[ale] Strong home wireless router?

Solomon Peachy pizza at shaftnet.org
Sun Jun 4 13:35:53 EDT 2023


On Sun, Jun 04, 2023 at 10:34:27AM -0400, DJPfulio--- via Ale wrote:
> A few years ago (perhaps 3?), a flaw in wifi was discovered that had 
> been in the code since the beginning - over 20 yrs.

The original Wifi WEP "security" was abysmally bad, and was considered 
completely broken 20 years ago, with the network keys capable of being 
recovered in less than an hour of passive sniffing.

What was recently (2017) discovered ("KRACK") was a flaw in many 
*implementations* of the WPA/WPA2 key exchange protocol.  Unlike the 
orginal WEP attacks, this one didn't allow for the key data to be 
recovered, and instead relied on forcing one end of the exchange to 
install what effectively amounted to a null key.

Another difference -- the underlying protocol itself was fine, and 
implementations were easily(and rapidly) fixed.  Assuming the vendor 
ever shipped an update, that is.  (Yet another reason why you should be 
using Free Software on your infrastructure & devices!)

> My CMMI training says, that if 1 bug is found, there's an 86% 
> likelihood of another bug existing in the same software.

Pfft.  If you assume anything other than 100% probability of eventually 
finding a flaw, you're a fool.  So you have to design your system to 
asusming it's going to need to be updated.

> If you want strong security, assume the protocols have bugs (known and 
> unknown) and take necessary steps to mitigate those.  1 method is to 
> use a full VPN. IPSec is the most secure VPN today.

Yeah, you have to layer stuff.  FWIW, even with KRACK, if you used 
encrypted network protocols, the worst the attacker could do is DOS you.

> If you just want to protect against the neighbor's kid and don't want 
> to worry about more sophisticated attacks, that's fine, but that 
> wouldn't count as "strong" in any book on security as a description 
> for wifi security.

Again, "strong" is a relative definition.  What's "strong" against a 
neighbor's kid is effectively tissue paper for a state-sponsored agency, 
and what's "strong" for said agency is most likely completely unusable
for a layperson.

> Where I've worked, we never trusted wifi without our corporate VPN, 
> using 2FA, even on systems that we'd provisioned inside our buildings. 
> This was the requirement by our data security team which wasn't 
> exactly small for this F-10 company.

Meanwhile, at most places I've worked, internal corporate communications 
emails were, more often than not, indistinguishable from phishing based 
on the training said corporate policies required us to undergo.  This 
was particularly ironic given that phishing (and related 
social-engineering stuff) remains the primary threat vector for internal 
system compromise.

 - Solomon
-- 
Solomon Peachy			      pizza at shaftnet dot org (email&xmpp)
                                      @pizza:shaftnet dot org   (matrix)
Dowling Park, FL                      speachy (libra.chat)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://mail.ale.org/pipermail/ale/attachments/20230604/2ff024f5/attachment.sig>


More information about the Ale mailing list