Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Yes - the device can be configured securely manually for this EAP type

Deficient - the device lacks important security features, but workarounds exist which can make its use safe

Insecure - the device can be configured manually for this EAP type, but not all security parameters can be set up

...

? - Unknown

TPS - supported with thirdThird-pary software Party Software (possibly commercial)

 


Compatibility Matrix

Device/OS Vendor

Device/OS

Version

TTLS-PAP

PEAPTTLS-MSCHAPv2TLSPWDTTLS-GTC
TLS

FAST

Android

tested on:

Samsung Galaxy S2

Huawei Sonic u8650

2.3
Insecure
Deficient[1]Deficient[1]
Insecure
Deficient[1]
?
Deficient[1]?
?
Deficient[1]?
Android

tested on:

Motorola Xoom2

4.0+
Insecure
Deficient[1]Deficient[1]
??
Deficient[1]Deficient[1]?
?
Deficient[1]?

Apple

iPhone

iOS 4.0+

CAT

CATCATYesNoYes

Yes

Apple

iPad

iOS 4.0+

CAT

CATCAT YesNoYes

Yes

Apple

iPod touch

iOS 4.0+

CAT

CATCATYesNoYes

Yes

AppleMac OS X10.7+CATCATCATYesNo?Yes
?
AppleMac OS X10.4-10.6Yes[4]Yes[4]Yes[4]Yes[4]No?Yes[4]
BlackberryPlaybook OS2Yes?????

?

LinuxNetworkManager
 

CATCATCATCATNo?
CAT
?
Linuxwpa_supplicant
 

CATCATCATCATYes[2]
CAT
YesYes

Microsoft

Windows

XP SP3

CAT
TPSYes
?
TPSYesNoTPS

TPS

Microsoft

Windows

Vista

TPSCATTPSCAT
?
CATTPS
Yes

TPS

Microsoft

Windows

7

TPSCATTPSCAT
?
CATTPS

Yes

TPS

MicrosoftWindows8 / 8.1CATCATCATCATCAT?

?

MicrosoftWindows10CATCATCATCATCAT?
Yes
?
MicrosoftWindows Phone7.xNo
Insecure[3]?No???
MicrosoftWindows Phone8.xNoDeficient[1]?
Yes
????
MicrosoftXboxallNoNoNoNoNoNoNo
MicrosoftXBoxONEallNoNoNoNoNoNoNo

Nokia

Symbian OS

Series 6

No

Yes?Yes?Yes

No

NokiaSymbian OS9.xYesYes?Yes?YesNo
BlackberryPlaybook
SonyPlaystation3 (PS3)allNoNoNoNoNoNo

No

SonyPlaystation4 (PS4)allNoNoNoNoNoNo

No

JollaSailfish OS2Yes
??
Yes Yes Yes???

[1] Installation and pinpointing of CA possible; verification of expected server name (CN) not possible. A secure configuration is only possible if the Identity Provider deploys a private CA which issues exclusively server certificates for his own eduroam EAP servers. All other Identity Provider deployments are INSECURE.

[2] Version 1.0 or higher required

[3] Verifying that the server is signed by the proper CA is not possible; this means users will not be able to detect fake hotspots and might send their username/password to an unauthorised third party.

[4] Only with 10.6.x (Snow Leopard) and later does OSX allow the configuration of of CA/server trust settings (Pinning 802.1X to specific CA and RADIUS server CommonName)

Reporting a new device

Please let us know in the "Comments" field what device you have, and what EAP method(s) you have found working. We will update the list periodically.