As you would expect, initial coverage is somewhat sensationalized. The truth is that while the issue is widespread the fixes are very straightforward, which even the researcher acknowledges. Major platform vendors have already deployed patches. Microsoft, for example, has acknowledged that they updated Windows. You should see additional public disclosures on patch status published throughout the day. See https://www.wi-fi.org/security-update-october-2017 and the linked resources there.
Linksys doesn't have a new updates for my older router. Sigh.
Linksys doesn't have a new updates for my older router. Sigh.
It’s not that patches from big name vendors won’t be available. It’s the magnitude of the number of routers out there in consumer land that won’t ever get patched or won’t have them made available.
Huh. AT&T hasn’t pushed a fix for their branded box in my closet yet. Go to manufacturer website and no mention of a fix for this model.
There is a good chance that your residential routers won't need a patch. Of the 10 CVEs related to this vulnerability, only 1 (related to Fast Transition) requires patching on the network side, though some could benefit from patching on both sides. Fast Transition is more commonly found in enterprise equipment that requires a mobile client to move between multiple access points rapidly without dropping packets. Most of the patches for this vulnerability are on the client side. That is why you see companies like Microsoft (who quietly deployed patches last week on patch Tuesday) and individual maintainers in the Linux community moving quickly to update. Apple is still only rumored to have patched (reported in iMore). One reason you might see updates for consumer routers is that some of them offer a client mode, e.g. allowing them to connect with another access point and serve as a range extender. This isn't to say you shouldn't check for router updates, only explain how there are legitimate reasons why you may not see any.
Definitely get those clients patched though.
I disagree:Virtually doesn't mean "almost." It means in appearance, not in fact. You can replace it with "not" or "no" to get a proper read on the sentence.
By the way, want to put $20 on this shining a spotlight on that code in all products and at least two more major problems in the implementation of the WPA2 code are found within a couple of months, including fair warning time to the vendors? LOL.
The “many eyes” BS on most of this code doesn’t work. Nobody is actually reading any of it.
Virtually doesn't mean "almost." It means in appearance, not in fact. You can replace it with "not" or "no" to get a proper read on the sentence.
I remember working on fixing a TCP/IP bug back in the early 2000's. Can't remember which it was. Maybe SYN loopback attack, or RST attack. It escapes me now. But that bug was in every single implementation of TCP/IP since the 1970's. 1000s of people ported it by hand over to 100s of platforms, and nobody ever noticed it. Open source, proprietary source vendors - didn't matter - everybody had that bug.
IIRC - the bug wasn't even in the RFC. People just used reference implementations and everybody copied the same mistake.
I don't think that can happen anymore, proprietary vendors will do everything from spec instead of from code to avoid GPL poison pills. But it was a jungle back then. But if a bug is in a spec, you still have an issue.
Disagree. Several someones are reading the code and finding the bugs. Only, they probably call them exploits, and they probably don't work for people that have your best interests in mind.
Air gap, shut off wifi, bluetooth, step into the cage. Oh, wait, ultrasonic beacons are now a thing. And then there's google somehow magically showing the thing I happen to be having a conversation about as the first item in search results more often than not, even with "ok, google" supposedly disabled.
Well, "no worries" is a little strong. You may have no worries about your firewall being "Kracked" while you are using it at your house, but do you ever use WIFI at the gym, or starbucks, or the FBO or . . . anywhere?Yay, my firewall supplier sent out this message
So I have no worries....right?
Was it smurf?
I forget which one my staff used to use against the Director to get him off the phone. If he wouldn’t end a conference call, they’d just toss the magic packets his way and blue screen his desktop machine, until I caught them doing it.
They fessed up because I pointed out to them that the Director had had three expensive desktop machines and a laptop replaced in less than a year because he kept telling the other help desk the hardware was bad. lol. I knew this from our management meetings.
“Knock it off, kids... you know better now... this is costing us real money and if he figures it out, it won’t go well for you...”
But I quietly laughed my butt off back in my office that afternoon. I knew who figured out how to do it and taught my other staff how, too. He still works in security. Last papers he published were on attacking laptops through USB and FireWire DMA. Nice of those specs to leave direct access to the machine’s RAM open to something plugged into an external port, eh?
LOL. It’s been a while since that mistake was understood. Everyone just wanted their external hard drives and flash drives to go faster... let’s just hook them straight to the RAM... brilliant.
So now it looks like the 5 GHz radio in my wireless system died. Running on the 2.4 GHz radio for now.
Wait to replace? Replace with what? Cheap is always good. This is a home network without VPN in or any of that type of crap.
Edit: current unit is an N600 dlink thing. It was cheap.
Looks like a "not bad" option. I've got dead linksys stuff around here just like all other consumer brands....AC3200 tri-band is probably the sweet spot between price & performance right now. You can get a refurb one for $65:
https://www.linksys.com/us/p/EA9200...e2wcp_c-3lF63HXZgKaWflAJ2ci3BAkMaAu5PEALw_wcB
This is if you like Linksys as a brand. All brands have A3200's.
Blinking lights you say? The aliens are monitoring you. Soak it in water for 24 hours then call Comcast and say it broke.This is all over my head. I got Cable. Comcast/Xfinity. The cable screws in to that box over there on the floor with all the lights that blink some of the time. That's my WiFi. Am I in danger
dlink is saying the same thing. Post 12 in this thread suggests otherwise.Netgear is telling their customers that KRACK is really a client side issue. In other words, a router is only compromised if you're using it as a bridge. Is this true?
dlink is saying the same thing. Post 12 in this thread suggests otherwise.
But back at my house I have Airport Extreme which connects to the cable companies box. Does that mean it's a bridge? Excuse my ignorances.