There’s a lot of buzz this weekend about a flaw that’s purported to break security on most Wi-Fi connections, allowing an eavesdropper to snoop or use
[See the full post at: Is Wi-Fi security irretrievably broken?]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Is Wi-Fi security irretrievably broken?
Home » Forums » Newsletter and Homepage topics » Is Wi-Fi security irretrievably broken?
- This topic has 17 replies, 8 voices, and was last updated 7 years, 6 months ago.
AuthorTopicViewing 7 reply threadsAuthorReplies-
anonymous
Guest -
Kirsty
ManagerOctober 15, 2017 at 9:57 pm #137930One of many such articles on “KRACK” say this:
On social media right now, strong rumours are spreading that the WPA2 encryption scheme has been broken in a fundamental way. What this means: the security built into WiFi is likely ineffective, and we should not assume it provides any security.
…
Keep Calm
Remember, there is a limited amount of physical security already on offer by WiFi: an attack needs to be in proximity. So, youโre not suddenly vulnerable to everyone on the internet. Itโs very weak protection, but this is important when reviewing your threat level.
…
Story for friends / family
This is where it gets really sucky. Lots of us have old routers at home, which have no chance of a firmware upgrade, and lots of WiFi equipment that may well not get a protocol upgrade if one is required. Right now, it sounds like all this stuff is going to be worthless from the perspective of encryption.Reiterate the same points as above:
– secure websites are still secure, even over WiFi;
– think about setting your computers to โPublic Networkโ mode โ that increases the level of security on the device relative to โPrivate / Home Networkโ modes. Remember, if third parties can get onto our home networks, theyโre no longer any safer than an internet cafe;
– if youโre paranoid about your mobile, turn off WiFi and use mobile data when necessary;
– it sounds like no similar attack against ethernet-over-mains power line is possible, so home networks based on mains plugs are problem still ok;
– keep computers and devices patched and up-to-date.
(And we know how much patch OS at the moment isn’t exactly a walk in the park…)The article can be found here:
WPA2: Broken with KRACK. What now?
from Alex Hudson -
NetDef
AskWoody_MVPOctober 15, 2017 at 10:23 pm #137937Couple of early thoughts, without knowing the specifics of the attack vector.
Internal LAN communication can likely be compromised – for secure environments updating will be required.ย that will include Wi-Fi access points as well as likely all devices: mobile phones, tablets, laptops, wi-fi connected systems.ย Hopefully driver updates can solve this, but I could see where updated firmware might be required in some cases.ย It’s going to be messy.
– Legacy systems with limited or no support will have to be replaced.
– A bunch of Android devices that are not being actively updated (some as little as a year old) will have to be replaced.
– Older Wi-Fi access points – you guessed it – will have to be replaced.
– IoT devices – can we just toss them into the hazmat dump outright?ย (bleah!)
WPA2 has been with us since 2004.ย It’s overdue for a complete overhaul.ย Actually a bit surprised we don’t already have WPA3 or it’s equivalent.
We should have seen this coming and had a new standard to switch over to already.
~ Group "Weekend" ~
-
NetDef
AskWoody_MVPOctober 15, 2017 at 11:53 pm #137951Dan G at ArsTechnica just posted some info from a privately released US-Cert update.
“US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.
If that’s what I think it is, then firmware updates are going to be required to fix this across most devices.
Also of interest:ย One of the AP vendors I buy from (a lot) may have a patch ready to release already.ย I just got a notice from them that a firmware update on a new minor version sequence is going to be available in the next 24 hours.ย Their notes only speak in general terms about a few bug fixes and a security release. Coincidence?
One may hope that all the enterprise grade hardware companies are already on top of this.ย (I like hope.)
~ Group "Weekend" ~
-
anonymous
Guest-
Ascaris
AskWoody MVPOctober 16, 2017 at 5:34 am #138046maybe microsoft has a fresh kb waiting in the wings to make it all better, ha ha!
Whether it needs to be patched in the OS, in the wireless driver, or if it can only be handled in the access point itself remains to be seen, is the big question I’d love to see answered.ย The problem is in the wifi specification itself, apparently, so it seems that any short-term solution would be to creatively break compliance with the spec in a way that defeats the exploit but not desired functionality.
Since I use DD-WRT on my router, I’ve already checked the DD-WRT site for word on this, but other than a single thread from people not part of the dev team, there has been no word yet.
Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11)
MrBrian
AskWoody_MVP-
Kirsty
ManagerOctober 16, 2017 at 12:02 am #137956From April 2014, Michael Horowitz wrote about the WPS issues on Computerworld:
The Woops of WPS (Wi-Fi Protected Setup) raises its ugly head again
AJNorth
AskWoody PlusOctober 16, 2017 at 12:16 am #137975In addition, thereโs another router โfeatureโ that some may have overlooked: Is UPnP a Security Risk?.
-
NetDef
AskWoody_MVPOctober 16, 2017 at 12:12 am #137972Yep, we turn that off on all new routers too.ย But . . .ย on a home network one needs to weigh the risk versus the need.ย If a home user does not have the skills needed to get certain applications working, uPnP is a great feature.ย And do they need to be that secure?ย (I sound like a money manager talking about investments now: what’s your risk aversion profile?)
~ Group "Weekend" ~
-
Kirsty
Manager
-
Kirsty
ManagerOctober 20, 2017 at 6:46 pm #139326From grc.com (information displayed after accessing the Instant UpnP Exposure Test, from https://www.grc.com/x/ne.dll?rh1dkyd2)
About UPnP and what this means
Here’s what you need to know about Universal Plug n’ Play (UPnP):UPnP has been provided and enabled by default in consumer Internet routers since 2002 or 2003.
Today, any home appliance โ TV’s, DVD players, game consoles, IP cameras, printers, fax machines, and you-name-it, includes support for UPnP.
UPnP is a โzero-authenticationโ (no passwords required) system for allowing networked devices to discover and easily connect with each other on a private local network.
Additionally, software such as Skype and BitTorrent, and gaming consoles, which wish to be โseenโ on the Internet, are able to use UPnP to open โholesโ through the protection normally provided by routers in order to allow โunsolicitedโ traffic to enter.
THE HUGE MISTAKE IS: No part of UPnP was EVER MEANT to be exposed to the EXTERNAL public Internet. It was only ever meant for private local control of devices and routers. Its exposure gives malicious hackers direct access to the inside of any exposed private network. It was a huge mistake for it ever to be exposed. Router manufacturers are at fault, but all they can do now is offer updated router firmware. Now that the mistake has been made, responsibility rests upon router owners to somehow eliminate that exposure.Further information is available here (if somewhat dated).
1 user thanked author for this post.
_Reassigned Account
AskWoody LoungerOctober 16, 2017 at 4:46 am #138037Ascaris
AskWoody MVPOctober 16, 2017 at 6:00 am #138054โ secure websites are still secure, even over WiFi;
Important point right there.ย Any HTTPS connections will remain secure (to the degree that it is itself secure) despite the exploit. ย Even over a wired connection to the router, I still would not allow any sensitive data to be sent over an unencrypted connection.ย In terms of the web, more sites than ever (including this one) are using HTTPS for everything, which provides a second line of defense if the wifi is compromised
As for people with older routers… they may find that one of the aftermarket firmwares available will work on their device.ย I use a Netgear WNDR3700, the first hardware version from 2009, and it is still supported by DD-WRT and OpenWRT.ย The last factory firmware was from 2010, if I recall, but DD-WRT (which I use) is still updated about once a month.ย Not all builds are good ones; the firmware is built for hundreds of different routers, and it’s not possible for DD-WRT to test it on each of them (I am not sure, but the entire thing may be the work of one person).ย A build that works brilliantly on some routers is a nightmare on others, so this is not something I would want to suggest to someone who was not accustomed to computers, as it is not out of the question that the router may end up “bricked.”ย Even so,ย if the router is going to be scrapped anyway if this doesn’t work (because it is insecure), it may be worth a shot even knowing the risk.ย Actually flashing the new firmware is dead simple; it’s the “fix it” work in case of a mishap that gets a little hairy.
For those who are familiar with computers and networking, nearly any mishap can be reversed relatively easily, on my router at least.ย Debricking is as simple as enabling the router’s recovery mode by holding the reset button down for a specified time and sending a new firmware via TFTP, which is something that you can find the exact syntax for easily with a web search.
Using the factory firmware, I have not been able to get even close to the throughput via wifi that I get with DD-WRT, and there’s much more you can do with DD-WRT compared to stock, so there’s more to recommend it than security updates alone.ย I wouldn’t want to go back even if Netgear did release a new firmware for this router.
EDIT: There is not, as I type this, any word of a coming fix for this wifi security issue in DD-WRT.ย I would assume it’s coming, but no info is yet available.
Dell XPS 13/9310, i5-1135G7/16GB, KDE Neon 6.2
XPG Xenia 15, i7-9750H/32GB & GTX1660ti, Kubuntu 24.04
Acer Swift Go 14, i5-1335U/16GB, Kubuntu 24.04 (and Win 11)AJNorth
AskWoody PlusOctober 16, 2017 at 4:52 pm #138230Brian Krebs published an article about fifty minutes ago:ย What You Should Know About the ‘KRACK’ WiFi Security Weakness.
1 user thanked author for this post.
-
NetDef
AskWoody_MVP
Viewing 7 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Sometimes I wonder about these bots
by
Susan Bradley
2 hours, 10 minutes ago -
Does windows update component store “self heal”?
by
Mike Cross
4 hours, 8 minutes ago -
Windows 11 Insider Preview build 27858 released to Canary
by
joep517
5 hours, 8 minutes ago -
Pwn2Own Berlin 2025: Day One Results
by
Alex5723
4 hours, 34 minutes ago -
Windows 10 might repeatedly display the BitLocker recovery screen at startup
by
Susan Bradley
1 hour, 3 minutes ago -
Windows 11 Insider Preview Build 22631.5409 (23H2) released to Release Preview
by
joep517
7 hours, 50 minutes ago -
Windows 10 Build 19045.5912 (22H2) to Release Preview Channel
by
joep517
7 hours, 52 minutes ago -
Kevin Beaumont on Microsoft Recall
by
Susan Bradley
1 hour, 44 minutes ago -
The Surface Laptop Studio 2 is no longer being manufactured
by
Alex5723
15 hours, 59 minutes ago -
0Patch, where to begin
by
cassel23
10 hours, 1 minute ago -
CFPB Quietly Kills Rule to Shield Americans From Data Brokers
by
Alex5723
1 day, 5 hours ago -
89 million Steam account details just got leaked,
by
Alex5723
17 hours, 22 minutes ago -
KB5058405: Linux – Windows dual boot SBAT bug, resolved with May 2025 update
by
Alex5723
1 day, 14 hours ago -
A Validation (were one needed) of Prudent Patching
by
Nibbled To Death By Ducks
1 day, 5 hours ago -
Master Patch Listing for May 13, 2025
by
Susan Bradley
16 hours, 16 minutes ago -
Installer program can’t read my registry
by
Peobody
11 hours, 14 minutes ago -
How to keep Outlook (new) in off position for Windows 11
by
EspressoWillie
1 day, 2 hours ago -
Intel : CVE-2024-45332, CVE-2024-43420, CVE-2025-20623
by
Alex5723
1 day, 10 hours ago -
False error message from eMClient
by
WSSebastian42
2 days, 1 hour ago -
Awoke to a rebooted Mac (crashed?)
by
rebop2020
2 days, 10 hours ago -
Office 2021 Perpetual for Mac
by
rebop2020
2 days, 11 hours ago -
AutoSave is for Microsoft, not for you
by
Will Fastie
1 day, 8 hours ago -
Difface : Reconstruction of 3D Human Facial Images from DNA Sequence
by
Alex5723
2 days, 15 hours ago -
Seven things we learned from WhatsApp vs. NSO Group spyware lawsuit
by
Alex5723
1 day, 16 hours ago -
Outdated Laptop
by
jdamkeene
2 days, 20 hours ago -
Updating Keepass2Android
by
CBFPD-Chief115
3 days, 1 hour ago -
Another big Microsoft layoff
by
Charlie
3 days, 1 hour ago -
PowerShell to detect NPU – Testers Needed
by
RetiredGeek
3 hours, 45 minutes ago -
May 2025 updates are out
by
Susan Bradley
5 hours, 27 minutes ago -
Windows 11 Insider Preview build 26200.5600 released to DEV
by
joep517
3 days, 7 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.