Hi Martin.
16 chars or more would be my recommendation.
EAP-TLS would be the safest connection method.
I cannot see from your post if we are talking about AOS with controllers, Instant AP setup or with/without ClearPass.
MPSK was initially only possible with ClearPass Policy Manager.
MPSK local is posshbiel with IAP 8.7 software on the Aruba Access Points with some limitations.
Release Notes.
https://support.hpe.com/hpesc/public/docDisplay?docId=a00101270en_usAnyway in regards to the general question of brute force, MPSK suffers as PSK do.
I would like to see my good options of certificate management, BYOD/MDM that could enable EAP-TLS for more devices.
Lot of IoT devices will not have a 802.1X supplicant so we still needs way to handle these.
------------------------------
Tom Roholm
------------------------------
Original Message:
Sent: Nov 15, 2020 08:52 AM
From: Martin Rodriguez
Subject: MPSK - Security discussion
Hi community. I hope I am using the right discussion group. I would like to discuss how this feature MPSK, DPSK, iPSK can be secure if we are assigning multiple PSK to the same SSID helping brute force attack in a way that maching the write password would be easier. I understand that a good 8 character long WPA2 password could be extremely hard to find, however my concern is that this is becoming a standar to increase security and an option to not implement 802.1x that many thinks is complex. I would like to know what am I missing and your opinion about this. Thanks!
------------------------------
Martin Rodriguez
------------------------------