Major Flaw in Wi-Fi Protected Access Discovered

Page 2 of 2 FirstFirst 12

  1. Posts : 4,049
    W7 Ultimate SP1, LM19.2 MATE, W10 Home 1703, W10 Pro 1703 VM, #All 64 bit
       #10

    That's correct


    Qdos said:
    I'm a little confoosed... what I'm seeing in the news concerns the weakness of the WPS PIN for assigning a security key across wireless devices from a router which is WPS equipped.

    Many months ago there were claims of WEP security being crackable.

    Most of us know to use stronger methods of encryption.

    The present issue appears to relate uniquely to WPS and the PIN number generated as being vulnerable.

    Wi-Fi Protected Setup easily unlocked by security flaw ? The Register

    From the pdf I linked to above (edited)
    Major Flaw in Wi-Fi Protected Access Discovered-wps-broken-2.png Major Flaw in Wi-Fi Protected Access Discovered-wps-broken.png
    PIN-based WPS (Easy Setup) is vulnerable to a "brute force" attack.


    These security methods (access control and data encryption) are also broken/ineffective:

    • SSID Hiding.
    • MAC Filtering.
    • WEP.
    • WPA-TKIP.

    Only CCMP (AES) is still considered secure.


    It seems like almost everything related to wireless security/setup is:


    • Broken.
    • Defective.
    • Ineffective.
    • Poorly designed/implemented.
      My Computer


  2. Posts : 365
    Windows 10 Pro - 64 bit
       #11

    why not just set the set up to MANUAL in the router . problem fixed ? Or is that too simple ?
    Attached Thumbnails Attached Thumbnails Major Flaw in Wi-Fi Protected Access Discovered-capture.jpg  
      My Computer


  3. Posts : 3,960
    W7 x64
       #12

    All the more reason for a router that hides a VLAN without a WPS configuration...
      My Computer


  4. Posts : 2,528
    Windows 10 Pro x64
       #13

    lehnerus2000 said:
    It seems like almost everything related to wireless security/setup is:

    • Broken.
    • Defective.
    • Ineffective.
    • Poorly designed/implemented.
    While I'd argue the converse - all of the specs are basically open and documented, and everything is (ultimately) in the clear rather than over a wire, making security a moving target rather than something to be considered forever and unchanging. Wireless should be a combination of security - as secure a cipher and password as your router and devices that attach can all handle (and preferably one not automatically generated from a password or hash, but manually entered), some sort of device filtering, and network security at the OS networking level in addition to the wireless encryption (like IPSEC between hosts). As with anything, the only way to be truly secure is to not connect to a network - once you do, you do your best, be vigilant, and take your chances. And to those that don't, they run that risk of ending up getting hacked in some way, and there's not a whole lot you can do about or for them at that point either.
      My Computer


  5. Posts : 4,049
    W7 Ultimate SP1, LM19.2 MATE, W10 Home 1703, W10 Pro 1703 VM, #All 64 bit
       #14

    The trouble is ...


    Total said:
    why not just set the set up to MANUAL in the router . problem fixed ? Or is that too simple ?
    Qdos said:
    All the more reason for a router that hides a VLAN without a WPS configuration...
    That might be easy enough for us to do, but we aren't the people that WPS (Easy Setup) was aimed at.
    The ordinary user would be completely baffled (if not terrified) by the idea of "screwing" with the settings.

    Ordinary computer users could do it if someone walked them through it though.

    cluberti said:
    While I'd argue the converse - all of the specs are basically open and documented, and everything is (ultimately) in the clear rather than over a wire, making security a moving target rather than something to be considered forever and unchanging. Wireless should be a combination of security - as secure a cipher and password as your router and devices that attach can all handle (and preferably one not automatically generated from a password or hash, but manually entered), some sort of device filtering, and network security at the OS networking level in addition to the wireless encryption (like IPSEC between hosts). As with anything, the only way to be truly secure is to not connect to a network - once you do, you do your best, be vigilant, and take your chances. And to those that don't, they run that risk of ending up getting hacked in some way, and there's not a whole lot you can do about or for them at that point either.
    It is fair enough that security systems fail, when attacked by innovative strategies.
    The trouble is security systems are still falling to ancient attack strategies.

    Remember the "War Games" movie (1983)?
    The kid hacked into a military super computer (via the telephone system) using a "brute force" attack!
    Hollywood didn't invent the concept, it was based on reported real life incidents.
    Why are systems still falling to that type of attack 29 (or more) years later (WPS)?

    I'm always reading comments blaming wireless users, when their privacy/security is compromised.
    Now we discover that even if the user was doing the right thing, it was futile, because the system designers and manufacturers screwed up.

    Some of the problems are due to the improvements in computer technology though.

    How many times more powerful is a modern PC, compared to the original PC?

    There was a time, when the idea of someone cracking a 128-bit encryption key (in a short time) was laughable.
    Now 2048-bit is considered barely adequate.
    It probably won't be too long, before 2048-bit encryption is considered a joke.
    Last edited by lehnerus2000; 01 Jan 2012 at 01:32. Reason: Quote Added
      My Computer


  6. Posts : 7,781
    Win 7 32 Home Premium, Win 7 64 Pro, Win 8.1, Win 10
       #15

    No matter how secure you make something, someone, somewhere, is going to find a way around it, be it on purpose or by accident. That's been proven multiple times in the last few years & you can bet that it's going to continue.

    BTW, if you have a Netgear router & you updated to the latest firmware version (V1.1.1.58), there is a major flaw in that. Anyone behind the router can now login to the router WITHOUT a password, and this flaw extends to the wi fi aspect of it. They've been informed of this little glitch, but have yet to fix it. If you upgraded, best to re-install the old firmware.
      My Computer


  7. Posts : 3,960
    W7 x64
       #16

    Borg 386 said:
    Anyone behind the router can now login to the router WITHOUT a password, and this flaw extends to the wi fi aspect of it. They've been informed of this little glitch, but have yet to fix it. If you upgraded, best to re-install the old firmware.
    I sincerely hope you mean LAN side only...
      My Computer


  8. Posts : 2,528
    Windows 7 x64 Ultimate
       #17

    lehnerus2000 said:
    There was a time, when the idea of someone cracking a 128-bit encryption key (in a short time) was laughable.
    Now 2048-bit is considered barely adequate.
    It probably won't be too long, before 2048-bit encryption is considered a joke.
    Just a small FYI on this one.

    128 is still (currently) secure and refers to private key encryption like what is used on WiFi.

    The 2048 bit keys are for public key encryption (like you would add to an email if you wanted someone to send you back something encrypted) and contain a lot more information to make the "public" process work so it isn't really that meaningful as a stand alone bit length number.

    I do agree that most of the WiFi problems have been from very poor and untested implementations foisted on the public. Combined with ridiculous regulations imposed by governments that fear encryption use even over a distance of 20 feet. But most of the problems have been from piss poor design and implementations of things that should have been taken seriously from the start.
      My Computer


  9. Posts : 4,049
    W7 Ultimate SP1, LM19.2 MATE, W10 Home 1703, W10 Pro 1703 VM, #All 64 bit
       #18

    Fair enough


    fseal said:
    lehnerus2000 said:
    There was a time, when the idea of someone cracking a 128-bit encryption key (in a short time) was laughable.
    Now 2048-bit is considered barely adequate.
    It probably won't be too long, before 2048-bit encryption is considered a joke.
    Just a small FYI on this one.

    128 is still (currently) secure and refers to private key encryption like what is used on WiFi.
    You mean CCMP(AES)?
    Sure (unless there is some implementation flaw).

    My bad.
    I wasn't specifically refering to CCMP(AES).
    I meant bit length in general (more bits = more secure).

    I still think that it will only be a few years before 128-bit will have to be replaced.
    "Botnets", "Grid Computing" and "Moore's Law" basically guarantee it.

    Hashes were considered to be reasonably secure.
    Now GPUs can smash them (i.e. create a password that matches a given hash) in a very short time (if you can get access to the hash file).
    Cheap GPUs are rendering strong passwords useless | ZDNet

    fseal said:
    The 2048 bit keys are for public key encryption (like you would add to an email if you wanted someone to send you back something encrypted) and contain a lot more information to make the "public" process work so it isn't really that meaningful as a stand alone bit length number.
    Presumably 2048-bit isn't impossible to crack even now.

    On my networking course, when we set up the procedure (you mentioned above) Linux offered us 4096-bit as an option.
    We were specifically told that it is illegal for us to use that level of encryption, because the Government wants to be able to read your secret data.

    fseal said:
    I do agree that most of the WiFi problems have been from very poor and untested implementations foisted on the public. Combined with ridiculous regulations imposed by governments that fear encryption use even over a distance of 20 feet. But most of the problems have been from piss poor design and implementations of things that should have been taken seriously from the start.
    Agreed.
    The "Brute Force" issue reminds me of "Buffer Overflow" errors/exploits.
    These problems have been known for years and yet they still keep happening.
      My Computer


 
Page 2 of 2 FirstFirst 12

  Related Discussions
Our Sites
Site Links
About Us
Windows 7 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 7" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 06:55.
Find Us