WEP Broken Even Worse 393
collin.m writes in with news of results out of Darmstadt. Erik Tews and others there have demonstrated how to recover a 104-bit WEP key in under a minute, requiring the capture of fewer than 10% the number of packets the previous best method called for. The paper is here (PDF). Quoting: "We were able to extend Klein's attack and optimize it for usage against WEP. Using our version, it is possible to recover a 104 bit WEP key with probability 50% using just 40,000 captured packets... for 85,000 data packets [the success probability is] about 95%... 40,000 packets can be captured in less than one minute under good condition. The actual computation takes about 3 seconds and 3 MB main memory on a Pentium-M 1.7 GHz..."
Can ARC4 be used properly at all? (Score:5, Interesting)
On a somewhat related note, I'm annoyed that wireless encryption was implemented in hardware. Nintendo DS's wireless is worthless to me since the encryption system can't be upgraded.
Re:Can ARC4 be used properly at all? (Score:5, Insightful)
Re:Can ARC4 be used properly at all? (Score:5, Insightful)
Login authentication does not prevent a man in the middle attack of the breakin sort.
You need end to end encryption, including encrypted login and certificate verification with secure exchange made pre-connection to provide security over a wireless link.
Just another reason why if it's not a PDA or a tablet, you should be using a wire. You can get 100' or more of CAT5E for the price of a 802.11G access point, and an 8 port 10/100 FDX switch with port autonegotiation (auto-crossover, too) is about $20. Good jacks will run you $5 per end. Patch cables are a buck and longer cables are just a few bucks.
Re:Can ARC4 be used properly at all? (Score:5, Funny)
Re:Can ARC4 be used properly at all? (Score:4, Informative)
Re:Can ARC4 be used properly at all? (Score:4, Interesting)
Re:Can ARC4 be used properly at all? (Score:4, Insightful)
Re:Can ARC4 be used properly at all? (Score:5, Insightful)
Conduit (Score:3, Insightful)
Re: (Score:3, Informative)
Re:Can ARC4 be used properly at all? (Score:5, Insightful)
Re: (Score:3, Insightful)
Re: (Score:3, Informative)
The good news is that Sheetrock is easy to do. If you don't mind fairly major DIY projects, it wouldn't
Re: (Score:3, Interesting)
Re: (Score:2)
Unless you live in an apartment, this is not remotely true. Running your own wires is, well, trivial unless you are physically disabled in some significant way.
If you do live in an apartment, it's much harder because walls have to be ripped apart and put back up, or at the very least to do it gynecologist style you have to put medium-sized holes
Re: (Score:2)
OTOH, if you live in a house, you don't want ugly blue, gray, whatever wires all over the place uglying up your home and creating trip hazards. Especially if you have more than one floor. No matter what you do, if you're going through walls, it's going to take more than an hour to get what you want. Even if you w
Re: (Score:2)
Well, I agree with this argument.
So part of your argument is that uglying up your apartment is okay? Because the wires don't become invisible in an apartment.
Re:Can ARC4 be used properly at all? (Score:5, Insightful)
Uhmm, methinks you have not actually done this much... Or at least not in many houses.
Things like lath&plaster, plumbing, strange placement of studs, lack of crawlspaces, windows, carpet, laminates, tile, doors, fireplaces, and foundations - all sorts of stuff really makes it not, well, trivial.
Re:Can ARC4 be used properly at all? (Score:5, Funny)
Re:Can ARC4 be used properly at all? (Score:5, Funny)
Your use of past tense is all the more curious.
Re:Can ARC4 be used properly at all? (Score:4, Informative)
Re:Can ARC4 be used properly at all? (Score:5, Insightful)
Re:Can ARC4 be used properly at all? (Score:5, Insightful)
1. Story posted about $SECURITY_PROTOCOL being broken on $BROKEN_DATE at $SEVERITY
2. Comments ensue recommending ridiculously complex/impractical solutions (in typical slashdot lore) getting modded up
3. Comments ensue about how ridiculous and complex those impractical solutions are, getting modded down/up on a 50/50 basis
4. Actual common-to-do, easy to implement solutions, like the WPA2 in linksys routers, are not discussed or modded
5. Extreme architecture biases/overall naivete about NO security implementation being completely secure is prevalent in a lot of comments
6. Sometimes, people come in to right these fallacies in the free market way, by posting.
Put short, wires are not a solution, no encryption protocol is flawless, the risks/rewards of wireless should be known and the technology should be used accordingly. But improvements in protocol and advancements in technology, especially relatively easy to implement ones, should be emphasized.
Securing a wireless router and using the NDS... (Score:2)
disable wireless security and implement real security, such as a RADIUS login. then set up a firewall rule to allow unauthenticated devices to access nintendo's servers
Not too shabby. Question for ya, though: Does all the traffic for those NDS games go through the Nintendo servers, or is it routed straight to the other players? Sending packets directly playerplayer would be faster but it would also make it harder to deal with NAT and firewalls, I suppose...
And can you actually make a wireless router accept both secured and unsecured connections (or WPA and WEP connections) at the same time? So, for instance, the laptops of the house would all use WPA and the NDS would
Re: (Score:3, Interesting)
So, for instance, the laptops of the house would all use WPA and the NDS would use WEP?
That wouldn't really increase the overall security of the network. If somebody wanted to break in, he'd just crack the WEP encryption..
I am aware of that flaw. However, I'm attempting to make the best of a bad situation - a perfect solution is not possible.
The idea is that by having the NDS and only the NDS use WEP, the opportunities for sniffing WEP packets will be limited to those times when someone's accessing the network with an NDS - as opposed to when one of our unwired computers is on (and presumably doing some net activity, either in the foreground or background), which is pretty much all the time. So if someone wanted to break
Re:Can ARC4 be used properly at all? (Score:5, Informative)
RC4 is still just as secure as it was before these WEP attacks.
Re:Can ARC4 be used properly at all? (Score:5, Insightful)
Re:Can ARC4 be used properly at all? (Score:5, Informative)
However, you can apparently upgrade your DS to support WPA with a hacked firmware [geekboy.ca]. It's not clear from the page, but I am fairly sure that it only supports TKIP encryption and not AES since, like WEP, TKIP uses RC4 so does not require a hardware upgrade. It does, however, solve the initialization vector problems of WEP that another poster mentioned; as far as I know, TKIP has not been broken.
Moral? If you're still using WEP, update your drivers and firmware and you may be able to get TKIP WPA and get those pesky neighbors off of your connection.
Who even still users WEP? (Score:2)
Re:Who even still users WEP? (Score:5, Insightful)
Re:Who even still users WEP? (Score:5, Interesting)
No. We use some prety antique hardware (laptop with embedded 11b no WPA). We are fairly remote so the number of potential attackers is pretty slim. To discourage them, DHCP is truned on. The DHCP range is blocked from the gateway by access control. To get a leachable connection, you will need to spoof a MAC address, use a fixed IP address, and hope we are not online at the moment. A conflict will be noticed.
We don't need a hack proof wireless. We just need to be more difficult than our neighbors.
Re:Who even still users WEP? (Score:4, Interesting)
As long as you secure your computers and data (and if you're not charged by the GB), it's really useful to be able to tell the judge that it was teH h4X0rZz when the RIAA rings at your door.
Re:Who even still users WEP? (Score:4, Insightful)
I mean, no matter how bad WEP is, you'll never be able to hack into a WEP network as fast as you can an open one.
It may be where I live, but around town there are open networks virtually EVERYWHERE.
Re: (Score:3, Funny)
Re: (Score:2, Insightful)
Re: (Score:2)
Corporate Greed (Score:5, Informative)
Re: (Score:3, Informative)
Re: (Score:2, Informative)
Re: (Score:3, Insightful)
Re: (Score:2)
I do not think that means what you think it means.
laptop + broadcom 802.11G adapter != precisely zero
Re:Who even still users WEP? (Score:5, Insightful)
Well, that was an incredibly arrogant response from someone who refuses to examine reality.
How many environments are you familiar with in which everything is always upgraded all at the same time, in which all of the hardware works the first time, and in which you never become dependent on a legacy product for any length of time?
Here in the really real world, we often have reasons to utilize legacy hardware. What if I've got one of those $1500 bar code scanner boxes and it doesn't support WPA and there's no upgrade to provide it? Am I going to spend $1600 for this year's model with two more buttons and WPA support? Or am I going to keep using this device as long as I think I can get away with it? What if I don't have budget to buy a replacement? What if it's not even my decision?
Like I said, here in the real world, we often have to use suboptimal equipment. And I assure you that huge numbers of corporations, including those amongst the fortune whatever, are still using wifi gear with no WPA support on a daily basis.
Re: (Score:3, Interesting)
Instead, I offer this suggestion: Stop using the old scanners, and go back to whatever system you were using before you decided that wireless bar code readers were Teh Way to Maximum Synergistic Productivity through Leveraged Asset Management and Total Quality Control. Use that old syst
Re: (Score:3, Interesting)
Re:Who even still users WEP? (Score:5, Insightful)
Re: (Score:2, Redundant)
Re:Who even still users WEP? (Score:5, Funny)
Is your sister cute? Does she have pictures of herself on her computer?
Another way to do the same thing (Score:2)
Re: (Score:2)
Uh....How do I do that on my PDA with a 415mhz processor?
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:2)
I'm using a cable connetion that the Comcast claims is 6Mbs down, not that I ever see it, and 400Kbs up. 802.11b is a raw 11Mbs max, and with a solid connection I see about half of that. The best actual cable performance I've seen lately (dslreports) is 2522Kbs down, which doesn't tax 802.11b. Why pay for 'g' at 54Mbs maximum when the connection to the rest of the world won't see a bit of that?
Have you figured out now that the only thing I'm using wir
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:Who even still users WEP? (Score:4, Informative)
Nintendo's response to this is, last I checked, "well, disable WEP and then turn off your computer," which is obviously ridiculous.
Re: (Score:2)
Re: (Score:2)
Stack routere.. Use the WEP router at the cable box. If it's hacked.. your other machines are behind another NAT router. If possible, set up MAC filters to just one. It helps detect unauthorised connections. A second duplicate (spoofed) client would cause a conflict. If you have trouble connecting, you know to check via hard connection or wireless traffic lights that someone has connected. An unreliable connection should hel
Re: (Score:2)
!@*_!@#_!@*#!(_@#!_(@#
I'm half tempted to lock down my wireless and just buy the usb dongle and use my laptop for Nintendo DS Wifi.
Re: (Score:3, Informative)
2 of them are WPA-PSK (including mine)
12 of the are unsecured.
The rest are WEP.
7 of the WEP encrypted ones are the DSL router/wireless access point that AT&T hands out. As far as I can tell this piece of hardware can't be configured in any way, can't even change your WEP key.
Re: (Score:2)
Linux.
Every time I've tried to use WPA my Linux laptop can't access the network (currently Dapper Drake). I've tried the wpasupplicant stuff a few times now, but without success, and the troubleshooting involves mucking with config files, breaking what gui support there is, etc.
The lack of good GUI support is an issue, I don't want to drop to the command line, and manually edit configuration files for wireless networking. I switch networks too often to have any desire to 'fidd
Re: (Score:2)
save your work
ctrl-alt-backspace
log back in
voila.
Re: (Score:2)
Re: (Score:2)
Re:Nice try but... (Score:5, Informative)
Rainbow tables, dictionaries, and the like are all just variations on brute force. They accelerate the process, but either way you're not actually breaking the encryption but instead using a crapload of processor power to try one key after another until you hit the right one.
Saying WPA is insecure because there is a brute force tool for it is like saying the a lock is insecure because I could go and start trying combinations. 1-1-1....1-1-2....1-1-3.........
So what... (Score:2, Interesting)
But many home users run their access point completely open and never have a problem. WEP still will make an attacker have to actually break in - negating their excuses of "well it *was* wide open , so..."
Of course, this vulenrability applies to those would wish to/need to secure their networks.
Re: (Score:2)
Back in the courtroom (Score:5, Funny)
Case Dismissed!
Re:Back in the courtroom (Score:4, Insightful)
there is significant doubt as to who the user of a wireless lan really is.
in fact, it now makes sense to DOWNGRADE wireless AP's due to this...
(and then just run ssh on top of it, for sessions that truly need privacy).
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Interesting)
Totally valid point. One of the main reasons you should stay under the radar and not get a finger pointed at you if at all possible.
While excuses such as 'someone was on my wireless' are totally valid, the court will indeed check your systems, and once they find t
Re: (Score:2)
You're fuckin' kiding me right? Everyone does this. Today they're suing me, tomorrow they could be suing you, your honour.
Re: (Score:2)
How thorough are they going to be looking at your drive? If the partition table comes up as 250GBs, and the system disk looks normal, they wouldn't be looking very much further. Even if they clone the drive, they rest of the encrypted disk will just look like noise.
Re: (Score:2)
Here is the bill from your lawyer... After all the outcome is after they took an image of your hard drive and fought the case and found this isn't the hard drive we are looking for and they tried to find out who in the last year may have brough over a computer such as parrents, children, siblings, girlfriends, boyfriends....
The Case Dismissed is still expensive.
Does this still depend on weak IVs? (Score:4, Interesting)
I know that the original attack did depend on that, and most software and basestations have since been configured to avoid those weak IVs. I know that some stuff (like Nokia's basestations) are still weak agains the original attack (at least when tested with Kismet), however, against Cisco Aironets and almost any newer hardware I haven't been able to see this weakness in action when trying out if it really works...
(Terabeam uses the term "WEPPlus" about this - see http://www.terabeam.com/solutions/whitepapers/wep
Anyway, if this is just extension of the original attack, then it still requires those weak IVs to exist.
Or is it something completely new?
Re:Does this still depend on weak IVs? (Score:5, Informative)
According to the article, the attack does not require weak IVs. They haven't actually tested against WEPplus, but expect the attack to still work against it. In other words, WEP in all its forms is now nothing more than an electronic "No trespassing sign" and 3-foot fence.
Re: (Score:2)
Re: (Score:2)
This has not been tested due to lack of equipment supporting WEPplus. Since WEPplus only avoids the weak IVs of the original FMS attack, we foresee no problems in applying the attack against WEPplus
So you probably still aren't secure.
What about 64 and 128 bit? (Score:4, Interesting)
Re:What about 64 and 128 bit? (Score:5, Informative)
Re: (Score:2)
Re: (Score:3, Informative)
WEP uses a 24 bit initialization vector, and the rest is left for the actual key. So 40 bit = 64 bit - 24 bit IV. Same for 128 = 104. People just use the terms interchangably (for better or for worse).
Don't worry about it (Score:2)
No problem for me (Score:5, Funny)
Today on duh news. (Score:5, Funny)
Breaking News (Score:2)
WPA has been around for something like 2½ years now, and it is a travesty if the wireless chipset you're using doesn't support it.
The simple solution is continue to use WPA, like you should have been doing for years...
If you can only use WEP, then VPN or SSH tunnel (Score:2)
In a corporate environment where it's hard to control who knows the passwords, do NOT bridge the wireless network to your secure cabled network but put it on a DMZ and allow limited services out to the internet, and even fewer into the corporate wired lan.
Re: (Score:2)
But setting up one is one of the most difficult things known to man.
10 minutes, 1 minute... no big deal (Score:3, Interesting)
This isn't really news. It's pretty smart that they have managed to crack WEP with so few IVs (it usually takes about 200,000 for 64bit and just under a million for 128bit) but in reality this doesn't change (or expose) WEPs inherent vuneribilities at all, for example I am currently doing my dissertation on wireless security and in tests WEP64 on average can be cracked in about 3 minutes and WEP128 in about 10 minutes so getting this down to a minute doesn't really change the fact that a hacker could capture enough packets simply by hanging around and drinking a coffee using the "old" tools.
An interesting sidenote is that the amount of time a hacker needs to be near a target WLAN for WPA-PSK is measured in seconds making it much more insecure if it has a weak passphrase than WEP is even now with crack times under a minute.
Please if you want a secure home wireless network choose WPA-PSK and make the passphrase as long and as abstract as possible, nothing else is safe -and if you have the cash... buy a radius server
Re: (Score:3, Interesting)
For my computers at home, I used the "Perfect Password Generator" that is on the grc.com web page to generate the longest most random possible WPA password. Each time I visit that web page a different a password is generated. I then placed the password on a USB key and transfered the password to both of my computers and the wireless router. I then cut and pasted the password instead of trying to type the huge password. For the extra paranoid, slicing and dicing and mixing up the long password that is ge
The most obvoius solution. (Score:3, Insightful)
Since this is Slashdot, I request a community service: Come up with a script/whatever where this is simple.
Need a new laptop card (Score:2)
Broken Even Worse?! (Score:5, Funny)
Re: (Score:2)
Faster, yes.
More reliable, likely.
More secure, ceratinly.
Cheaper? ABSOLUTELY NOT! Pulling cables through the walls, and underground to a detatched building, was several times the cost of the router and access point, let alone the convenience when other family members bring their laptops and PDAs over.
Re: (Score:3, Funny)
CAT5 Total Price*: $393
Having your network compromised and your identity stolen: Priceless
Easily spoofed. (Score:3, Informative)
Plus, once an attacker has enough packets, he or she can divulge the necessary MAC address from those packet headers, so it's not really as great an aide as many claim...
Re: (Score:3, Informative)
"MAC filtering: This is like handing a security guard a pad of paper with a list of names. Then when someone comes up to the door and wants entry, the security guard looks at the person's name tag and compares it to his list of names and determines whether to open the door or not. Do you see a problem here? All someone needs to do is watch an authorized person go in and forge a name tag with that person's name. The comparison to a wireless LAN here is that the name t