Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 | 3 | 4 | 5 | 6
3064 posts

Uber Geek
+1 received by user: 909

Trusted
Subscriber

  Reply # 1885174 17-Oct-2017 15:50
Send private message

Paul1977: So, the consensus is that patching the AP only plugs a small part of the hole, and no matter what you do with your AP (short of turning it off) the client devices are vulnerable even when connected to a patched AP?

 

My understanding is a patched AP will not reissue a key but an unpatched client is capable of receiving one, which is what the attacker does - sends a zero (0) key to the client. Whether or not the patched AP would recognise this has occurred and refuse further comms I'm not sure.


'That VDSL Cat'
7955 posts

Uber Geek
+1 received by user: 1631

Trusted
Spark
Subscriber

  Reply # 1885179 17-Oct-2017 15:56
Send private message

Paul1977:

 

So, the consensus is that patching the AP only plugs a small part of the hole, and no matter what you do with your AP (short of turning it off) the client devices are vulnerable even when connected to a patched AP?

 

EDIT: Which brings me to my next question. If patching the APs does plug all the holes, what is everyone doing with their wireless networks in the interim until clients patches are available (particularly corporate ones)? What about all the older Android devices that may not get patched, or may be weeks?

 

 

Remember many corporate wifi solutions will be using different security options than WPA2..





#include <std_disclaimer>

 

Any comments made are personal opinion and do not reflect directly on the position my current or past employers may have.


589 posts

Ultimate Geek
+1 received by user: 154


  Reply # 1885180 17-Oct-2017 15:57
Send private message

Still not sure on best practice here.

 

If I use a VPN to my home network when connecting via wifi while away from home does using a VPN mitigate any Krack issues?
At home seems to be a different matter - I've vulnerable if I use wifi as I cannot use a VPN to connect to my home network as I am already on my home network?

 

Can't see my LG G2 getting an update for this either. Might be time to upgrade soon.


267 posts

Ultimate Geek
+1 received by user: 67


  Reply # 1885184 17-Oct-2017 16:03
Send private message

KrazyKid:

 

Still not sure on best practice here.

 

If I use a VPN to my home network when connecting via wifi while away from home does using a VPN mitigate any Krack issues?

 

 

A VPN on your device will not prevent KRAck, but it will mean that the traffic that is intercepted cannot be read for anything useful.

 

KrazyKid:

 

At home seems to be a different matter - I've vulnerable if I use wifi as I cannot use a VPN to connect to my home network as I am already on my home network?

 

 

Correct, if you don't have a VPN on your device then any unencrypted traffic could possibly be seen.

 

 


2157 posts

Uber Geek
+1 received by user: 618


  Reply # 1885200 17-Oct-2017 16:40
Send private message

stinger:

 

KrazyKid:

 

Still not sure on best practice here.

 

If I use a VPN to my home network when connecting via wifi while away from home does using a VPN mitigate any Krack issues?

 

 

A VPN on your device will not prevent KRAck, but it will mean that the traffic that is intercepted cannot be read for anything useful.

 

KrazyKid:

 

At home seems to be a different matter - I've vulnerable if I use wifi as I cannot use a VPN to connect to my home network as I am already on my home network?

 

 

Correct, if you don't have a VPN on your device then any unencrypted traffic could possibly be seen.

 

 

I can still establish a tunnel to my OpenVPN server at home even when I am at home on the internal wifi.


2157 posts

Uber Geek
+1 received by user: 618


  Reply # 1885202 17-Oct-2017 16:41
Send private message

Can this exploit in an way reveal the PSK of the network?


2874 posts

Uber Geek
+1 received by user: 720

Trusted
Lifetime subscriber

  Reply # 1885213 17-Oct-2017 16:58
Send private message

If you have a data plan that will last then I guess you could just turn wifi off on your phone and just use mobile data (mmm those unlimited at 25gig plans are looking good now).

 

 

 

 


2431 posts

Uber Geek
+1 received by user: 143


  Reply # 1885217 17-Oct-2017 17:06
Send private message

Paul1977:

Can this exploit in an way reveal the PSK of the network?

 

No.

 

If you use WPA2-TKIP (or GCMP, though that's fairly new) an attacker can send whatever packets they want into your network, including other devices on the network.

515 posts

Ultimate Geek
+1 received by user: 155

Subscriber

  Reply # 1885227 17-Oct-2017 17:37
6 people support this post
Send private message

Who else will be demanding a refund of their iPhones, Macs, and iPads, under the CGA?

 

(I kid, I kid)


1531 posts

Uber Geek
+1 received by user: 379


  Reply # 1885245 17-Oct-2017 18:26
Send private message

Mikrotik:  Fixed weeks ago (AP has no re-use vulnerabilities, client mode fixed)

 

Ubiquiti: Oh, it's in beta (client mode fix only)


2431 posts

Uber Geek
+1 received by user: 143


  Reply # 1885246 17-Oct-2017 18:27
2 people support this post
Send private message

Benjip:

Who else will be demanding a refund of their iPhones, Macs, and iPads, under the CGA?

 

(I kid, I kid)

 

:trollface:

 

You mean androids :P

382 posts

Ultimate Geek
+1 received by user: 77


  Reply # 1885248 17-Oct-2017 18:34
Send private message

sbiddle:

 

I've always regarded WiFi as insecure so I guess none of this surprises me.

 

 

Best practice!





Nope, English isn't my mother tongue. But that's why I'm here. smile


26495 posts

Uber Geek
+1 received by user: 6038

Moderator
Trusted
Biddle Corp
Lifetime subscriber

  Reply # 1885255 17-Oct-2017 19:05
Send private message

Paul1977:

 

Can this exploit in an way reveal the PSK of the network?

 

 

No


102 posts

Master Geek
+1 received by user: 53


  Reply # 1885273 17-Oct-2017 19:58
Send private message

Vodafone position so far:

 

"Vodafone NZ is aware of the potential security threat to the WPA2 protocol which is used to encrypt and authenticate traffic on Wi-Fi networks.

Vodafone is working with manufacturers to update their devices to protect against vulnerability.

Vodafone NZ is not aware of any customers being directly affected by the threat, but urges people to keep their devices and security software updated"

 

Of course, I can't find any useful information about my Technicolor router. The admin interface only shows the current system software. I was unable to check if the current firmware is the latest one. The manufacture official website is useless too. 

 

So, I think is time to run to the hills and live in a remote cabin in the woods. Meanwhile, I'm using an ethernet cable for my laptop and mobile data for everything else.


21131 posts

Uber Geek
+1 received by user: 4217

Trusted
Subscriber

  Reply # 1885274 17-Oct-2017 19:59
Send private message

Wonder if anyone will make AP's able to detect vulnerable client devices by sending duplicates of the part of the handshake that makes this happen and kick them off the wifi?





Richard rich.ms

1 | 2 | 3 | 4 | 5 | 6
View this topic in a long page with up to 500 replies per page Create new topic

Twitter »

Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

N4L helping TAKA Trust bridge the digital divide for Lower Hutt students
Posted 18-Jun-2018 13:08


Winners Announced for 2018 CIO Awards
Posted 18-Jun-2018 13:03


Logitech Rally sets new standard for USB-connected video conference cameras
Posted 18-Jun-2018 09:27


Russell Stanners steps down as Vodafone NZ CEO
Posted 12-Jun-2018 09:13


Intergen recognised as 2018 Microsoft Country Partner of the Year for New Zealand
Posted 12-Jun-2018 08:00


Finalists Announced For Microsoft NZ Partner Awards
Posted 6-Jun-2018 15:12


Vocus Group and Vodafone announce joint venture to accelerate fibre innovation
Posted 5-Jun-2018 10:52


Kogan.com to launch Kogan Mobile in New Zealand
Posted 4-Jun-2018 14:34


Enable doubles fibre broadband speeds for its most popular wholesale service in Christchurch
Posted 2-Jun-2018 20:07


All or Nothing: New Zealand All Blacks arrives on Amazon Prime Video
Posted 2-Jun-2018 16:21


Innovation Grant, High Tech Awards and new USA office for Kiwi tech company SwipedOn
Posted 1-Jun-2018 20:54


Commerce Commission warns Apple for misleading consumers about their rights
Posted 30-May-2018 13:15


IBM leads Call for Code to use cloud, data, AI, blockchain for natural disaster relief
Posted 25-May-2018 14:12


New FUJIFILM X-T100 aims to do better job than smartphones
Posted 24-May-2018 20:17


Stuff takes 100% ownership of Stuff Fibre
Posted 24-May-2018 19:41



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.