Stronger Encryption for Wi-Fi 175
sp00 writes "The first products certified to support Wi-Fi Protected Access 2, the latest wireless security technology, were announced by the Wi-Fi Alliance on Wednesday. The Wi-Fi Alliance says WPA2 is a big improvement on earlier wireless security standards, such as Wired Equivalent Privacy (WEP), which hackers have found easy to circumvent. It includes Advanced Encryption Standard, which supports 128-bit, 192-bit and 256-bit keys."
Sssssh! (Score:4, Funny)
Re:Sssssh! (Score:2, Funny)
Re:Sssssh! (Score:2, Funny)
I went over to my friends house and was surprised that I was getting a WiFi signal. I asked my friend, "Dude, when did you get wireless?" He was like "We didn't."
Cue a slow grin growing over my and his faces.
Re:Sssssh! (Score:2)
If you don't want me to use it try some WEP at least. I am typing this on a channel-6 "linksys", actually. Now the next time I need illegal movies I'll just use this AP; i
Re:Sssssh! (Score:2)
What a waste of time spent writing that comment. Illegal as in prohibited by the AUP that you sign.
When you get caught, I call it getting AUP'd. Ahaha.
Re:Sssssh! (Score:2)
Re:Sssssh! (Score:2)
upgrades to old equipment (Score:4, Insightful)
Re:upgrades to old equipment (Score:5, Insightful)
Re:upgrades to old equipment (Score:1)
I agree...it's highly unlikely Linksys will be releasing firmware for their older equipment.
Re:upgrades to old equipment (Score:2, Insightful)
Linksys may not like this, and may attempt to sue these projects into oblivian, (using our "friend" the DMCA). But it shouldn't be to hard to implimate.
Re:upgrades to old equipment (Score:3, Insightful)
Re:upgrades to old equipment (Score:3, Informative)
And yes, the WRT54G already does AES-128 in its stock form [linksys.com].
Re:upgrades to old equipment (Score:1)
Question (Score:1, Interesting)
So, are MAC filters any less/more secure than WEP?
Re:Question (Score:3, Informative)
Re:Question (Score:1)
Re:Question (Score:4, Informative)
Re:Question (Score:1)
Re: (Score:2)
Re:Question (Score:2, Informative)
Nope.
unless there is a way to get a standard card to listen to all traffic on a given channel
Yep. Lots of normal cards can do this easily. The rare cards that can't are considered "crippled". A few cards can collect more than 1 channel at once.
AES protects entire frame (Score:5, Interesting)
I believe the AES implementation they are using actually does encrypt the ethernet (MAC) address, unlike WEP. (See Tying It All Together in this article [windowsecurity.com] for corroboration of that.)
WPA2 with AES is the real deal.
Re:AES protects entire frame (Score:2)
Re: (Score:3, Interesting)
Re:AES protects entire frame (Score:2)
But I wouldn't want base 802.11 working with my AES-using base station, would I?
Re:Question (Score:2)
1. You can still see the data in the air, unencrypted when mac filtering is used.
(kismet will do this for example...)
2. The mac address is transmitted in plain text
Good (Score:3, Funny)
Re:Good (Score:3, Insightful)
Sadly, this is more prevalent than we like to think.
overhead (Score:4, Interesting)
Re:overhead (Score:1)
WPA2? (Score:3, Informative)
Re:WPA2? (Score:5, Informative)
That said, WPA-2 provides basically zero benefit over WPA. WPA relies on the same RC-4 algorithm as WEP, but has a few patches put in place to resolve the problems it had. The most important one is using a new key for each frame. Given a choice between an algorithm that can be broken given 11MB of data and one that has no known attacks, do you think that it matters which you use to encrypt 1500 bytes? Not really.
The good news about WPA-2/802.11i (same thing, just certified and a less scary name for the PHBs) is that it breaks hardware compatibility, and that means there's a chance that things have been done right this time.
"Easy to circumvent"? (Score:5, Informative)
It is not as easy as everyone says. Try it with some brand-new, high quality equipment and you may be surprised at the result.
Serious answer form geeks in the know...? (Score:3, Interesting)
Re:Serious answer form geeks in the know...? (Score:3, Informative)
Re:Serious answer form geeks in the know...? (Score:2)
Re:Serious answer form geeks in the know...? (Score:3, Informative)
If so, you should lay on the best encryption you have. If you can see other APs on the block, they can see you, too. You don't want someone to come in and rifle through your network, or release a worm or whatever. It is prudent to consider anything connected to the AP as untrusted.
The best solution, in my mind, is to put a firewall between your APs and your internal network, and allow only VPN access to your internal net. A few steps back in
Re:Serious answer form geeks in the know...? (Score:2)
One approach is to ask if they would seriously consider leaving the front door of the business unlocked at night. The wireless AP is a doorway to your network that is unlocked, and that no one is watching. (Well, no one but you.)
Okay, it's locked, but with a crappy lock. Think of SSID as a little hook-and-eye gadget, not a real lock. WEP-64 is a little luggage lock; anyone with sidecutters and a strong hand can br
Re:"Easy to circumvent"? (Score:3, Insightful)
That's actually not true. There were certain attacks that relied on weak IV's. So manufacturers stopped sending out the weak IV's--which means the keyspace is reduced and now other attacks are more feasible. I don't know of a script kiddie tool to do this, but there hav
Re:"Easy to circumvent"? (Score:1, Insightful)
Please come back with an argument once you become a little more knowledgeable in this area. A**hole script kiddies need not apply.
No, YOU are wrong. (Score:2)
You are incorrect. One hole has been plugged; others appeared, some are still theoretical, and not all are widespread.
If you care, run a VPN and then it doesn't matter.
Hmm (Score:4, Interesting)
Oh well mine is enabled
----
Free IPods [freeipods.com]
Re:Hmm (Score:5, Insightful)
That's a bit out there. Do you really want the ISP doing what they think is best for you (or them)? "Oh, so you're running a webserver." Block port 80. "Oh, so you aren't using Microsoft's Firewall?" It gets installed by a tech and they charge you 50 bucks for the trouble, even though you have a hardware firewall, etc. Trust me, you don't want to be punished by rules set for the lowest common denominator.
The problem here is the problem we see everywhere when it comes to computers: usability. WEP is counter-intuitive to implement. WPA is a step in the right direction with a single password (as people understand the concept of passwords). The new MS wireless manager in SP2 goes a lot way to simplifying wifi also.
Make no mistake about it, there are lot of people who tried to get WEP to work only to have it fail. I know I've had bizarre issues with WEP that could only be fixed with a hard reset on the device and falling back to default settings, a firmware downgrade, upgrading firmware on the card, generating new keys every so often because the thing just didn't like the old ones, playing around with advanced wireless settings, etc. I don't think that level of troubleshooting should be expected from a typical end user.
Re:Hmm (Score:2)
So... (Score:4, Interesting)
I have no illusions about the "security" of WiFi, no matter how encrypted it may be. The signal is traveling through open space for anyone to look at, and if you look at enough of the signal, you can find the pattern. This just increases the processing power needed by the AP and Card, further pushing the development of more advanced, procs. (Don't get me wrong, I'm all for this)
I understand that corperations are interested in this for security, but for an average joe like me, I keep my access point wide open for anyone to use. If you want to look at my GF's reciepe's or our photos, go right ahead.
Security is only as important as you make it to be.
Re:So... (Score:2, Funny)
;)
Re:So... (Score:1)
Re:So... (Score:2)
If you have the thing encrypted up the wazoo, and they break it, then the courts are going to say "Sorry, not possible. It's using really good encryption."
If you're really worried about trusting your neighbors, then give them free access to it, and limit their speed somehow so it doesn't bother you. Voila, you're a carrier with no knowledge of what t
Re:So... (Score:2)
many consumer-grade APs don't keep logs, and those that do have the feature disabled by default. usually these logging features involve dumping the log to a certain port on a PC, so that would mean having another machine running all the time with software to receive and store the logs.
Re:So... (Score:3, Insightful)
It remains to be seen if this is the case, but if you really want security use proven technology like SSH or a well implemented VPN.
Re:So... (Score:3, Funny)
Actually, we just want to see her photos.
Actually... (Score:5, Insightful)
Yesss.. that sounds like a great idea.
However, if you don't mind, I think I'll skip all the "take a look at my recipies" formalities and go straight to
- sniffing your email passwords,
- reading your email,
- sending email under your account from your IP,
- using your wireless access point to spam,
- surf some underage porn using your IP,
- seed my "next big worm" from your connection,
- browse/sample your internal network from the IP your WAP so conveniently gave me,
- and finish up by making various explicit threats against the president on the newsgroups while simultaneously using your cable connection to make VoIP calls to the NSA and reading them some of your previously mentioned fine recipes.
I almost forgot to say thank you for the free access point. Where are my manners...
Wait... (Score:1)
Why not get users to use what they have (Score:3, Insightful)
Re:Why not get users to use what they have (Score:1)
Re:Why not get users to use what they have (Score:5, Insightful)
Try months (and thats on old equipment with no firmware upgrade to filter out weak frames). Try not getting spotted sitting there with your laptop and running airsnort all day.
Do these WEP fatalists also refuse to lock their cars/house doors because anyone with some skill and one easily gotten tool can open their doors? Do these people also make their own padlocks in their basement because every manufacturer has a master key? Do these people also use blank passwords because cracking NTLM or most passwd files is very doable, etc.
Re:Why not get users to use what they have (Score:2)
Do these people also make their own padlocks in their basement because every manufacturer has a master key?
Warning: Geek nit-picking ahead!
I have taken a few padlocks apart, and have never seen the pins have more then one break. That means that there is no master key for the padlock.
I'm not saying that it is impossible to have a padlock with a master-key, but that every padlock that I've seen has no master key.
Re:Why not get users to use what they have (Score:2)
The problem lies more with people who say "we're already using WEP, so why enforce SSH/IPSEC/VPN?" People should think of WEP as a minimal "better than nothing" layer to keep casual visitors out while the real strong encryption protects from the more advanced crackers, but that's not usually what happens.
I'd rather build the entire network to be safe with WEP
Re:Why not get users to use what they have (Score:2)
AES is good, FIPS 140 AES is better... (Score:1)
http://csrc.nist.gov/focus_areas.html#cryptogra
Flaw fixed? (Score:4, Interesting)
It wouldn't be a bad idea to use something like this for non-broadcase Ethernet either, now that I think of it.
Re:Flaw fixed? (Score:1)
Re:Flaw fixed? (Score:2)
The point, though, is that if you use the same key all the time an attacker has even more time to crack the encrypted data stream. OTOH, if you only use the preshared key for negotiating a new session key, it becomes a lot more difficult for an attacker to sample enough encrypted material to perform a proper attack.
Re:Flaw fixed? (Score:2)
PGP? (Score:2)
Re:Flaw fixed? (Score:3, Informative)
Um, yes, it WOULD be a bad idea. WEP/WPA/WPA2 are all server-client protocols, in that they encrypt transmissions between a number of remote clients and a single central point. In order to make the analogy hold to wired Ethernet, you would have to make every Ethernet switch/hub/router support the crypto interaction with clients. As well as replacing every NIC in existence.
And even then, the e
802.1x (Score:3, Interesting)
What is the real advantage to WPA here?
Re:802.1x (Score:5, Interesting)
My school *shudder* has access points in many of the labs but after a student said he was going to "hack" into it there was a simple warning:
Really, it made sense. He simply stated that there was no point in getting a signal without access rights. The man's first job was to secure the wired network. Once the AP's were put in, it wasn't a problem.
Could you run wild on your companies network by just plugging into the next available switch?
If so, fix that problem first.
Can we upgrade firmware ? (Score:2, Redundant)
I'm finding those wireless encryption thing to be a load of bullshit.
It seems like everytime they finally seem to get the crypto part down (WPA), we get something new (WPA2). I think I'll wait for WPA12938491849034 before upgrading any of my hardware.
Thankfully we have IPsec. (if only the OS-X version didn't suck so much)
Sunny Dubey
Re:Can we upgrade firmware ? (Score:2, Informative)
hers the deal (Score:1)
Deal.
I still prefer a wired connection.
Re:hers the deal (Score:1)
Pointless.. (Score:5, Insightful)
As long as these acess points are shipped with encryption turned *OFF* by default this is like pissing in the wind. It could be 1 billion bit one time pads and woulnd't make any difference. In my neighboorhood there are 10 unencrypted networks....all on the default channels. Out of the box straight onto the network is how they are set up. Joe Sixpack doesn't have time to deal with encryption.
*don't worry much residential war drivers..there will still be free lunch for a long time to come...
Re:Pointless.. (Score:1)
So some provider is doing something right.
Re:Pointless.. (Score:4, Insightful)
Even if it's turned off by default, the ability to turn on good crypto is perfectly useful.
Re:Pointless.. (Score:2)
Re:Pointless.. (Score:2)
It might be more accurate to say "Joe Sixpack won't set aside the time to learn how to properly use the really complicated technology he buys".
I mean, really...if the huddled masses had their way, there'd be one really big red button on a computer that says "do what I want" on it. You and I both know it's not really that easy, although companies love to spend big bucks on marketing to try to convince people that it is that easy.
Re:Pointless.. (Score:2)
You make it sound like this is the end of the world. What's the point of turning on encryption if you're not trying to hide anything? So what if somebody can see what porn site you're surfing... And if you're sending confidental data y
Missing a point here... (Score:3, Insightful)
Re:Missing a point here... (Score:1)
There is a difference between not having a technology and not using it. The difference is that people who want to use it can if it's available, while no one can if it's not.
Re:Missing a point here... (Score:2)
So I have to upgrade...again? (Score:4, Interesting)
The real question now is ... (Score:3)
or against [slashdot.org] it?
Link level security is fairly useless. (Score:2, Insightful)
WPA 2? How about WPA 1 support? (Score:2, Interesting)
To me the chief advantage of WPA is a human readable password.
its about time (Score:3, Insightful)
Re:its about time (Score:2, Insightful)
That was the first mistake which led to all the war-driving originally - early WEP implementations used good algorithms, but chose a weak Initialisation Vector, which made it easier to decrypt the traffic.
Let's hope that they've learned their lesson this time, and aren't just trying to get people on the upgrade cycle again - WEP -> WPA -> WPA2 -> when will it stop?!
Re:its about time (Score:2)
Suppose that a frame looked like this:
Now, suppose a chipset is specced to implement:
However, their c0d3r is an off-by-one idjit and really implements
WEP security (Score:2, Insightful)
Theres a very small minority of people still using weak 64-bit ASCII key generator algorithms that were found to be only 21-bits of effective keyspace. These can be cracked offline in about 15 seconds with a single encrypted frame but other than that, offline cracking of WEP is still a hard thing to do (from a practical poin
VPN (Score:3, Insightful)
allows for a variety of client systems to connect.
I'm thinking of setting up a small WLAN using old equipment that i can get almost for free.
I would just plug another NIC in my OpenBSD firewall and keep nothing but the necessary ports for the VPN open.
There's a broad range of encryption and authentication methods available, and if the one I use
would be too weak, I could just change to another one instead of having
to buy new hardware such as PCMCIA cards, APs etc.
The really important question. (Score:3, Interesting)
If you use WEP at the moment, some operating systems will prompt you to enter the key. Not the passphrase, but the digested key. So even though I know the passphrase, I must type 26 characters of hexidecimal into my iPaq with a stylus. Linux is no better for wireless and the last time I looked required hex too. Linux is particularly lousy if you use more than one WLAN since all the dists I've tried only store the details for one of them.
It is absolutely ludicrous. XP doesn't do that and I doubt (though I haven't tried) that OS X would either.
Given that, it would not surprise me that of those who even know to enable crypto if half don't just give up or use MAC filters or no security at all.
My preference would be whatever standard they choose be mandated to use crypto by default - and by virtue of the even longer key length it will force software makers to improve their support for it.
Re:The really important question. (Score:2)
Re:The really important question. (Score:2, Informative)
Re:Does this means... (Score:2)
Re:Does this means... (Score:3, Insightful)
The number of bits used by the key is not enough to judge the security of the system. You could have a crap cryptographic algorithm or, more likely, a crap protocol.
Re:Does this means... (Score:4, Informative)
Keeping a serious attacker away from your data, if it's specifically you he's after? Possibly not.
Keeping a casual war(mode-of-transport)'er out of your WLAN to stop him leeching your bandwidth? Probably.
Re:WHY WONT SLASHDOT POST THIS STORY? (Score:2)
Lyons doesn't exactly have a reputation for writing accurate, nonbiased, intelligent pieces.
That doesnt explain it... (Score:2)
Re:WHY WONT SLASHDOT POST THIS STORY? (Score:1, Interesting)
Re:WPA vs WPA2 ? (Score:2)
All of the sites I've seen discussing WPA vs. WPA2 make is seem like the big thing in WPA2 is the use of AES.. I would suspect that there is more to it than that, but WPA-PSK/AES is probably pretty close to 802.11i/WPA2. More to the point, I'd expect that any hardware capable of using WPA with AES could be firmware upgraded to full WPA2 if there are any lingering changes.
This is all a WAG, of course.