Jump to content

WPA2 has been cracked

snortingfrogs
5 minutes ago, LAwLz said:

I don't remember where the WPA2 encryption is applied, but chances are the MAC address is not encrypted. If that's the case then finding a white listed mac address will take like 10 seconds (not hyperbole).

what if they are already connected then?

Grammar and spelling is not indicative of intelligence/knowledge.  Not having the same opinion does not always mean lack of understanding.  

Link to comment
Share on other sites

Link to post
Share on other sites

I studied at KU Leuven (together with @Joachim Opdenakker), the guy that found this (Mathy Vanhoef), was one of our teachers. Proud to know him!

Be safe, don't drink and sudo

 

Laptop: ASUS K541UA (i5-6198DU, 8GB RAM, 250GB 850 EVO) OS: Debian Buster (KDE)

Desktop: i7-7700, ASUS Strix H270F, 16GB RAM, 128GB SSD from laptop, some HDD's, iGPU, some NIC's, OS: Debian Buster (KDE)

 

Link to comment
Share on other sites

Link to post
Share on other sites

31 minutes ago, mr moose said:

what if they are already connected then?

I don't think there is a standard for how access points handle that. Guess it would vary based on vendor implementation. 

It will probably not refuse the connection from the attacker, but MAC collisions will occur (and how that is handled varies greatly from network to network). 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, mr moose said:

 

wouldn't the person who wants unrequested access to your wifi network then need to know a white listed mac address?

Its very simple to discover MAC addresses of devices connected to an AP, even when you are not connected. 

System/Server Administrator - Networking - Storage - Virtualization - Scripting - Applications

Link to comment
Share on other sites

Link to post
Share on other sites

16 minutes ago, Eniqmatic said:

Its very simple to discover MAC addresses of devices connected to an AP, even when you are not connected. 

Even without going to a techy solution, all you need is 15 seconds of access to someone's phone that is connected who isn't paying attention to their device for example.

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, leadeater said:

@Lurick

 

Any idea how this is going to effect RADIUS/802.1x wireless networks? I'd like to say they should not be affected but I'd like to see those unreleased CVE's first, it could also depend on implementation too so there might not even be a solid answer.

Yah, I thought the paper at the bottom was a preview or snippet of what's going to be released but looks like I missed the published date x.x

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to comment
Share on other sites

Link to post
Share on other sites

The report is out now.

I haven't had the time to look at it but at a glance it seems like:

1) It affects WPA-Enterprise too (really, really bad news).

2) It can be patched either at the client or the access point (good news)

3) The patch is backwards compatible, which means that there will be no issues with a patched client talking to an unpatched AP, or vice versa.

 

 

TL;DR:
Update your clients and access points and you will be fine.

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, leadeater said:

@Lurick

 

Any idea how this is going to effect RADIUS/802.1x wireless networks? I'd like to say they should not be affected but I'd like to see those unreleased CVE's first, it could also depend on implementation too so there might not even be a solid answer.

Yeah that was my first thought - otherwise it’s going to be a shit week for me. 

2 hours ago, KuJoe said:

Thank god Ubiquiti already released firmware to address these exploits.

Yeah - found this on their site

 

https://www.krackattacks.com/

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, mr moose said:

 

wouldn't the person who wants unrequested access to your wifi network then need to know a white listed mac address?

Number of different ways you can figure that out

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, LAwLz said:

The report is out now.

I haven't had the time to look at it but at a glance it seems like:

1) It affects WPA-Enterprise too (really, really bad news).

2) It can be patched either at the client or the access point (good news)

3) The patch is backwards compatible, which means that there will be no issues with a patched client talking to an unpatched AP, or vice versa.

 

 

TL;DR:
Update your clients and access points and you will be fine.

Well, patch is the keyword. Depending on client/AP, how likely are we to get a patch?

 

With consumer APs, it's mostly recent flagship products that get updated especially if you're running a maintained third party firmware. If say you're running an Android device, you're stuck in the same situation where you need a security update which again depends on if you have a flagship device of recent date. On PCs it will depend on what wifi solution you have and how well maintained it is (again, depends on where it resides in the product stack). I'm imagining that a lot of devices will be left unpatched which is very bad but corporations don't give a fuck about that unless they have to.

Link to comment
Share on other sites

Link to post
Share on other sites

Update: no Meraki firmware fix yet :(

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Windspeed36 said:

Update: no Meraki firmware fix yet :(

Yeah I second that, just was checking ours this minute as well!

System/Server Administrator - Networking - Storage - Virtualization - Scripting - Applications

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, NvidiaIntelAMDLoveTriangle said:

How is this news again?

WPA2 was cracked/hacked ages ago. WPA is even less secure than having no password.

New flaw..

Link to comment
Share on other sites

Link to post
Share on other sites

13 hours ago, paddy-stone said:

Might sound stupid here (probably). But what if you don't broadcast your SSID?

Now days not broadcasting your SSID is like shining a beacon that says I have something worth securing, so it likely makes your network more attractive to those with a more insidious agenda.

 

Gotta spread those honey pots all throughout your system :ph34r:

- ASUS X99 Deluxe - i7 5820k - Nvidia GTX 1080ti SLi - 4x4GB EVGA SSC 2800mhz DDR4 - Samsung SM951 500 - 2x Samsung 850 EVO 512 -

- EK Supremacy EVO CPU Block - EK FC 1080 GPU Blocks - EK XRES 100 DDC - EK Coolstream XE 360 - EK Coolstream XE 240 -

Link to comment
Share on other sites

Link to post
Share on other sites

10 hours ago, Ryujin2003 said:

Might just be better to reduce the power on your router. I can't access my network outside of my house, so someone would have to break in to attack WiFi... Internet security would be the least of problems at that point.

So you don't see the problem with after you've reduced the power so that it can't be accessed outside the home, and you then can't access it in other rooms of the house either... unfortunately I have one of those many houses where the router can't be placed centrally.. I in fact don't know anybody that has, as most phone lines come into the property through one of the walls, usually the same side as the telephone poles exist. And no, there's no way currently of doing that either. Plus I actually like using my wifi in the garden too.

Please quote my post, or put @paddy-stone if you want me to respond to you.

Spoiler
  • PCs:- 
  • Main PC build  https://uk.pcpartpicker.com/list/2K6Q7X
  • ASUS x53e  - i7 2670QM / Sony BD writer x8 / Win 10, Elemetary OS, Ubuntu/ Samsung 830 SSD
  • Lenovo G50 - 8Gb RAM - Samsung 860 Evo 250GB SSD - DVD writer
  •  
  • Displays:-
  • Philips 55 OLED 754 model
  • Panasonic 55" 4k TV
  • LG 29" Ultrawide
  • Philips 24" 1080p monitor as backup
  •  
  • Storage/NAS/Servers:-
  • ESXI/test build  https://uk.pcpartpicker.com/list/4wyR9G
  • Main Server https://uk.pcpartpicker.com/list/3Qftyk
  • Backup server - HP Proliant Gen 8 4 bay NAS running FreeNAS ZFS striped 3x3TiB WD reds
  • HP ProLiant G6 Server SE316M1 Twin Hex Core Intel Xeon E5645 2.40GHz 48GB RAM
  •  
  • Gaming/Tablets etc:-
  • Xbox One S 500GB + 2TB HDD
  • PS4
  • Nvidia Shield TV
  • Xiaomi/Pocafone F2 pro 8GB/256GB
  • Xiaomi Redmi Note 4

 

  • Unused Hardware currently :-
  • 4670K MSI mobo 16GB ram
  • i7 6700K  b250 mobo
  • Zotac GTX 1060 6GB Amp! edition
  • Zotac GTX 1050 mini

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

28 minutes ago, Windspeed36 said:

Update: no Meraki firmware fix yet :(

 

26 minutes ago, Eniqmatic said:

Yeah I second that, just was checking ours this minute as well!

 

Yah, we might be waiting until the full paper is released to push an update out to make sure nothing is missed, or it's still in regression testing :) 

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Lurick said:

 

 

Yah, we might be waiting until the full paper is released to push an update out to make sure nothing is missed, or it's still in regression testing :) 

Was it you or someone else asking for the Meraki changelog history? You can get it through the control panel.. 

Link to comment
Share on other sites

Link to post
Share on other sites

17 minutes ago, Windspeed36 said:

Was it you or someone else asking for the Meraki changelog history? You can get it through the control panel.. 

Not me, I know where to get all the good stuff :P 

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to comment
Share on other sites

Link to post
Share on other sites

47 minutes ago, paddy-stone said:

So you don't see the problem with after you've reduced the power so that it can't be accessed outside the home, and you then can't access it in other rooms of the house either... unfortunately I have one of those many houses where the router can't be placed centrally.. I in fact don't know anybody that has, as most phone lines come into the property through one of the walls, usually the same side as the telephone poles exist. And no, there's no way currently of doing that either. Plus I actually like using my wifi in the garden too.

My garage doesn't get good reception and one bathroom is basically dead thanks to a mirror. Otherwise, I live in a town house, so it's pretty easy for me to limit my access. When Verizon wireless it, I had them wire it to a central location even though it comes through a side wall. I did a friend's house as well, and he installed Ubiquity WAPs along the center wall, with his router and everything in the basement. Ran cable up the center so he didn't have to worry about neighbors trying to play with his stuff.

Link to comment
Share on other sites

Link to post
Share on other sites

6 hours ago, leadeater said:

@Lurick

 

Any idea how this is going to effect RADIUS/802.1x wireless networks? I'd like to say they should not be affected but I'd like to see those unreleased CVE's first, it could also depend on implementation too so there might not even be a solid answer.

1 hour ago, Windspeed36 said:

Yeah that was my first thought - otherwise it’s going to be a shit week for me. 

WPA Enterprise is vulnerable, but it depends on the client OS and patch status.

1 hour ago, Windspeed36 said:

Update: no Meraki firmware fix yet :(

You sure? Some people on Twitter said that there had been a non-descriptive update for Meraki in the last couple of weeks.

45 minutes ago, Windspeed36 said:

Was it you or someone else asking for the Meraki changelog history? You can get it through the control panel.. 

That was me. I can not for the life of me find change logs for previous releases. Change logs for firmware updates that are pending? Easy to find. Change logs for firmware I already have installed? More well hidden than the aliens at area 51.

 

 

1 hour ago, NvidiaIntelAMDLoveTriangle said:

How is this news again?

WPA2 was cracked/hacked ages ago. WPA is even less secure than having no password.

1) It's news because this is a brand new flaw.

2) WPA2 was not broken ages ago.

3) How anyone can think that WPA is less secure than no password is beyond me. It most certainly is not.

 

 

50 minutes ago, Lurick said:

Yah, we might be waiting until the full paper is released to push an update out to make sure nothing is missed, or it's still in regression testing :) 

The full paper is out now.

It's a lot less serious than I thought.

Link to comment
Share on other sites

Link to post
Share on other sites

How do I tell if my routers firmware update has the fix?

 

I have a D-Link DIR-890L running as my AP

if you want to annoy me, then join my teamspeak server ts.benja.cc

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, LAwLz said:

That was me. I can not for the life of me find change logs for previous releases. Change logs for firmware updates that are pending? Easy to find. Change logs for firmware I already have installed? More well hidden than the aliens at area 51.

 

 

I’m thinking they may have patched it very discretely as the patch notes are quite vague. 

 

If you go into the firmware upgrade area, select “schedule upgrade” and click on the version number, it’ll present a screen where you can browse through all current and past change log notes. 

Link to comment
Share on other sites

Link to post
Share on other sites

19 minutes ago, LAwLz said:

WPA Enterprise is vulnerable, but it depends on the client OS and patch status.

This is however one of the very clear down sides to BYOD actually showing it's face. If it can't be mitigated by updates to AP and controllers alone it's a rather problematic issue.

 

We provide multiple different wireless networks with varying degrees of network access and controls, which can be easily defeated by a staff member using a personal device connecting to 'Staff Private Equipment' then signing in to something like the HR portal while their network traffic is compromised.

 

Depending on the type of business the impact could be not too bad to rather big, where I am where we are a university this is on the very upper end of 'Pray for AP patching alone to be enough'.

 

Edit:

Just in case people haven't realized this yet secure application connections will still be secure, but every internal website and application is using SSL/SSH/Kerberos right? ;)

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×