Cable Forum

Cable Forum (https://www.cableforum.uk/board/index.php)
-   Virgin Media Internet Service (https://www.cableforum.uk/board/forumdisplay.php?f=12)
-   -   Superhub : KRACK security hole in WPA2 - VM fixes incoming? (https://www.cableforum.uk/board/showthread.php?t=33705527)

AndyCalling 16-10-2017 22:12

KRACK security hole in WPA2 - VM fixes incoming?
 
Keeping in mind today's big story:

https://www.windowscentral.com/krack

https://www.windowscentral.com/vendo...-vulnerability

Any news about the Superhubs? I have a Superhub 2, does anyone know:

1) What's the Netgear model number, so we can get some idea of our exposure?

2) If VM are going to address this for all current cable router models on their network?

Essentially, until this is resolved we have no wifi. Not great. Especially as VM have control of this and are about to crack open a nice fee increase for themselves. Hoping VM will see an opportunity here to pay us back for our generosity in giving them a bonus whilst our salaries are whittled away with below inflation rate pay offers. :angel:

Ignitionnet 16-10-2017 23:25

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
Netgear were made aware of the issue 50 days ago.

The CGN-series I can't see any announcements for. Up to VM to deal with its customers on this one.

AndyCalling 17-10-2017 00:30

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
Quote:

Originally Posted by Ignitionnet (Post 35920400)
Netgear were made aware of the issue 50 days ago.

The CGN-series I can't see any announcements for. Up to VM to deal with its customers on this one.

Problem is, calling the support or fault line is not going to help. They will not have anything to say if VM have made no announcements and will likely not be in a position to call up the Virgin WPA2-collapse Rapid Response Team :rolleyes:. Anyone here able to send up a flare to VM? We at least need to know which generation routers are going to be updated so we can call up and get a replacement if necessary so we can switch the wifi back on one day.

Ignitionnet 17-10-2017 08:33

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
It's intensely paranoid to switch the wireless off. It's quite unlikely that someone with the necessary software and time is sitting outside your home right now trying to decrypt your WiFi traffic.

http://www.theregister.co.uk/2017/10...acken_patches/

Last I heard patches will be across the board. Clients can also be patched. If either of them are patched the attacks no longer work.

Either way as the article says if you've some shady hoodie outside your home tapping away on a laptop you likely have bigger things to be concerned by than your wireless traffic being eavesdropped on.

Ignitionnet 17-10-2017 10:59

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
Quote:

Originally Posted by AndyCalling (Post 35920408)
Problem is, calling the support or fault line is not going to help. They will not have anything to say if VM have made no announcements and will likely not be in a position to call up the Virgin WPA2-collapse Rapid Response Team :rolleyes:. Anyone here able to send up a flare to VM? We at least need to know which generation routers are going to be updated so we can call up and get a replacement if necessary so we can switch the wifi back on one day.

Just thinking about this some more.

I appreciate what the link you provided indicates however you should be aware that there is no public exploit code as yet and this is not something that we're going to see people 'war dialing' to exploit. It is a targeted attack from someone physically close, it's not exploitable over the Internet.

Keep it in context. I am quite sure you have some far more major security issues with the software, etc, you use. If you are concerned do upgrade all devices you can - the patch for clients ensures they don't allow the attacks to work.

If I or anyone else remotely educated really wanted to get at your Internet traffic there's not a whole lot you can do about it, this flaw being fixed or not, other than not use WiFi ever and use end to end encryption on everything. You weren't paranoid to the point where you disabled WiFi before this, don't be now.

It's the classic case of 'How many enemies do you actually have?!'. Unless a nation state or a major company with few morals has a reason to be interested in you, in which case to do this they'd need your home address anyway and there were all kinds of ways they could've compromised you, you're probably fine.

Keep calm and WiFi on.

pip08456 17-10-2017 12:11

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
Ingi's right, even if someone was remotely interested in you and wished to carry out this sort of attack there's no easy way.

First they would have to be experienced enough with Linux for carrying out penetration attacks.

Second the would have to source the software/script to perform the attack.

Third they would have to be close enough to your WiFi to pick up a strong enough signal.

Finally, let's say they've met all those requirements. If you use HTTPS, TLS, SSL (I think) or a VPN, all they would end up with is a load of encrypted material which would take that long to decrypt it would be virtually useless by the time they succeeded and were drawing their pensions.

Reports like this are not really intended for residential internet users but are intended to alert IT professionals that the vulnerability exists so that they can push out the necessary patch throughout the company they work for which is the most likely place this exploit would be of use.

Microsoft pushed out a patch on the 10th in one of it's regular update cycles, I believe it has also been pushed out to Android devices and most (if not all) router producers before it was made public.

Unfortunately clickbait sites and MSM as always blow it out of all proportion.

Qtx 17-10-2017 15:35

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
Quote:

Originally Posted by Ignitionnet (Post 35920433)
It's the classic case of 'How many enemies do you actually have?!'. Unless a nation state or a major company with few morals has a reason to be interested in you

Probably more of an issue for a casual user is if they live in flats and have a neighbour who likes to dabble with these things.

This flaw allows someone who couldn't crack your wifi password to listen in on the traffic anyway. Luckily most sites that allow you to login are https by default now so the traffic logged would be encrypted anyway. Cableforum doesn't do this so in the logged traffic your username and password for here would be easily visible.

I would expect an android exploit could come out sooner from individuals trying to exploit this as it's much easier to code due to almost a blank encryption key that can be forced.

VPN's encrypt the traffic so nice and safe, until you have to start wondering on what machine the RSA keys were made because of another recent problem found in hardware which is probably more of an issue than this WIFI problem. https://www.bleepingcomputer.com/new...dors-affected/

Ignitionnet 17-10-2017 18:04

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
Quote:

Originally Posted by Qtx (Post 35920482)
VPN's encrypt the traffic so nice and safe, until you have to start wondering on what machine the RSA keys were made because of another recent problem found in hardware which is probably more of an issue than this WIFI problem. https://www.bleepingcomputer.com/new...dors-affected/

If a public VPN nice and safe until it reaches them, they can then do as they please with the data. TL;DR don't use public VPNs unless you have a really good reason.

The Infineon TPM issue is far more serious but involves horrid to understand things like large prime numbers with structures that permit factorisation far more quickly than would be possible with a general number field sieve. Doesn't quite have the same punch as KRACK. ;)

rtho782 18-10-2017 11:54

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
KRACK's main implication is for client devices not the AP.

You need updates for all your wifi enabled toothbrushes or fridges, not your VM superhub.

Good luck with that!!

Kushan 19-10-2017 16:42

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
Quote:

Originally Posted by rtho782 (Post 35920635)
KRACK's main implication is for client devices not the AP.

You need updates for all your wifi enabled toothbrushes or fridges, not your VM superhub.

Good luck with that!!

Came here to say this, clients need updating as much as routers do.

Dude111 21-10-2017 07:27

Quote:

Originally Posted by Ignitionnet
It's intensely paranoid to switch the wireless off.

I turn mine off after everytime I use it.. It is not good to be exposed to RF for no reason...

I unplug the modem when Im done.......

Skie 21-10-2017 16:52

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
Quote:

Originally Posted by Dude111 (Post 35921141)
I turn mine off after everytime I use it.. It is not good to be exposed to RF for no reason...

You got lead lined walls to keep out all the other sources of RF?
:dozey:

Synthetic 21-10-2017 18:32

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
Quote:

Originally Posted by Dude111 (Post 35921141)
I turn mine off after everytime I use it.. It is not good to be exposed to RF for no reason...

I unplug the modem when Im done.......

Yeah me too, I also turn off my electricity at the breaker box at night, just because :)*

*Not really!

Springy 21-10-2017 21:01

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
If your router is being use a just a router then the router does not need updating.

If the router is being used as a repeater then you have a problem as this is acting as a client and is affected by the 3rd hand shake with the resetting of the nonce.

Don't believe superhub can be used as a repeater itself so it should be safe.

The issue is with the client devices, and Android 6 has a really bad flaw with the key resetting and that needs to be patched.

But yeah, to do this you need to have a man in the middle device acting like the wifi device and dropping the 3rd hand shake. It isn't something I would thought would be overly used as just sitting outside a open wifi network achieves the same thing and does not require all this messing around.

Kushan 23-10-2017 22:58

Re: KRACK security hole in WPA2 - VM fixes incoming?
 
Quote:

Originally Posted by Dude111 (Post 35921141)
It is not good to be exposed to RF


[citation needed]


All times are GMT +1. The time now is 18:24.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.