[ / / / / / / / / / / / / / ] [ dir / bbbb / bmw / htg / hwndu / loomis / newbrit / strek / ttgg ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Name
Email
Subject
Comment *
File
Select/drop/paste files here
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): 790c0b23b0905cb⋯.jpeg (19.06 KB, 380x300, 19:15, generic wi-fi image.jpeg) (h) (u)

[–]

 No.806357>>806417 >>806514 >>806676 >>806751 [Watch Thread][Show All Posts]

So WPA2's been busted, maybe.

https://www.alexhudson.com/2017/10/15/wpa2-broken-krack-now/

>On social media right now, strong rumours are spreading that the WPA2 encryption scheme has been broken in a fundamental way. What this means: the security built into WiFi is likely ineffective, and we should not assume it provides any security.

>The current name I’m seeing for this is “KRACK”: Key Reinstallation AttaCK.

 No.806359

File (hide): cdcbfc0e687744f⋯.jpg (7.36 KB, 245x255, 49:51, All_Smiles.jpg) (h) (u)

wifi fags BTFO again.


 No.806360

It's been broken for a while now between weak keys outside of wpa2-enterprise and WPS (((bugs))). Are you just now noticing this?


 No.806364

Everyone in enterprise runs VPNs over wifi and normies don't care about encryption. If true, I don't think it'd be a big deal.


 No.806381

File (hide): 412c770939026f7⋯.jpg (57.42 KB, 601x601, 1:1, 1493415910038.jpg) (h) (u)

4 more hours until embargo is over.

HYPE


 No.806385

time for WPA2 Fast 2 Furious


 No.806399

CAT5 was right again.


 No.806406>>806409

https://www.krackattacks.com

TLDR : This allows to force a reuse of wifi keys that are easy to break (some linux ( &android) use a bunch of zeros) .

It does this by simply re-sending a packet.

Thus this allows to read and forge packets.

Well shit, this with the Bluetooth attack will be a blight for the next ten years, till most of the IOT crap that has these vulns dies.


 No.806409>>806547

>>806406

At this point you got to ask who designed this standard.

A nonce reset should not mean to start back at zero, it should at least start at some random offset.


 No.806413

File (hide): a711c75a666703c⋯.jpg (28.81 KB, 421x421, 1:1, 1459104815324.jpg) (h) (u)

>mfw i don't use wifi


 No.806417>>806495

File (hide): 170e6ffd561ae35⋯.png (106.39 KB, 892x248, 223:62, b.png) (h) (u)

>>806357 (OP)

Rumor is real. Now published. Read URL.

Key Reinstallation Attacks Breaking WPA2

>https://www.krackattacks.com

>We discovered serious weaknesses in WPA2. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). The attack works against all modern protected Wi-Fi networks. Depending on the network configuration, it is also possible to inject and manipulate data.

>The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. We discovered ourselves that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by some variant of the attacks.

>Our attack is especially catastrophic against

wpa_supplicant
. Here, the client will install an all-zero encryption key instead of reinstalling the real key. Since the Linux autists are the only people that strictly follows what the standard suggested:
memset()
the key to all-zero after installed. During the attack, it will reinstall the now-cleared encryption key, effectively installing an all-zero key.

I'm using WPA2 with only AES. That's also vulnerable?

Yes, that network configuration is also vulnerable. The attack works against both WPA1 and WPA2, against personal and enterprise networks, and against any cipher suite being used (WPA-TKIP, AES-CCMP, and GCMP). So everyone should update their devices to prevent the attack!

What if there are no security updates for my router?

> Our main attack is against the 4-way handshake, and does not exploit access points, but instead targets clients. So it might be that your router does not require security updates. For ordinary home users, your priority should be updating clients such as laptops and smartphones.

In short, it does allow an attacker to decrypt, modify and inject traffic. It doesn't allow an attacker to crack your Wi-Fi password, but if you are on /g/, you probably know the implication.

Anyway, WPA2 is not everything you need for serious security anyway...WPA doesn't have Forward Secrecy. If one can record all your WPA handshakes, and later obtained your PSK, all traffic can be decrypted. The defense is IPSec, but it's extremely hard to maintain the system, and I found the easiest way is installing a VPN, such as OpenVPN (with DHE) on the router. Now shit happens, and this solution is proved to be useful.


 No.806419>>806421 >>806422 >>806448 >>806475 >>806499 >>806536

File (hide): 195015b98fb8d3b⋯.jpg (42.67 KB, 321x352, 321:352, 1469034663190.jpg) (h) (u)

LINUX BTFO AGAIN

how will it ever recover?


 No.806421>>806427

>>806419

>LINUX BTFO AGAIN

I blame Systemd.


 No.806422

>>806419

If the protocol itself is secure, this practice could only improve security.

Let's say, for this previous attack, hostapd on Linux is the only good implementation.

>https://media.ccc.de/v/33c3-8195-predicting_and_abusing_wpa2_802_11_group_keys

This time apparently WPA2 protocol betrayed everyone, and good security practice backfired in a horrible way... Though, OpenBSD is unaffected because they cheated...

>OpenBSD silently release a patch before the embargo


 No.806427>>806446

>>806421

If only systemd had reimplemented wpa_supplicant, then we wouldn't have this problem!


 No.806446

>>806427

This.

It's time time to switch to networkd, and have Lennart re-implement WPA2.


 No.806447

Time to switch to Gnud-Linuxd-Kerneld

Lennart must re-implement our bunghole


 No.806448

>>806419

>We discovered ourselves that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by some variant of the attacks.


 No.806449

Knew installing W10 was the right idea


 No.806475

>>806419

>Linux is also Apple and Windows

How will you ever recover?


 No.806495>>806497

>>806417

>It doesn't allow an attacker to crack your Wi-Fi password, but if you are on /g/, you probably know the implication.

What implication? Is there some way to get the password using this?


 No.806497>>806498

>>806495

It gives full access to the attacker, why would he need your password?


 No.806498

>>806497

Sometimes you just want some free Internet, my dude.


 No.806499>>806504 >>806507 >>806695 >>806730

>>806419

https://www.krackattacks.com/

> Our research paper behind the attack is titled Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 and will be presented at the Computer and Communications Security (CCS) conference on Wednesday 1 November 2017.

> Although this paper is made public now, it was already submitted for review on 19 May 2017. After this, only minor changes were made. As a result, the findings in the paper are already several months old. In the meantime, we have found easier techniques to carry out our key reinstallation attack against the 4-way handshake. With our novel attack technique, it is now trivial to exploit implementations that only accept encrypted retransmissions of message 3 of the 4-way handshake. In particular this means that attacking macOS and OpenBSD is significantly easier than discussed in the paper.

How will BSDcucks ever recover?


 No.806501

I already got patches from the Debian security repo.

So this really shouldn't be a problem for most distros.

The main problem will be Android phones, since it's gonna take weeks, or even months before they get patched, and some of the won't get patched at all.


 No.806504

>>806499

Well, it also says that OpenBSD snuck out a patch back in July. But they won't be able to do that again.

>To avoid this problem in the future, OpenBSD will now receive vulnerability notifications closer to the end of an embargo.


 No.806507

>>806499

kek and rekt'd


 No.806509>>806512

People who use wifi deserve to get hacked.


 No.806511>>806520

>reminder that wi-fi is a messy clusterfuck of dropped packets and collisions

>reminder that home wi-fi still has one general shared password for authentication and no per-user or one-time passwords

>reminder that wi-fi has no AP authentication mechanism

And now with this,

>reminder that wi-fi is a mistake


 No.806512

>>806509

and some shill urged us to use public wifi for op sec, lol.


 No.806514>>806636

>>806357 (OP)

EXCELLENT, PLAUSIBLE DENIABILITY.

TORRENT EVERYTHING, CLAIM YOU WAS HACKED BY CIA NIGGERS.


 No.806516>>806648

>the attacker need specific and expensive hardware

>it needs to be done in the WiFi area

>it needs to target each client individually

>even breaking the WiFi the attacker would still need to pass trough the HTTPS and/or VPN

>soon it will be all fixed

Nothing to see here.


 No.806518>>806519 >>806525 >>806733

What will replace wifi?


 No.806519>>806648

>>806518

Bluetooth

:^)


 No.806520>>806532

>>806511

>>reminder that wi-fi has no AP authentication mechanism

It does though, it's part of RADIUS.


 No.806525

>>806518

Infrared


 No.806532

>>806520

Your computer will still associate to the rogue AP (bad) and send your identity before establishing a secure tunnel (assuming EAP-PEAPv0 without private identity, or EAP-TLS), which is not exactly good. And god help you if some retard pajeet disables cert validation.


 No.806536>>806648

>>806419

Already been fixed you dumb nigger.

https://lwn.net/Articles/736503/


 No.806547

File (hide): f92bf08d2db44e0⋯.jpg (113.8 KB, 640x640, 1:1, 1460625648901.jpg) (h) (u)

>>806409

>A nonce reset should not mean to start back at zero, it should at least start at some random offset.

THIS IS THE OPTIMIZATION


 No.806557

File (hide): 246ea5301550d4c⋯.png (657.36 KB, 880x798, 440:399, wpa2.png) (h) (u)

someone please make a nerd comic of krack attack before faggy xkcd does. take the wind out xkcd sails.


 No.806634>>806639 >>806640 >>806648

Question, I use cabled shit for everything important in my work, but I've got to keep the wifi on because people around the place can't do without their iGizmos, how fucked am I?


 No.806636

>>806514

extremely underrated post


 No.806639

>>806634

Same and also what about Arris?


 No.806640

>>806634

You could always make a separate normienet airgapped from the network you use.


 No.806643>>806646

File (hide): 909fc7b50675129⋯.jpg (28.87 KB, 498x179, 498:179, wpa2.jpg) (h) (u)


 No.806646

>>806643

Windows and iOS were still found to be vulnerable in that paper, let alone the follow up.


 No.806647>>806648

I design embedded networking products for a living which heavily use wifi and no one's contacted us about this. With heartbleed the phones were off the hook for days. It's weird. Some of the 'security researchers' are clearly better than others at marketting their work.

I'm not even going to bother backporting it to our old wpasupplicant on our older firmware since no one seems to care.


 No.806648>>806737

>>806647

You are a complete and total faggot. Upgrade them you lazy cunt. But it is an amazing (((coincidence))) this spread so quickly.

>>806536

They fixed it for linux's wpa_supplicant too.

>>806519

Fuck off cianigger A.I.

>>806516

Actually you could just copy the traffic in the air and decrypt it later if it's not plain text already. So it's a big deal still.

>>806634

Totally and completely fucked if you don't update the router so that it can't be hijacked at the source.


 No.806666>>806668 >>806671

Fixed.

>[ebuild U ] net-wireless/wpa_supplicant-2.6-r3::gentoo [2.6-r2::gentoo]


 No.806668

>>806666

>mega satan uses gentoo

the memes write themselves


 No.806671

>>806666 Just noting those digits.


 No.806676

File (hide): 226330bdbd919d1⋯.jpg (40.54 KB, 400x400, 1:1, RISE_OF_BONZI.jpg) (h) (u)


 No.806695

>>806499

>>Why did OpenBSD silently release a patch before the embargo?

>OpenBSD was notified of the vulnerability on 15 July 2017, before CERT/CC was involved in the coordination. Quite quickly, Theo de Raadt replied and critiqued the tentative disclosure deadline: “In the open source world, if a person writes a diff and has to sit on it for a month, that is very discouraging”. Note that I wrote and included a suggested diff for OpenBSD already, and that at the time the tentative disclosure deadline was around the end of August. As a compromise, I allowed them to silently patch the vulnerability. In hindsight this was a bad decision, since others might rediscover the vulnerability by inspecting their silent patch. To avoid this problem in the future, OpenBSD will now receive vulnerability notifications closer to the end of an embargo.

Theo did nothing wrong

This speaks a lot about his character. He wouldn't allow his users to run a month with an unpatched security flaw he knew about. Fuck the other vendors.Not his problem.


 No.806730>>806757

>>806499

In practice, OpenBSD has no working wireless drivers, so everyone uses cat-5.

Jews btfo themselves by not releasing hardware specs.


 No.806733

>>806518

High-speed serial ports tbh fam.


 No.806737

>>806648

>Totally and completely fucked if you don't update the router so that it can't be hijacked at the source.

Do I just wait for a vendor's patch and install it via usb stick or are there other temporary fixes? By the way, my router has this quirk where I can't do shit to it (not even access it through credentials) unless its power was cut off, and even then I can only log in for a couple of hours before it reverts to being inaccessible. Am I safer like that or is it just yet another placebo?


 No.806751>>806756 >>806810

>>806357 (OP)

Why WI-FI have a history of shitty security? How hard can it be to create secure wireless communication?


 No.806756>>806758

>>806751

Near impossible. With cable the task of intercepting and substituting packets is much harder as you need to not only have physical access to a cable for a non-negligible period of time, but also to physically alter it in a way that is hard to conceal afterwards. With wireless all you need is to place a small device in the vicinity of a target without it looking conspicuous.


 No.806757

File (hide): 5e6d36f5b855c0e⋯.webm (6.34 MB, 320x214, 160:107, Francis_E._Dac_-_Worldwid….webm) (h) (u) [play once] [loop]

>>806730

why bother with TP cable when ½ wire is cheaper, what fucking interference ever happens in your home that you actually need to have tp


 No.806758>>806761

>>806756

>Near impossible

??????????????????????????????

are you literally retarded????????

all you have to do is use authenticated encryption.


 No.806761>>806765 >>806784 >>806788

>>806758

But muh power consumption. No one is too autistic to implement 4096-bit RSA keys on a fucking internet-connected battery-powered teapot.


 No.806765>>806781

>>806761

Maybe then they should use newer, more energy efficient algorithms? And besides, nowadays we have cheap phones with multicore CPU's and few gigs of ram. I think you can afford nowadays to insert powerful hardware into routers.


 No.806781>>806788

>>806765

But muh profit margins.


 No.806784

>>806761

>4096-bit RSA

you have no fucking clue what you are talking about. just stop it my dude


 No.806788

>>806761

>>806781

t. 🇮🇳


 No.806795>>806797 >>806803

File (hide): ae826bebfa5f241⋯.jpeg (105.94 KB, 1200x1029, 400:343, linksysrouter.jpeg) (h) (u)

File (hide): 5f958527c269a31⋯.jpeg (218.73 KB, 1600x1200, 4:3, internetkillswitch.jpeg) (h) (u)

How would an anon make a WiFi kill switch similar to the one in the Make-Weekend Projects that simply puts a physical break on an Ethernet cable? I would like a physical switch to turn off/on (shutdown/reboot) the wifi at the router end - cutting off or allowing access to any authorized wifi clients. I know some laptops have a physical slide switch to turn on/off wifi capability - this would be similar, but at the router end to cut out wifi connections only (router has separate ethernet connections that shouldn't be affected)

Is there a way of doing this that anons know of? I'm not finding any useful guides (wrong keywords?) but am certain others would have done similar already. I can make use of a generic Linksys router as needed.

Pics related + no_war_driving_possible_while_wifi_not_in_use.jpg


 No.806797>>806802

>>806795

wrap aluminium foil around your router


 No.806802

>>806797

The empty Doritos chip bag is on another assignment already so is unavailable for TEMPEST shielding activities.

No LARP, it looks increasingly like adding an additional circuit to the board rather than simply toggling pins.


 No.806803>>806805 >>806812

>>806795

Many routers actually have a wi-fi toggle button right on the front of the router.


 No.806805>>807465

>>806803

And chrome has "privacy options".


 No.806810>>806948

>>806751

>Why WI-FI have a history of shitty security?

Don't forget about history, the "previous years".

>1997, WEP.

>2004, WPA.

It was still the era of the late 90s and early 2000.

What does it mean? We were still in the midst of the First Crypto War! We didn't have a common 128-bit encryption standard at that time, even publishing source code about cryptography online itself can led to prosecution from the FBI because of the U.S (((cryptography export restriction))), and legally you were only allowed to use 40-bit encryption if the program was available outside U.S.

In 2000s, U.S government was defeated, crypto restriction lifted, AES just became a thing. Wow, people got started to use crypto! Even in 2012, just before the PRISM disclosure, most people, if not all, were still too incompetent about cryptography applications. And what level of security do you expect from 2004, if the people just spent all their time on the war against the feds, and having no previous experience cryptography applications...BTW, This is why Internet Explorer 6 tells you "it uses 128-bit crypto" on the help window, because of legal requirements.

Nearly all the cryptography implementations from that time was a joke, besides those written by Cypherpunks (e.g. SSH, PGP, but still less than ideal). If we start a new wireless security standard from stretch today, things will be much better. WPA is a piece of legacy standard.


 No.806812

>>806803

Thanks, that led me to details about an undocumented switch, though unfortunately wasn't what was needed in this case - though that is very helpful for other routers I'll need to mod.


 No.806948>>807511

>>806810

The gov wasn't defeated, they decided that instead of key escrow they'd just get them directly from businesses who you'd decided to let handle your keys. You know the story of NSLs today and that the people didn't win the encryption war as believed.


 No.807465

>>806805

(((privacy options)))


 No.807511>>807598

>>806948

Yes they were defeated, but only in sense of the First Crypto War. They were not surrendered or conquered ofc, and they decided to go behind the line to do inside jobs instead of direct assaults, and they were very successful, people's incompetent of crypto engineering also helped them alot. After 2013 exposure, as crypto is being adopted rapidly, they came back to the frontline and started The Second Crypto War, a.k.a Crypto War 2.0.


 No.807598

File (hide): dbff0ac0dcfbac5⋯.png (9.16 KB, 746x982, 373:491, born to shitpost.png) (h) (u)

>>807511

>The Second Crypto War

>tfw fighting a proxy war during the Great Meme War, just like good old Finns in WWII




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
75 replies | 14 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / bbbb / bmw / htg / hwndu / loomis / newbrit / strek / ttgg ][ watchlist ]