Here’s a link to find which ASUS routers support WPA3. It’s an official ASUS website that links you to the WiFi Alliance.
That list seems to be incomplete, as it doesn't even list my AX58U as wpa3-capable, even though I'm currently running in WPA3-only mode, and my router even is listed as a WPA3-router on asus.com own website:
Asus routers with WPA3
Mcmxmk19:
I made a mistake by recommending running WPA3/WPA2 mixed. Only run this mode if you have a “certified” router (still, only do it at your own risk). Which again can be found in the link.
Yes, that's why I don't run in WPA3/WPA2 mixed mode due to the downgrade vulnerability. I run in WPA3 (with PMF) only-mode.
Also, isn't it fair to assume then that
WPA3 with PMF is safer than WPA2 with PMF, since the best and most effective way of breaking WPA3 is by downgrading a mixed WPA3/WPA2 network to WPA2-only and then deploy currently available exploits for WPA2 to break into the network?
I don't understand the argument that WPA2 with PMF is any safer than WPA3 with PMF, when the above is the case. But you seem smart, so maybe you can explain it to me
Mcmxmk19:
It’s because WPA3 was not secure. The updates were not backwards compatible and took time to release. It would of been a marketing nightmare for ASUS. It was easier to not deploy the feature as opposed to deal with the headache.
From what I understood it's mostly due to weak hardware in IoT things, and not some special hardware piece that's necessary for the WPA3-december-2020-fixes. If I understood what I read on
Dragonblood flaws by Mathy Vanhoef the reason the WPA3-fixes isn't backwards compatible is because the "time based side channel leak"-attack-fix requires fast hardware to run.
The reason is that in order for the wifi-password check to run, iirc a fixed 40 checks no matter what, has to be run, even though the password check (on a fancy Diffie-hellman curve) would have taken just 3 or 4 runs. Some attacker could therefore "easily" guess the password if it knew how many runs it would take for the WPA3 router to authenticate the password, but by setting all "checks" to run 40 times, it's impossible to guess the password. But since running it 40 times supposedly is tough on weaker hardware such as IoT-devices, it's deemed "not backwards compatible". Or have I got it all wrong?
Mathy vanHoef:
Should I use WPA3?
If vendors don't come up with a better variant of WPA3, then you should switch to WPA3 once it is available. After all, we hope that vendors will mitigate most of our attacks, meaning WPA3 will still be an improvement over WPA2. However, there's still a risk that lightweight devices will be unable to implement all countermeasures due to their high overhead.