Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 | 3 | 4 | 5 | 6
3110 posts

Uber Geek
+1 received by user: 942

Trusted
Lifetime subscriber

  Reply # 1885174 17-Oct-2017 15:50
Send private message

Paul1977: So, the consensus is that patching the AP only plugs a small part of the hole, and no matter what you do with your AP (short of turning it off) the client devices are vulnerable even when connected to a patched AP?

 

My understanding is a patched AP will not reissue a key but an unpatched client is capable of receiving one, which is what the attacker does - sends a zero (0) key to the client. Whether or not the patched AP would recognise this has occurred and refuse further comms I'm not sure.


'That VDSL Cat'
8252 posts

Uber Geek
+1 received by user: 1748

Trusted
Spark
Subscriber

  Reply # 1885179 17-Oct-2017 15:56
Send private message

Paul1977:

 

So, the consensus is that patching the AP only plugs a small part of the hole, and no matter what you do with your AP (short of turning it off) the client devices are vulnerable even when connected to a patched AP?

 

EDIT: Which brings me to my next question. If patching the APs does plug all the holes, what is everyone doing with their wireless networks in the interim until clients patches are available (particularly corporate ones)? What about all the older Android devices that may not get patched, or may be weeks?

 

 

Remember many corporate wifi solutions will be using different security options than WPA2..





#include <std_disclaimer>

 

Any comments made are personal opinion and do not reflect directly on the position my current or past employers may have.


607 posts

Ultimate Geek
+1 received by user: 159


  Reply # 1885180 17-Oct-2017 15:57
Send private message

Still not sure on best practice here.

 

If I use a VPN to my home network when connecting via wifi while away from home does using a VPN mitigate any Krack issues?
At home seems to be a different matter - I've vulnerable if I use wifi as I cannot use a VPN to connect to my home network as I am already on my home network?

 

Can't see my LG G2 getting an update for this either. Might be time to upgrade soon.


347 posts

Ultimate Geek
+1 received by user: 94


  Reply # 1885184 17-Oct-2017 16:03
Send private message

KrazyKid:

 

Still not sure on best practice here.

 

If I use a VPN to my home network when connecting via wifi while away from home does using a VPN mitigate any Krack issues?

 

 

A VPN on your device will not prevent KRAck, but it will mean that the traffic that is intercepted cannot be read for anything useful.

 

KrazyKid:

 

At home seems to be a different matter - I've vulnerable if I use wifi as I cannot use a VPN to connect to my home network as I am already on my home network?

 

 

Correct, if you don't have a VPN on your device then any unencrypted traffic could possibly be seen.

 

 


2277 posts

Uber Geek
+1 received by user: 644


  Reply # 1885200 17-Oct-2017 16:40
Send private message

stinger:

 

KrazyKid:

 

Still not sure on best practice here.

 

If I use a VPN to my home network when connecting via wifi while away from home does using a VPN mitigate any Krack issues?

 

 

A VPN on your device will not prevent KRAck, but it will mean that the traffic that is intercepted cannot be read for anything useful.

 

KrazyKid:

 

At home seems to be a different matter - I've vulnerable if I use wifi as I cannot use a VPN to connect to my home network as I am already on my home network?

 

 

Correct, if you don't have a VPN on your device then any unencrypted traffic could possibly be seen.

 

 

I can still establish a tunnel to my OpenVPN server at home even when I am at home on the internal wifi.


2277 posts

Uber Geek
+1 received by user: 644


  Reply # 1885202 17-Oct-2017 16:41
Send private message

Can this exploit in an way reveal the PSK of the network?


2960 posts

Uber Geek
+1 received by user: 749

Trusted
Lifetime subscriber

  Reply # 1885213 17-Oct-2017 16:58
Send private message

If you have a data plan that will last then I guess you could just turn wifi off on your phone and just use mobile data (mmm those unlimited at 25gig plans are looking good now).

 

 

 

 


2437 posts

Uber Geek
+1 received by user: 144


  Reply # 1885217 17-Oct-2017 17:06
Send private message

Paul1977:

Can this exploit in an way reveal the PSK of the network?

 

No.

 

If you use WPA2-TKIP (or GCMP, though that's fairly new) an attacker can send whatever packets they want into your network, including other devices on the network.

531 posts

Ultimate Geek
+1 received by user: 163

Subscriber

  Reply # 1885227 17-Oct-2017 17:37
6 people support this post
Send private message

Who else will be demanding a refund of their iPhones, Macs, and iPads, under the CGA?

 

(I kid, I kid)


1565 posts

Uber Geek
+1 received by user: 399


  Reply # 1885245 17-Oct-2017 18:26
Send private message

Mikrotik:  Fixed weeks ago (AP has no re-use vulnerabilities, client mode fixed)

 

Ubiquiti: Oh, it's in beta (client mode fix only)


2437 posts

Uber Geek
+1 received by user: 144


  Reply # 1885246 17-Oct-2017 18:27
2 people support this post
Send private message

Benjip:

Who else will be demanding a refund of their iPhones, Macs, and iPads, under the CGA?

 

(I kid, I kid)

 

:trollface:

 

You mean androids :P

418 posts

Ultimate Geek
+1 received by user: 90


  Reply # 1885248 17-Oct-2017 18:34
Send private message

sbiddle:

 

I've always regarded WiFi as insecure so I guess none of this surprises me.

 

 

Best practice!





Nope, English isn't my mother tongue. But that's why I'm here. smile


26780 posts

Uber Geek
+1 received by user: 6250

Moderator
Trusted
Biddle Corp
Lifetime subscriber

  Reply # 1885255 17-Oct-2017 19:05
Send private message

Paul1977:

 

Can this exploit in an way reveal the PSK of the network?

 

 

No


103 posts

Master Geek
+1 received by user: 53


  Reply # 1885273 17-Oct-2017 19:58
Send private message

Vodafone position so far:

 

"Vodafone NZ is aware of the potential security threat to the WPA2 protocol which is used to encrypt and authenticate traffic on Wi-Fi networks.

Vodafone is working with manufacturers to update their devices to protect against vulnerability.

Vodafone NZ is not aware of any customers being directly affected by the threat, but urges people to keep their devices and security software updated"

 

Of course, I can't find any useful information about my Technicolor router. The admin interface only shows the current system software. I was unable to check if the current firmware is the latest one. The manufacture official website is useless too. 

 

So, I think is time to run to the hills and live in a remote cabin in the woods. Meanwhile, I'm using an ethernet cable for my laptop and mobile data for everything else.


21291 posts

Uber Geek
+1 received by user: 4296

Trusted
Subscriber

  Reply # 1885274 17-Oct-2017 19:59
Send private message

Wonder if anyone will make AP's able to detect vulnerable client devices by sending duplicates of the part of the handshake that makes this happen and kick them off the wifi?





Richard rich.ms

1 | 2 | 3 | 4 | 5 | 6
View this topic in a long page with up to 500 replies per page Create new topic

Twitter »

Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

Intel introduces new NUC kits and NUC mini PCs
Posted 16-Aug-2018 11:03


The Warehouse leaps into the AI future with Google
Posted 15-Aug-2018 17:56


Targus set sights on enterprise and consumer growth in New Zealand
Posted 13-Aug-2018 13:47


Huawei to distribute nova 3i in New Zealand
Posted 9-Aug-2018 16:23


Home robot Vector to be available in New Zealand stores
Posted 9-Aug-2018 14:47


Panasonic announces new 2018 OLED TV line up
Posted 7-Aug-2018 16:38


Kordia completes first live 4K TV broadcast
Posted 1-Aug-2018 13:00


Schools get safer and smarter internet with Managed Network Upgrade
Posted 30-Jul-2018 20:01


DNC wants a safer .nz in the coming year
Posted 26-Jul-2018 16:08


Auldhouse becomes an AWS Authorised Training Delivery Partner in New Zealand
Posted 26-Jul-2018 15:55


Rakuten Kobo launches Kobo Clara HD entry level reader
Posted 26-Jul-2018 15:44


Kiwi team reaches semi-finals at the Microsoft Imagine Cup
Posted 26-Jul-2018 15:38


KidsCan App to Help Kiwi Children in Need
Posted 26-Jul-2018 15:32


FUJIFILM announces new high-performance lenses
Posted 24-Jul-2018 14:57


New FUJIFILM XF10 introduces square mode for Instagram sharing
Posted 24-Jul-2018 14:44



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.