- This topic has 50 replies, 20 voices, and was last updated 6 years ago by GrahamS.
-
Wifi insecurity
-
bensalesFree Member
There’s a key point missing from the Grauniad’s report that is on The Register’s (https://www.theregister.co.uk/2017/10/16/wpa2_inscure_krackattack/)
the attacker would have to be on the same base station as the victim, which restricts any attack’s impact somewhat.
Which basically means, your network would already need to be compromised in order to compromise devices on your network.
Not that it shouldn’t be taken seriously, and given CVEs are being issued, vendors will be working on patches as soon as they can, but it’s not like every scrote in the neighbourhood is suddenly going to start cracking your network.
dangeourbrainFree Memberseosamh77 – Member
So what’s the idiot proof fix?Turn it off.
As a warning it’s up there with “you’re going to die at some point” for most people.
mikewsmithFree Memberseosamh77 – Member
So what’s the idiot proof fix?First who is hacking your wifi?
Second wait for an update, always install updates.
third who is attacking your wifi?The attack needs to be close enough to get the signal and have some time to work on it, so the hacker needs to be in reasonably close proximity to you for the time to do it and then remain there to collect the information.
How far does your wifi extend?
Do your neighbours work have a lot of PC’s and never go outside?maccruiskeenFull MemberWhich basically means, your network would already need to be compromised in order to compromise devices on your network.
At home or work yes- but people use WiFi in all sorts of place that they don’t manage
Is it the base station that is the vulnerable or is the issue of traffic betweem the base station and connected devices can be intercepted?
mikewsmithFree MemberIs it the base station that is the vulnerable or is the issue of traffic betweem the base station and connected devices can be intercepted?
If you are using public wifi – even with a login etc in a hotel expect that it is not fully secure.
This is specifically about WPA2 Encryption between you and the base station (WEP is already breakable) in which situations are you using that connection – if they are handing out the password for nothing then who knows who is on there)
zokesFree MemberFirst who is hacking your wifi?
I think it’s more the concept that what was once considered safe is now far less so.
Still using WEP? Thought not…
seosamh77Free MemberThe attack needs to be close enough
aye I get that.
Will isps send out a fix for routers, or does it mean new routers?
mikewsmithFree MemberOi Zokes do the full quote so it makes sense!!
that was in response to what’s the quick fixFar less safe for me is an interesting one, from here I can only just pick up the neighbor’s wifi, in apartments more so but you need to have the physical proximity to execute this – that leads to motive and time to do it, yes there is a vulnerability but for most practical home uses it’s not massive and not going to bring everything down.
BaronVonP7Free MemberWill isps send out a fix for routers, or does it mean new routers?
I think it’s a client thing (or more likely client & base station).
I.e. your phone, Chromecast, laptop & robo-butler will need updating (as well as the base station).
dirtydogFree MemberSo what’s the idiot proof fix?
One of these whenever possible
amediasFree Memberfrom here I can only just pick up the neighbor’s wifi, in apartments more so but you need to have the physical proximity to execute this
Well that’s fine and dandy for you….I live on an unremarkable terraced street in a small city in Devon, so hardly bustling metropolis, I can pick up no less than 28 identifiable SSID’s from the front of the house, and 23 from the back, there’s also another handful that I can see but not advertising.
Also the attacker doesn’t need to be close, only their device needs to be, it might not be a big deal for you at home (it might though, who knows!) but it’s a big deal for some people and given how small, mobile and easily hidden devices are the ‘they need to be close’ is no more relevant than it ever was.
As always normal rules apply, if you don;t run the network, assume anything you transmit or receive is potentially available to others, so if it’s important make sure it’s protected in other ways. If you do control the network then normally you could assume less chance**, but now you might as well assume if someone wants it* they can get it, so as before, prtoect in other ways.
*this is important, as for most people nobody gives two hoots what you’re doing. But obviously for sensitive information take precautions like you would on a public network until it’s patched.
**still out of your control once it’s in transit so as above…
wobbliscottFree MemberI thought most routers have MAC address access so you can configure it to just allow access for specific devices.
Also you can make your SSID not visible which might make it more secure against the causal opportunistic hacker.
GrahamSFull MemberI thought most routers have MAC address access so you can configure it to just allow access for specific devices.
That’s true and it is worth doing – but it is trivial for a proper hacker to spoof a MAC address:
https://en.wikipedia.org/wiki/MAC_spoofing
Also you can make your SSID not visible which might make it more secure against the causal opportunistic hacker.
Completely pointless IMO. Only makes it harder for legit users.
BaronVonP7Free MemberRegarding cable networks: Perhaps not as safe as it seems.
How many cable based network segments offer encryption?
Not many, i’d guess.
amediasFree MemberI thought most routers have MAC address access so you can configure it to just allow access for specific devices.
have? yes
configured? unlikely
foolproof? nopeMAC filtering is just another layer of protection that you could use, it has it’s upsides and downsides like most options, and it’s not unbeatable. As always it comes back to your personal risk level, if your data is genuinely a target for someone then MAC filtering ‘aint gonna stop them.
It’s one of those ‘stops novice users’ but ‘trivial for techies’ things, and lets be honest, anyone attempting to intercept traffic for nefarious reasons is unlikely to be a novice user, chances are though, they also don’t care about your home wifi as you’re not a good target.
mikewsmithFree MemberSorry, what I mean is close, motivated, invested in tech and time, know about the vulnerability, be able to execute it and pick their target.
I assume most people here had wep while that was vulnerable too.
If I was going to invest my time in this I’d probably be looking for a corporate target or somebody I knew was dodgy enough to blackmail already.
You have 2 choices really at present.
Stop using WiFi.
Carry on but be a little aware.The biggest impact will probably be on mobile data speeds if people swap back to that.
bensalesFree Membermaccruiskeen – Member
At home or work yes- but people use WiFi in all sorts of place that they don’t manageIs it the base station that is the vulnerable or is the issue of traffic betweem the base station and connected devices can be intercepted?
Agreed. I’ve only skimmed the material, but it looks like it’s the initial handshake between the client and base station that’s now vulnerable. But what the attacker could then do to the client I’m not quite clear on.
In the public wifi scenario, one should always be practising decent security and using a VPN anyway, otherwise you must assume you can be eavesdropped.
CougarFull MemberI thought most routers have MAC address access so you can configure it to just allow access for specific devices.
Also you can make your SSID not visible which might make it more secure against the causal opportunistic hacker.
Neither of those steps are any sort of security at all. It’s akin to removing your door numbers so that burglars can’t find your house.
brassneckFull MemberYou have 2 choices really at present.
Stop using WiFi.
Carry on but be a little aware.Or use a VPN on untrusted connections
GrahamSFull MemberAnd make sure you choose a good password:
[video]https://www.youtube.com/watch?v=bLE7zsJk4AI[/video]
😉
GrahamSFull MemberBlimey, ESP8266/Arduino has been patched already. That was quick!
https://twitter.com/i_grr/status/919872443329650689Suggests that it isn’t too hard to sort out. But I bet it’ll still be months if not years before many consumer devices get patched (assuming they are still actively supported).
rossburtonFree MemberThe vendors have known about this for months, Apple shipped their patches for macOS/iOS/etc weeks ago.
My expectation is that if the vendor doesn’t patch this week, they won’t.
footflapsFull MemberSuggests that it isn’t too hard to sort out.
It was a very simple bug in the set up algorithm. The underlying encryption was fine, just it could be bypassed or tricked into using a known key during the key exchange process.
deadkennyFree Memberbrassneck – Member
Or use a VPN on untrusted connectionsDoesn’t help. Your connection to the access point will still be vulnerable, getting someone access to your device and they can snoop on the unencrypted end of the VPN connection, i.e. your device.
Not that this is in the wild and it requires a malicious hack from someone nearby at present (until some malware virus spreads about auto hacking, but it requires other vulnerabilities to spread).
There’s a risk, it’s really quite low at the moment, and it’s mostly patched already.
Problem in the main is with Android due to extra flaws in 6+ and device fragmentation & manufacturer lock in. Those not on a pure(er) Android could take months, years or maybe never get an update.
Even when the hack goes wild, it requires a deliberate hack from someone nearby or a virus with the hack to distribute to the network of the access point you are using, which needs further vulnerabilities to exploit.
rossburtonFree MemberA VPN will help, as any traffic over wifi is inside the VPN. Unless you’re running a VPN from your router, which seems a bit pointless.
GrahamSFull Memberthey can snoop on the unencrypted end of the VPN connection, i.e. your device.
How does that work? The VPN connection is made by my device, so surely my device is doing the decryption of the VPN traffic? I can’t see how this would let a hacker access that.
aracerFree MemberMy understanding is that it allows an attacker to then have access to all wifi traffic, effectively nullifying the encryption. If somebody is attacking on a public wifi hotspot using WPA2 then it makes it no more secure than a public wifi network with no encryption. So treat any encrypted network as if it is unencrypted and rely on end-to-end encryption (ie https or a VPN) for anything important.
VPNs aren’t vulnerable to attack unless you’re sharing keys over your wifi network, which I can’t see any reason why you would – any form of end-to-end encryption removes your vulnerability.
The only issues due to this are when you’re relying solely on WPA2 for security – the most obvious one I can think of is if you’re sharing content over your wifi that creates a vulnerability. I suppose anything like a RPi you connect to over wifi is also vulnerable given that id and password go in clear only protected by WPA2.
deadkennyFree Memberrossburton – Member
A VPN will help, as any traffic over wifi is inside the VPN. Unless you’re running a VPN from your router, which seems a bit pointless.GrahamS – Member
How does that work? The VPN connection is made by my device, so surely my device is doing the decryption of the VPN traffic? I can’t see how this would let a hacker access that.Because while VPN is providing a tunnel for your Internet traffic and they can’t snoop on that on the wire, with WPA2 hacked they have access to client devices on the same network and in theory can access the device contents, use a key logger or monitoring software etc. It’s like using VPN but someone is watching over your shoulder or has physical access to your device.
In theory. It would require a bunch of other vulnerabilities on the device to exploit though.
Thing with VPN is while your Internet traffic is being encrypted, you are also still on the local network you have connected to and there is traffic there, and you are an authorised device on that network so potentially visible if not hackable to other devices. It’s why on any public or untrusted network, on top of VPN you should have every firewall enabled (difficult to do on a phone) and disable any kind of network sharing, visibility on the local network etc.
GrahamSFull MemberHmmm… surely the whole point of a VPN is that it doesn’t matter if you are using unsecured wifi or a dodgy hotel ethernet that anyone can be listening in on?
Defeating the WPA2 encryption just brings the network to that level doesn’t it?
footflapsFull Memberwith WPA2 hacked they have access to client devices on the same network and in theory can access the device contents, use a key logger or monitoring software etc
Not at all. They can try and access the device, but they would need a zero day vulnerability to get access. Being on the same LAN as a computer does not give you access to its contents.
aracerFree MemberIndeed – an attacker gets access to your Wifi packets (and can inject rogue Wifi packets), but that doesn’t automatically provide a means to attack anything else. Where this might become an issue is if another vulnerability to wifi packet injection is found. It may be that the bad guys haven’t looked too hard at this one before as there hasn’t been an easy way to use any wifi packet injection exploit on most networks – but then there are still plenty of unencrypted public networks with plenty of targets on them.
Fundamentally as I mentioned above, if you just consider all wifi networks to be unencrypted then it shouldn’t be a problem. Just don’t send anything important over http.
deadkennyFree Memberfootflaps – Member
Not at all. They can try and access the device, but they would need a zero day vulnerability to get access. Being on the same LAN as a computer does not give you access to its contents.Indeed, but it’s a lot more vulnerable, and depends how patched up you are.
It’s like at home you’re comfy knowing all your devices on your network are your devices, but with WPA2 vulnerable you may have an intruder on your network potentially. Worse at home as some operating systems will trust other devices on the network, e.g. Windows when it asks if you’re on a trusted home network, which means it opens a lot of firewall holes.
You also have other less secure devices on your network possibly. Out of date router software, printer, smart TV, IoT devices.
In short, don’t just trust VPN for security. It only secures the traffic.
GrahamSFull MemberIt’s like at home you’re comfy knowing all your devices on your network are your devices, but with WPA2 vulnerable you may have an intruder on your network potentially.
But as I understand it, an attacker would still have to be able to join that network BEFORE they can run this attack?
So they’d need to crack my wifi password as well and spoof an approved MAC address. By which point they’d be on my network as an “approved” device regardless of the WPA2 attack.
aracerFree MemberI think the issue is that an attacker doesn’t need to join the network as such – if there is a vulnerable device on your network then they can not only intercept wifi traffic to and from that device, they can also inject wifi packets which will appear to come from that device. Hence they are then effectively on the network.
deadkennyFree MemberI believe you don’t need to be on the network to exploit it. However the question is whether it’s possible to exploit the packets enough to get network access without requiring the wifi password. Apparently the hack doesn’t expose the password itself, but with vulnerable clients you’re seeing unencrypted network traffic so potentially you could be on the network. You won’t be able to decrypt VPN traffic however.
Edit: what @aracer said.
I’m speculating about the network vulnerability, but as I say, I wouldn’t just trust VPN is enough to protect you.
That said, it seems this isn’t in the wild yet, and tricky to exploit anyway.
GrahamSFull MemberAh okay thanks aracer.
I watched the demo video and they are creating a clone of the AP on a different channel, what I didn’t quite get was how that works when a password is required to access the AP?
[video]https://youtu.be/Oh4WURZoR98[/video]
Also in the video they discuss using ssl_strip to force non-SSL versions of websites where possible, which defeats that nicely. VPN still seems to be secure as far as I can tell, but I don’t have time to delve too deeply so I’m just going by what the press coverage says.
The topic ‘Wifi insecurity’ is closed to new replies.