Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 | 3 | 4 | 5 | 6
3049 posts

Uber Geek
+1 received by user: 902

Trusted
Subscriber

  Reply # 1885174 17-Oct-2017 15:50
Send private message

Paul1977: So, the consensus is that patching the AP only plugs a small part of the hole, and no matter what you do with your AP (short of turning it off) the client devices are vulnerable even when connected to a patched AP?

 

My understanding is a patched AP will not reissue a key but an unpatched client is capable of receiving one, which is what the attacker does - sends a zero (0) key to the client. Whether or not the patched AP would recognise this has occurred and refuse further comms I'm not sure.


'That VDSL Cat'
7744 posts

Uber Geek
+1 received by user: 1566

Trusted
Spark
Subscriber

  Reply # 1885179 17-Oct-2017 15:56
Send private message

Paul1977:

 

So, the consensus is that patching the AP only plugs a small part of the hole, and no matter what you do with your AP (short of turning it off) the client devices are vulnerable even when connected to a patched AP?

 

EDIT: Which brings me to my next question. If patching the APs does plug all the holes, what is everyone doing with their wireless networks in the interim until clients patches are available (particularly corporate ones)? What about all the older Android devices that may not get patched, or may be weeks?

 

 

Remember many corporate wifi solutions will be using different security options than WPA2..





#include <std_disclaimer>

 

Any comments made are personal opinion and do not reflect directly on the position my current or past employers may have.


 
 
 
 


Try Wrike: fast, easy, and efficient project collaboration software
574 posts

Ultimate Geek
+1 received by user: 150


  Reply # 1885180 17-Oct-2017 15:57
Send private message

Still not sure on best practice here.

 

If I use a VPN to my home network when connecting via wifi while away from home does using a VPN mitigate any Krack issues?
At home seems to be a different matter - I've vulnerable if I use wifi as I cannot use a VPN to connect to my home network as I am already on my home network?

 

Can't see my LG G2 getting an update for this either. Might be time to upgrade soon.


244 posts

Master Geek
+1 received by user: 63


  Reply # 1885184 17-Oct-2017 16:03
Send private message

KrazyKid:

 

Still not sure on best practice here.

 

If I use a VPN to my home network when connecting via wifi while away from home does using a VPN mitigate any Krack issues?

 

 

A VPN on your device will not prevent KRAck, but it will mean that the traffic that is intercepted cannot be read for anything useful.

 

KrazyKid:

 

At home seems to be a different matter - I've vulnerable if I use wifi as I cannot use a VPN to connect to my home network as I am already on my home network?

 

 

Correct, if you don't have a VPN on your device then any unencrypted traffic could possibly be seen.

 

 


2100 posts

Uber Geek
+1 received by user: 589


  Reply # 1885200 17-Oct-2017 16:40
Send private message

stinger:

 

KrazyKid:

 

Still not sure on best practice here.

 

If I use a VPN to my home network when connecting via wifi while away from home does using a VPN mitigate any Krack issues?

 

 

A VPN on your device will not prevent KRAck, but it will mean that the traffic that is intercepted cannot be read for anything useful.

 

KrazyKid:

 

At home seems to be a different matter - I've vulnerable if I use wifi as I cannot use a VPN to connect to my home network as I am already on my home network?

 

 

Correct, if you don't have a VPN on your device then any unencrypted traffic could possibly be seen.

 

 

I can still establish a tunnel to my OpenVPN server at home even when I am at home on the internal wifi.


2100 posts

Uber Geek
+1 received by user: 589


  Reply # 1885202 17-Oct-2017 16:41
Send private message

Can this exploit in an way reveal the PSK of the network?


2854 posts

Uber Geek
+1 received by user: 709

Trusted
Lifetime subscriber

  Reply # 1885213 17-Oct-2017 16:58
Send private message

If you have a data plan that will last then I guess you could just turn wifi off on your phone and just use mobile data (mmm those unlimited at 25gig plans are looking good now).

 

 

 

 


2423 posts

Uber Geek
+1 received by user: 142


  Reply # 1885217 17-Oct-2017 17:06
Send private message

Paul1977:

Can this exploit in an way reveal the PSK of the network?

 

No.

 

If you use WPA2-TKIP (or GCMP, though that's fairly new) an attacker can send whatever packets they want into your network, including other devices on the network.

507 posts

Ultimate Geek
+1 received by user: 143

Subscriber

  Reply # 1885227 17-Oct-2017 17:37
6 people support this post
Send private message

Who else will be demanding a refund of their iPhones, Macs, and iPads, under the CGA?

 

(I kid, I kid)


1525 posts

Uber Geek
+1 received by user: 376


  Reply # 1885245 17-Oct-2017 18:26
Send private message

Mikrotik:  Fixed weeks ago (AP has no re-use vulnerabilities, client mode fixed)

 

Ubiquiti: Oh, it's in beta (client mode fix only)


2423 posts

Uber Geek
+1 received by user: 142


  Reply # 1885246 17-Oct-2017 18:27
2 people support this post
Send private message

Benjip:

Who else will be demanding a refund of their iPhones, Macs, and iPads, under the CGA?

 

(I kid, I kid)

 

:trollface:

 

You mean androids :P

344 posts

Ultimate Geek
+1 received by user: 66


  Reply # 1885248 17-Oct-2017 18:34
Send private message

sbiddle:

 

I've always regarded WiFi as insecure so I guess none of this surprises me.

 

 

Best practice!





Nope, English isn't my mother tongue. But that's why I'm here. smile


26340 posts

Uber Geek
+1 received by user: 5918

Moderator
Trusted
Biddle Corp
Lifetime subscriber

  Reply # 1885255 17-Oct-2017 19:05
Send private message

Paul1977:

 

Can this exploit in an way reveal the PSK of the network?

 

 

No


102 posts

Master Geek
+1 received by user: 53


  Reply # 1885273 17-Oct-2017 19:58
Send private message

Vodafone position so far:

 

"Vodafone NZ is aware of the potential security threat to the WPA2 protocol which is used to encrypt and authenticate traffic on Wi-Fi networks.

Vodafone is working with manufacturers to update their devices to protect against vulnerability.

Vodafone NZ is not aware of any customers being directly affected by the threat, but urges people to keep their devices and security software updated"

 

Of course, I can't find any useful information about my Technicolor router. The admin interface only shows the current system software. I was unable to check if the current firmware is the latest one. The manufacture official website is useless too. 

 

So, I think is time to run to the hills and live in a remote cabin in the woods. Meanwhile, I'm using an ethernet cable for my laptop and mobile data for everything else.


21014 posts

Uber Geek
+1 received by user: 4155

Trusted
Subscriber

  Reply # 1885274 17-Oct-2017 19:59
Send private message

Wonder if anyone will make AP's able to detect vulnerable client devices by sending duplicates of the part of the handshake that makes this happen and kick them off the wifi?





Richard rich.ms

1 | 2 | 3 | 4 | 5 | 6
View this topic in a long page with up to 500 replies per page Create new topic



Twitter »

Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

UpStarters - the New Zealand tech and innovation story
Posted 21-May-2018 09:55


Lightbox updates platform with new streaming options
Posted 17-May-2018 13:09


Norton Core router launches with high-performance, IoT security in New Zealand
Posted 16-May-2018 02:00


D-Link ANZ launches new 4G LTE Dual SIM M2M VPN Router
Posted 15-May-2018 19:30


New Panasonic LUMIX FT7 ideal for outdoor: waterproof, dustproof
Posted 15-May-2018 19:17


Ryanair Goes All-In on AWS
Posted 15-May-2018 19:14


Te Papa and EQC Minecraft Mod shakes up earthquake education
Posted 15-May-2018 19:12


Framing Facebook: It’s not about technology
Posted 14-May-2018 16:02


Vocus works with NZ Police and telcos to stop scam calls
Posted 12-May-2018 11:12


Vista Group signs Aeon Entertainment, largest cinema chain in Japan
Posted 11-May-2018 21:41


New Privacy Trust Mark certifies privacy and customer control
Posted 10-May-2018 14:16


New app FIXR connects vehicle owners to top Mechanics at best prices
Posted 10-May-2018 14:13


Nutanix Beam gives enterprises control of the cloud
Posted 10-May-2018 14:09


D-Link ANZ launches Covr Seamless Wi-Fi System
Posted 10-May-2018 14:06


Telstra, Intel and Ericsson demonstrate a 5G future for esports
Posted 10-May-2018 13:59



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.