WEP And PPTP Password Crackers Released 244
Jacco de Leeuw writes "SecurityFocus published an article by Michael Ossmann that discusses the new generation of WEP cracking tools for 802.11 wireless networks. These are much faster as they perform passive statistical analysis. In many cases, a WEP key can be determined in minutes or even seconds. For those who have switched to PPTP for securing their wireless nets: Joshua Wright released a new version of his Cisco LEAP cracker called Asleap which can now also recover weak PPTP passwords. Both LEAP and PPTP employ MS-CHAPv2 authentication." Update: 12/22 00:14 GMT by T : Michael Ossmann wrote to point out his last name has two Ns, rather than one.
aircrack - Korek based attack (Score:1, Informative)
However, the essid remained hidden. How does one use the WEP key without an ssid?
Re:Feasibility of dictionary attacks no protocol f (Score:4, Informative)
We've known WEP was broken for a long time (Score:3, Informative)
So, this isn't really "new" news, although it should reinforce the message that WEP is worse than useless.
Securing wireless connections (Score:5, Informative)
First I tried to setup IPSec. It was a nightmare. Although I know a lot about computers and networks I did not manage to setup IPSec. It's configuration is so complicated, I have no clue. Although, it must be possible to get IPSec running, maybe it's just me who is too stupid
http://www.schneier.com/paper-ipsec.html
Then I tried Cipe. It was very easy to get it running, but it's horribly insecure. Peter Gutmann wrote a nice article, which was in the news on slashdot some time ago:
http://lists.virus.org/cryptography-0309/msg00257
In that article I read about tinc, which I now use. It's almost as easy to setup as cipe, but more secure (although not perfect and not as good as IPSec). Here is the answer of the developers of tinc to Peter Gutmann's article:
http://www.tinc-vpn.org/security
So, maybe if you believe them it's not that bad, I'm not sure about this.
I think one great advantage of the VPN-solutions is that AFAIK there are no tools available that make cracking them as easy as cracking WEP. So the "common War Driver" or Script Kiddie has no clue what to do, you'd need some kind of expert to crack your connection. And, if such an expert is trying to break your security, you maybe have a bigger problem anyway.
I just wanted to have an acceptable level of security and lock War Drivers out.
Re:End-to-End Security (Score:4, Informative)
Re:Old news (Score:3, Informative)
Re:Old news (Score:3, Informative)
So if someone did illegal things through your connection, YOU will still be responsible.
Re:End-to-End Security (Score:2, Informative)
Bare open wireless with a dedicated DHCP/OpenVPN server. Server configured to only allow connections to/from known MAC addresses. Use OpenVPN (128 bit certificate keyed AES) to connect to the internal network.
Potentially an attacker could compromise one of the wireless devices, however the clients could be firewalled to permit only connections to/from the server to limit that exposure.
All clients are already setup with network/printer sharing disabled, so using the software firewall will be an acceptable risk.
Application level would be nice excepting for a few problems. Legacy apps that don't support it, and required services that can't be encrypted (printing/shared drives) without using a fairly brittle IPSEC solution. OpenVPN is a better solution. You end up with strong encryption, better key management, high resiliance (udp tunnelling, not tcp) to loss, higher throughput (lzo compression), and transparent protection.
Re:Securing wireless connections (Score:1, Informative)
A working IPsec wireless gateway setup is described at WAVEsec [wavesec.org].
The best lightweight VPN suite available in the free software world is probably OpenVPN [sourceforge.net]. It uses standard SSL encryption instead of trying to invent its own, and so far no doubt has been cast on its security.
Correction to submission (Score:5, Informative)
This tool does (Score:3, Informative)
I haven't looked at it for a while, I provided a few suggestions a while back. I thought it was a good idea. For non-authorised subnets, it sends bogus ARP replies, with bogus MAC addresses.
ipsentinel [tu-chemnitz.de]
Re:End-to-End Security (Score:5, Informative)
Re:End-to-End Security (Score:3, Informative)
Even if WEP was perfect, it wouldn't protect your traffic on the distribution system that your access-point connects to. The hubs, switches, and routers that your traffic flows through on the way to its destination are still carrying your traffic unencrypted, and it is subject to interception at those points. That's where upper-layer encryption comes in handy.
But those protocols still require secure connection or handshaking procedures between endpoints for all conversations. If you're on some corporate LAN where users are expected to be able to share their files via SMB, or IM each other, you don't require SSL and PGP authentication for every single network transaction. But that doesn't mean you want outsiders to be able to listen in on all your traffic by pointing an antenna at the building. The link between your workstation and the access-point is a wide-open vulnerability, and it's important that the hole be closed. WEP was an important attempt to close that hole, but a massively flawed one. The solution is to fix those flaws, not to require layer 7 authentication for all network traffic.
Re:IPsec is great (Score:2, Informative)
But you can use the following utility, it's not as polished as those $80 clients but it does the job, it's basically a front-end to configure the IPSec for you based on a simpler config file:
http://vpn.ebootis.de/ [ebootis.de]
OpenVPN (Score:5, Informative)
I tried everything, IPSec, SSH tunneling, you name it. They all suck. SSH is, let's face it, limited. IPSec is cumbersome, not exactly friendly to all operating systems, doesn't play well with NAT (unless you use UDP encapsulation), etc. It is glaringly obvious that it's a severely overdesigned protocol.
Enter OpenVPN. It uses SSL for encryption, but it's not a SSL-based pseudo-VPN, but a true VPN - it can forward any IP protocol. Think of it as having the functionality of IPSec, but using a simpler and more sensible implementation.
It's cross-platform (Linux, Windows, Solaris... you name it). It's simple to install and configure (same software can be either server or client and the config file semantics are similar). It's secure (it can use signed certificates, passwords, any authentication mechanism you like). It can compress the traffic on the fly (using LZO which is pretty damn fast and low-overhead). If you use TCP transport instead of UDP, it can tunnel through ordinary HTTP proxies. It has dummy-friendly GUI for Windows. It slices, it dices and it makes coffee... oh, well, maybe not that.
Anyway, i'm running an OpenVPN server on my home firewall, and i put OpenVPN on all my computers (my workstation at the office, my laptop, etc.). Wherever i go, i just fire up OpenVPN and "i'm home".
I run IMAP through it, so my IMAP clients (Evolution), no matter where they are, they "see" the same IMAP servers and folders. That is awesome - different systems, yet my mail looks the same. And it's also secure.
My wireless access point has no security whatsoever: no encryption, no MAC filtering, no SSID cloaking... it even gives you a DHCP address.
It rocks!
Re:Is PPTP considered safe? (Score:3, Informative)
Have a look at OpenVPN [sourceforge.net] instead.
Treat it like any other vulnerability (Score:2, Informative)
Get an "open" hotspot, check the weather, check the game scores, but maybe you should leave the stock selling and the 401k reorganization until you get home.
Re:Correction to submission (Score:2, Informative)
Re:Easier for travelers (Score:2, Informative)
You and Starbucks are pwned.
http://airsnarf.shmoo.com
Have a nice network.
Sincerely,
Beetle
The Shmoo Group