Apple Event: May 7th at 7 am PT

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

IPhone does not support WPA-2 This is the common security used and Apple needs to put this encryption in the IOS

This definandty needs to be adressed and wep security is a bullet hole.... you can get thru it with a bb gun. So the more routers that go WPA-2 only the more I-Devices will not work with hotspots.


Also the new IOS will not save net passwrods.....; do not upgrade at this time. I am also told there is other issues with the new IOS

iOS 7.1

Posted on Apr 16, 2014 8:04 PM

Reply
6 replies

Apr 16, 2014 8:15 PM in response to Johnathan Burger

http://support.apple.com/kb/ht4199

iOS and OS X: Recommended settings for Wi-Fi routers and access points


"Security

Set to WPA2 Personal (AES)

Description The security setting controls the type of authentication and encryption used by your Wi-Fi router. This setting allows you to control access to your wireless network, as well as to specify the level of privacy you'd like to have for data you send over the air.

More details WPA2 Personal (AES) is currently the strongest form of security offered by Wi-Fi products, and is recommended for all uses. When enabling WPA2, be sure to select a strong password, one that cannot be guessed by third parties.

If you have older Wi-Fi devices on your network that don't support WPA2 Personal (AES), a good second choice is WPA/WPA2 Mode (often referred to as WPA Mixed Mode). This mode will allow newer devices to use the stronger WPA2 AES encryption, while still allowing older devices to connect with older WPA TKIP-level encryption. If your Wi-Fi router doesn't support WPA/WPA2 Mode, WPA Personal (TKIP) mode is the next best choice.

Note that the use of WEP is not recommended for compatibility, reliability, performance, and security reasons; WEP is insecure and functionally obsolete. However, if you must support legacy WEP devices and you have a newer (802.11n) Wi-Fi router, you may be able to select the WEP Transitional Security Network (WEP TSN) security mode. This mode will allow legacy WEP clients to join your network with WEP encryption while allowing newer devices to use more modern and secure encryption modes, such as WPA TKIP or WPA2 AES. If WEP TSN mode is not supported, then WEP128 with Shared Authentication should be used (with a single WEP key in key index 1). For compatibility reasons, WEP128 networks should use 13-character ASCII passwords.

For reference, "None" or unsecured mode, provides no authentication or encryption. If you use this security mode, anyone will be able to join your Wi-Fi network, use your Internet connection, or access any shared resource on your network. In addition, anyone will be able to read any traffic you send over the network. For these reasons, this security mode is not recommended.

Note: Due to serious security weaknesses, the WEP and WPA TKIP encryption methods are deprecated and strongly discouraged. These modes should be used only if it is necessary to support legacy Wi-Fi devices that don't support WPA2 AES and cannot be upgraded to support WPA2 AES. Devices using these deprecated encryption methods will not be able to take full advantage of 802.11n performance and other features. Due to these issues the Wi-Fi Alliance has directed the Wi-Fi industry to phase out WEP and WPA TKIP.

May 25, 2014 11:22 PM in response to Johnathan Burger

What configuration are you using? I am using ICS windows 7, I am a tech for 30 years wpa-2 is not even a listed security mode in the IOS. This is an ad-hoc repeater configuration so as per par with apple they do not test the strainge and unusual setups that will be used. The only mode that shows up is wep and yes I tested this all ways and plays and it will not (the IOS) support wpa-2 on an ad-hoc network.



As for passwords the latest IOS as of 2 weeks ago was updated by roomie and the option to save the passwords went bye bye. Just to run a dbl check I hit a mall with every I phone dealer (Yes the I-store included) and they are telling their customers that Apple is working on the problem do not up date the IOS at this time. I eat sleep and live security both as an alarm agent and as an IT specialist that is why I have to use a pseudonym online as it would put Police servers at risk. As well as hard copies.


So yes connections direct to a router MIGHT work but at this time to a Windows 7 AD-hoc network they wont and I have verified this with my insiders at various high profile companies including Microsoft. The I phone will not support WPA-2 Using ICS and AD-Hoc as a daisychaned repeater chain from the closest WI-FI connected pc thru the AD-Hoc chain.


His PS-3 does support wpa but does not pickup the repeater on when I downgraded to wep as it is pretty much obsolete it no longer saw the AD hoc net. But the I-Phone finally saw and connected to the ad-hoc repeater. It will see the ad-hoc at WPA2 but it wont connect for ****. I do not know if this is an isssue with the way ICS communicates with the Iphone but I will test mixed mode just to rule that out it should default to mixed but I will confirm that it is.


I have also tested an android with WPA and it works fine and saves passwords even with mixed mode off and the SSID broadcast disabled. I have to maximise security on this network and No the Iphones latest IOS will not work with all the bells and toys turned on.


My Iphone is working fine as I have not updated it to the new IOS both in saving passwords and in wpa-2 end of line.


BTW I was back room burning roms so most of you were still in diapers when I was doing that for the very 1st compatibles to hit the market and this was pre Phoenix BIOS which was the 1st legit BIOS to hit the market and I also worked on 30,000 dollar touch screens that connected directly to mainfraimes. Not nickle and dine servers.


So when you can prove that experience level come talk to me about what works and does not. TY

May 25, 2014 11:39 PM in response to Kidrocksbodydbl

Btw I would be careful about what you accuse people of had I used my real name my teams of lawyers would be all over you for Liable and I would end up owning apple. Then selling it off to the highest bidder because I have had huge problems with IOS updates that even your techs in Texas have verified and told me they were working on panic fixes for those issues.


Panic fixes lead to more and more glitches, I have managed software development and when my programmers come to me and tell me of a patch jury rig fix I tell them to re-write the entire module that is causing the problem, This is called due dilligence so you do not have problems snowballing and turning into muli-million dollar lawsuites.


Test this problem using the same platform I am using which is a daisy chained ICS AD hoc network. I have thrown every Wi-FI device in the book at it and the only exemption to that is Microsofts Surface and I will even go as far as to get my hands on one to rule out problems with that.


At the end of 3 servers the 3rd being out of WI-FI range of the primary WI-FI ROUTER all other devices are working perfectly. So with the maturity level you have shown it is time to get out of potty training and update to the latest IOS, (it was at that point his I-phone stopped updating passwords) Mine is still saving them because i have not updated, and grow up and do some real world IT debugging.

May 25, 2014 11:57 PM in response to Kidrocksbodydbl

This is unrelated but my experience goes all the way back to the apple computers and the floppy disc drives used even then they had design problems. You can verify this if you have an old apple II and drive kicking around. This was in the days everyone but apple keyed there connectors so you could only plug them in the right way.


Apple did not even mark the connector properly with the pin 1 to pin 1 orientation, I plugged it in backwards as I was in a rush and did not look at the mobo for the pin 1 marking (happens to the best and worst of us), As a result it fried the LS-0?????? chip, this chip was impossible to find. But this is just one small example and something you can go back and check. It took too many drives replaced under warranty before Apple redesigned their connectors so they cannot be plugged in in reverse it started with the simple fix of cutting an unused pin on the board and filling that hole in the connector.


*Note that chip was socketed in the floppy drive for easy replacement. I pulled the chip out of a spare drive and the drive worked fine this was at the age of 15 so that is when my board level talents started.


Apple knew about the problem and that is why they socketed the chip rather then change all the apple 2 mobo connectors so they are polarized



So do your homework and check that item out then tell me I am full of it.


Seya wouldn't want to be ya

IPhone does not support WPA-2 This is the common security used and Apple needs to put this encryption in the IOS

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.