble if he extended past the time frame he was suppose to create it for. It's for our lab ZD so it will be put to good use.
- 215 Posts
- 50 Reply Likes
Appreciate your responses as someone who has been through the process.
Michael Brado, Official Rep
- 2663 Posts
- 368 Reply Likes
This should be active now Robert and community.
Michael Brado, Official Rep
- 2663 Posts
- 368 Reply Likes
Ourdevelopers/QA beat the projected schedule for a WPA2 KRACK fixed version
of ZoneFlex for the 7731 PtMTPbridges. These files are now available for download
from the Support portal at theseURLs. The KRACK Support Resource Center has also
been updated with this releaseinformation.
ZoneFlex 7731 Release9.2.0.0.181 (GA Refresh6) Release Notes:
https://support.ruckuswireless.com/products/20-zoneflex-7731#documents
ZF7731 Firmware 9.2.0.0.181(+WPA2 KRACK patches):
https://support.ruckuswireless.com/software/1546-zf7731-firmware-9-2-0-0-181-wpa2-krack-patches
Ruckus Wireless KRACK SupportResource Center:
https://support.ruckuswireless.com/krack-ruckus-wireless-support-resource-center
- 2 Posts
- 1 Reply Like
"That file is only available to Premium Support users."
despite Ruckus statement "Note: Ruckus will provide software updates to anyone requesting them, regardless of support contract status".
Am I missing something or have Ruckus not made the file available?
Max O'Driscoll, AlphaDog
- 349 Posts
- 91 Reply Likes
Michael Brado, Official Rep
- 2663 Posts
- 368 Reply Likes
contract required, but you do need to have a guest account / be registered.
The access permissions are corrected now. Please try your download again.
Thanks and best regards.
- 215 Posts
- 50 Reply Likes
https://support.ruckuswireless.com/krack-ruckus-wireless-support-resource-center?_ga=2.221041560.149...
- 90 Posts
- 29 Reply Likes
Edit: Would be if you have ZoneFlex 7025 AP's running...
- 215 Posts
- 50 Reply Likes
- 90 Posts
- 29 Reply Likes
- 215 Posts
- 50 Reply Likes
- 90 Posts
- 29 Reply Likes
- 215 Posts
- 50 Reply Likes
- 90 Posts
- 29 Reply Likes
If Ruckus put's out upgrades for systems without valid support contracts, they are in luck - but you've gotta admit:
1: They are on 3+ year old system2: They have not bought into support
How in the world do they think they can expect support?
Anyway, they 7025 does not even, as far as I know, support 802.11r, so they flaw is not even on their system!They have to make sure the clients are updated.
- 90 Posts
- 29 Reply Likes
Here in Europe, at least, it's common practice to make sure IT equipment is written off within 3 years. You simply budget with a replacement after 3 years.You can hope not to have to spend the budget, but it's good practice to have the budget.
- 215 Posts
- 50 Reply Likes
Whether they have support or not is irrelevant if the hardware is stopping them from upgrading.
Jokob, i'm based in the UK and have worked enough around Europe to know that it is not common place at all. Maybe in certain verticals, large enterprise for example, yes. But a blanket statement that its common place for the budget to replace IT equipment every 3 years, especially if still functioning perfectly adequately, i find hard to believe.
There are other flaws that just 802.11r. There is Mesh and there is the option on the wireless vendor to introduce additional measures in AP firmware to mitigate client side vulnerabilities by rejecting variations in the replay counters from that stored by the AP for example. As far as I know Ruckus hasn't confirmed exactly what will be released as part of the patch yet. You cant always ensure all clients are updated especially with guest networks.
Anyways, we are getting away from the point here, my question was simply to ask if anyone had had conversations with Ruckus about older versions of firmware that 9.10.
- 25 Posts
- 7 Reply Likes
Anyways, I bought Asus RT-N56U for home in early 2011. At first it was missing some nice-to-have functions, which I emailed Asus. And guess what? After a while they released new FW with the featrures I had asked for. And FWs kept on coming. The latest FW was released in March 2017, over 6 years after I bough the device.
Couple of weeks back I emailed Asus asking if they are releasing firmware to address WPA2 krack, and yes, they are although they couldn't give me the date yet. :-) Now that I call customer care. No registrations, no support agreements, just go to the website, download and update. No doubt, my next home AP will be Asus. Not because they'd be technically ahead of others, but because they listen and care about their customers.
Michael Brado, Official Rep
- 2650 Posts
- 365 Reply Likes
Michael Brado, Official Rep
- 2671 Posts
- 368 Reply Likes
Resource Center page:
https://support.ruckuswireless.com/krack-ruckus-wireless-support-resource-center
There are SmartZone updates for 3.1.2, 3.2.1, 3.4.2, 3.5.1, ZoneDirector 9.7.2, 9.8.3,
9.9.1 (12/22/17), 9.10.2, 9.12.3, 9.13.3, 10.0.1, Unleashed 200.5, Ruckus Cloud 17.01b42
Xclaim 2.2.0.0.39, and P300 100.1 and yesterday zf7731 9.2.0.0.181 for Point to Point bridges.
We've also posted SmartZone AP CLI scripts to diable EAPOL retries in zone versions
3.1.2, 3.2.1, 3.4.2, 3.5.1, and 3.6.0 to provide protection to vulnerable wireless clients.
- Michael
Related Categories
-
ZoneDirector
- 2439 Conversations
- 676 Followers
-
Ruckus Indoor APs
- 1555 Conversations
- 641 Followers
-
Ruckus Outdoor APs
- 503 Conversations
- 353 Followers
-
Mobile Apps
- 91 Conversations
- 55 Followers
-
FlexMaster
- 113 Conversations
- 48 Followers
-
ZonePlanner
- 53 Conversations
- 33 Followers
-
Community & Online Support Services
- 261 Conversations
- 98 Followers
-
General Wireless Questions
- 486 Conversations
- 333 Followers
-
SmartZone and Virtual SmartZone
- 597 Conversations
- 326 Followers
-
SmartCell Access Points
- 136 Conversations
- 67 Followers
-
SmartCell Insight (SCI)
- 76 Conversations
- 64 Followers
-
Ruckus Cloud Wi-Fi
- 111 Conversations
- 93 Followers
-
Ruckus Unleashed
- 576 Conversations
- 300 Followers
-
Cloudpath ES Security system
- 52 Conversations
- 50 Followers
David Ogden