Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 | 3 | 4 | 5 | 6
3011 posts

Uber Geek
+1 received by user: 882

Trusted
Subscriber

  Reply # 1885174 17-Oct-2017 15:50
Send private message

Paul1977: So, the consensus is that patching the AP only plugs a small part of the hole, and no matter what you do with your AP (short of turning it off) the client devices are vulnerable even when connected to a patched AP?

 

My understanding is a patched AP will not reissue a key but an unpatched client is capable of receiving one, which is what the attacker does - sends a zero (0) key to the client. Whether or not the patched AP would recognise this has occurred and refuse further comms I'm not sure.


'That VDSL Cat'
7133 posts

Uber Geek
+1 received by user: 1403

Trusted
Spark
Subscriber

  Reply # 1885179 17-Oct-2017 15:56
Send private message

Paul1977:

 

So, the consensus is that patching the AP only plugs a small part of the hole, and no matter what you do with your AP (short of turning it off) the client devices are vulnerable even when connected to a patched AP?

 

EDIT: Which brings me to my next question. If patching the APs does plug all the holes, what is everyone doing with their wireless networks in the interim until clients patches are available (particularly corporate ones)? What about all the older Android devices that may not get patched, or may be weeks?

 

 

Remember many corporate wifi solutions will be using different security options than WPA2..





#include <std_disclaimer>

 

Any comments made are personal opinion and do not reflect directly on the position my current or past employers may have.


 
 
 
 


542 posts

Ultimate Geek
+1 received by user: 134


  Reply # 1885180 17-Oct-2017 15:57
Send private message

Still not sure on best practice here.

 

If I use a VPN to my home network when connecting via wifi while away from home does using a VPN mitigate any Krack issues?
At home seems to be a different matter - I've vulnerable if I use wifi as I cannot use a VPN to connect to my home network as I am already on my home network?

 

Can't see my LG G2 getting an update for this either. Might be time to upgrade soon.


171 posts

Master Geek
+1 received by user: 39


  Reply # 1885184 17-Oct-2017 16:03
Send private message

KrazyKid:

 

Still not sure on best practice here.

 

If I use a VPN to my home network when connecting via wifi while away from home does using a VPN mitigate any Krack issues?

 

 

A VPN on your device will not prevent KRAck, but it will mean that the traffic that is intercepted cannot be read for anything useful.

 

KrazyKid:

 

At home seems to be a different matter - I've vulnerable if I use wifi as I cannot use a VPN to connect to my home network as I am already on my home network?

 

 

Correct, if you don't have a VPN on your device then any unencrypted traffic could possibly be seen.

 

 


1962 posts

Uber Geek
+1 received by user: 547


  Reply # 1885200 17-Oct-2017 16:40
Send private message

stinger:

 

KrazyKid:

 

Still not sure on best practice here.

 

If I use a VPN to my home network when connecting via wifi while away from home does using a VPN mitigate any Krack issues?

 

 

A VPN on your device will not prevent KRAck, but it will mean that the traffic that is intercepted cannot be read for anything useful.

 

KrazyKid:

 

At home seems to be a different matter - I've vulnerable if I use wifi as I cannot use a VPN to connect to my home network as I am already on my home network?

 

 

Correct, if you don't have a VPN on your device then any unencrypted traffic could possibly be seen.

 

 

I can still establish a tunnel to my OpenVPN server at home even when I am at home on the internal wifi.


1962 posts

Uber Geek
+1 received by user: 547


  Reply # 1885202 17-Oct-2017 16:41
Send private message

Can this exploit in an way reveal the PSK of the network?


2724 posts

Uber Geek
+1 received by user: 640

Trusted
Lifetime subscriber

  Reply # 1885213 17-Oct-2017 16:58
Send private message

If you have a data plan that will last then I guess you could just turn wifi off on your phone and just use mobile data (mmm those unlimited at 25gig plans are looking good now).

 

 

 

 


2396 posts

Uber Geek
+1 received by user: 113


  Reply # 1885217 17-Oct-2017 17:06
Send private message

Paul1977:

Can this exploit in an way reveal the PSK of the network?

 

No.

 

If you use WPA2-TKIP (or GCMP, though that's fairly new) an attacker can send whatever packets they want into your network, including other devices on the network.

474 posts

Ultimate Geek
+1 received by user: 113

Subscriber

  Reply # 1885227 17-Oct-2017 17:37
6 people support this post
Send private message

Who else will be demanding a refund of their iPhones, Macs, and iPads, under the CGA?

 

(I kid, I kid)


1497 posts

Uber Geek
+1 received by user: 368


  Reply # 1885245 17-Oct-2017 18:26
Send private message

Mikrotik:  Fixed weeks ago (AP has no re-use vulnerabilities, client mode fixed)

 

Ubiquiti: Oh, it's in beta (client mode fix only)


2396 posts

Uber Geek
+1 received by user: 113


  Reply # 1885246 17-Oct-2017 18:27
2 people support this post
Send private message

Benjip:

Who else will be demanding a refund of their iPhones, Macs, and iPads, under the CGA?

 

(I kid, I kid)

 

:trollface:

 

You mean androids :P

126 posts

Master Geek
+1 received by user: 20


  Reply # 1885248 17-Oct-2017 18:34
Send private message

sbiddle:

 

I've always regarded WiFi as insecure so I guess none of this surprises me.

 

 

Best practice!


25975 posts

Uber Geek
+1 received by user: 5654

Moderator
Trusted
Biddle Corp
Lifetime subscriber

  Reply # 1885255 17-Oct-2017 19:05
Send private message

Paul1977:

 

Can this exploit in an way reveal the PSK of the network?

 

 

No


77 posts

Master Geek
+1 received by user: 44


  Reply # 1885273 17-Oct-2017 19:58
Send private message

Vodafone position so far:

 

"Vodafone NZ is aware of the potential security threat to the WPA2 protocol which is used to encrypt and authenticate traffic on Wi-Fi networks.

Vodafone is working with manufacturers to update their devices to protect against vulnerability.

Vodafone NZ is not aware of any customers being directly affected by the threat, but urges people to keep their devices and security software updated"

 

Of course, I can't find any useful information about my Technicolor router. The admin interface only shows the current system software. I was unable to check if the current firmware is the latest one. The manufacture official website is useless too. 

 

So, I think is time to run to the hills and live in a remote cabin in the woods. Meanwhile, I'm using an ethernet cable for my laptop and mobile data for everything else.


20726 posts

Uber Geek
+1 received by user: 4017

Trusted
Subscriber

  Reply # 1885274 17-Oct-2017 19:59
Send private message

Wonder if anyone will make AP's able to detect vulnerable client devices by sending duplicates of the part of the handshake that makes this happen and kick them off the wifi?





Richard rich.ms

1 | 2 | 3 | 4 | 5 | 6
View this topic in a long page with up to 500 replies per page Create new topic



Twitter »

Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

Fujifilm X beats its best with new top of the range, high-performance camera
Posted 24-Feb-2018 14:05


One million kiwis affected by cybercrime
Posted 24-Feb-2018 13:58


New Zealanders want to engage with government online and via mobile apps
Posted 24-Feb-2018 13:56


Samsung launches Samsung Max
Posted 24-Feb-2018 13:52


CPTPP text and National Interest Analysis released for public scrutiny
Posted 21-Feb-2018 19:43


Foodstuffs to trial digitised shopping trolleys
Posted 21-Feb-2018 18:27


2018: The year of zero-login, smart cars & the biometrics of things
Posted 21-Feb-2018 18:25


Intel reimagines data centre storage with new 3D NAND SSDs
Posted 16-Feb-2018 15:21


Ground-breaking business programme begins in Hamilton
Posted 16-Feb-2018 10:18


Government to continue search for first Chief Technology Officer
Posted 12-Feb-2018 20:30


Time to take Appleā€™s iPad Pro seriously
Posted 12-Feb-2018 16:54


New Fujifilm X-A5 brings selfie features to mirrorless camera
Posted 9-Feb-2018 09:12


D-Link ANZ expands connected smart home with new HD Wi-Fi cameras
Posted 9-Feb-2018 09:01


Dragon Professional for Mac V6: Near perfect dictation
Posted 9-Feb-2018 08:26


OPPO announces R11s with claims to be the picture perfect smartphone
Posted 2-Feb-2018 13:28



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.