worst-case scenario has unfolded today for Wi-Fi devices.

Introduce yourself to us and other members here, or share your own product reviews, suggestions, and tips and tricks of using QNAP products.
Post Reply
User avatar
Moogle Stiltzkin
Guru
Posts: 11445
Joined: Thu Dec 04, 2008 12:21 am
Location: Around the world....
Contact:

worst-case scenario has unfolded today for Wi-Fi devices.

Post by Moogle Stiltzkin »

Image
A worst-case scenario has unfolded today for Wi-Fi devices. Researchers at a university in Belgium discovered a way to completely defeat the encryption that WPA2 provides on Wi-Fi networks.

This affects all modern Wi-Fi equipment, from mobile phones to tablets to workstations, routers, printers and more. This is a big deal and has very widespread security implications.

Wordfence has released a public service announcement about this issue (a PSA) due to its wide impact. We provide a description of what the problem is and what to do about it, along with additional resources.

You can find full details on the official Wordfence blog...
https://www.wordfence.com/blog/2017/10/krack-and-roca/
other sources
https://www.bleepingcomputer.com/news/s ... erability/

https://www.hardocp.com/news/2017/10/16 ... i_protocol


simple explanation what this is about
[youtube=]LWz2DNUHp0Y[/youtube]

detailed technical explanation
[youtube=]Oh4WURZoR98[/youtube]

What to Do About the WPA2 Vulnerability

This affects every device you own that uses Wi-Fi. If your device uses public Wi-Fi, you are at higher risk. The vendors that make your products are working on patches which they will release in the coming days. As they release the patches, you will need to update your devices and hardware.

The good news is that this vulnerability does not require you to replace any hardware. It is fixable through a software update.

The devices and hardware you will need to update, once patches are released, include the following:

-Desktop workstations
-Laptops/notebooks
-Mobile phones
-Tablets and e-readers that use Wi-Fi
-Home and office routers
-Home devices like NEST, Amazon Echo and Google Home
-Printers, both home and office, that use Wi-Fi
-Any other device that uses Wi-Fi
-You should prioritize devices that use public Wi-Fi higher than your other devices. This puts mobile phones and tablets at the top of the list.
Black Monday

Another vulnerability known as “ROCA” was also announced today. This vulnerability involves an attack on public key encryption which may weaken the way we authenticate software when installing it. It affects many other systems that rely on public/private key encryption and signing. Fixing this also requires you to update your devices using vendor-released software updates, so keep an eye out for security updates for your devices and workstations that fix any ROCA-related issues.

The combination of KRACK and ROCA is why we are referring to today as “Black Monday.” These are both severe vulnerabilities, and they emerged on the same day.

It is imperative that we get the word out about these vulnerabilities so that our friends and colleagues can update their devices before they are exploited. Please spread the word.

https://www.bleepingcomputer.com/news/s ... -affected/
Last edited by Moogle Stiltzkin on Tue Oct 17, 2017 6:21 am, edited 1 time in total.
NAS
[Main Server] QNAP TS-877 (QTS) w. 4tb [ 3x HGST Deskstar NAS & 1x WD RED NAS ] EXT4 Raid5 & 2 x m.2 SATA Samsung 850 Evo raid1 +16gb ddr4 Crucial+ QWA-AC2600 wireless+QXP PCIE
[Backup] QNAP TS-653A (Truenas Core) w. 4x 2TB Samsung F3 (HD203WI) RaidZ1 ZFS + 8gb ddr3 Crucial
[^] QNAP TL-D400S 2x 4TB WD Red Nas (WD40EFRX) 2x 4TB Seagate Ironwolf, Raid5
[^] QNAP TS-509 Pro w. 4x 1TB WD RE3 (WD1002FBYS) EXT4 Raid5
[^] QNAP TS-253D (Truenas Scale)
[Mobile NAS] TBS-453DX w. 2x Crucial MX500 500gb EXT4 raid1

Network
Qotom Pfsense|100mbps FTTH | Win11, Ryzen 5600X Desktop (1x2tb Crucial P50 Plus M.2 SSD, 1x 8tb seagate Ironwolf,1x 4tb HGST Ultrastar 7K4000)


Resources
[Review] Moogle's QNAP experience
[Review] Moogle's TS-877 review
https://www.patreon.com/mooglestiltzkin
User avatar
dolbyman
Guru
Posts: 35273
Joined: Sat Feb 12, 2011 2:11 am
Location: Vancouver BC , Canada

Re: worst-case scenario has unfolded today for Wi-Fi devices.

Post by dolbyman »

WPA2 with PSK was already "defeated" with rainbow tables ... possible although impractical

https://null-byte.wonderhowto.com/how-t ... y-0148423/


The KRACK is only attacking communication for one client to the server, it did not grant access to the credentials
User avatar
Moogle Stiltzkin
Guru
Posts: 11445
Joined: Thu Dec 04, 2008 12:21 am
Location: Around the world....
Contact:

Re: worst-case scenario has unfolded today for Wi-Fi devices.

Post by Moogle Stiltzkin »

Image
Meet ROCA, the Exploit Worse Than KRACK That Puts Millions of High-Security Crypto Keys at Risk
KRACK, the famous WiFi exploit, appears to be taking over your Monday? Wait for an even worse security flaw. A crippling vulnerability has put the security of millions of encryption keys at risk, with some of those being used in national identity cards, software signing, and trusted platform modules protecting government and enterprise computers. In yet another wild Monday, researchers have revealed a fatal weakness in a widely used cryptography code library found in chips made by a German company but used by several tech giants, including Google and Microsoft.

Dubbed as ROCA (Return of Coppersmith’s Attack), the vulnerability has been discovered in the generation of RSA keys used by a software library adopted in cryptographic smartcards, security tokens and other secure hardware chips. The exploit enables a “practical factorization attack, in which the attacker computes the private part of an RSA key,” the researchers wrote. More importantly, the attack works for all commonly used key lengths, including 1024 and 2048 bits, and affects chips manufactured as early as 2012.
While KRACK may have been taking all of the news space, ROCA is an even bigger issue since while KRACK only works for attackers that are within range, ROCA has serious ramifications both in the government and outside. “Imagine a Shadowbrokers-like organization posts just a couple of private keys on the Internet and claims to have used the technique to break many more,” Steel said.

Researchers will share details of ROCA at the ACM CCS conference on November 2.

– Details about mitigation and how to see if you are affected are available in the original research.https://crocs.fi.muni.cz/public/papers/rsa_ccs17
Full article
http://wccftech.com/roca-worse-krack-crypto-keys-risk/
We're told you'll need somewhere in the region of $30,000 in cloud computing power to crack a 2,048-bit RSA key pair generated by the dodgy Infineon hardware. For 1,024-bit keys, which are generally crap anyway, it is trivial to factorize a vulnerable private key.

“The attack is practical, although it’s unlikely to be cost-effective for large-scale attacks,” Dan Cvrcek of Enigma Bridge told El Reg on Monday. “The current indicative processor times for 1,024 and 2,048 bit keys are 97 vCPU days ($40 to $80) and 51,400 vCPU days ($20,000 to $40,000), respectively.

“Worst hit, at the moment, seems to be ... whole-disk encryption, as well as for securing access to some cloud platforms, but it extends to non-repudiation signatures, email signing, access to VPN and buildings, e-Health cards, and e-IDs."

Cvrcek estimated that Infineon's TPMs are "25 to 30 per cent of TPMs used globally." The flawed Infineon chipset has been integrated into motherboards, laptops including Chromebooks, authentication systems, trusted boot mechanisms, and cryptographic tokens sold by computer and device makers worldwide.

Image

Major vendors including HP, Lenovo and Fujitsu have released software updates and mitigation guidelines.
other sources
https://www.theregister.co.uk/2017/10/1 ... eon_chips/
NAS
[Main Server] QNAP TS-877 (QTS) w. 4tb [ 3x HGST Deskstar NAS & 1x WD RED NAS ] EXT4 Raid5 & 2 x m.2 SATA Samsung 850 Evo raid1 +16gb ddr4 Crucial+ QWA-AC2600 wireless+QXP PCIE
[Backup] QNAP TS-653A (Truenas Core) w. 4x 2TB Samsung F3 (HD203WI) RaidZ1 ZFS + 8gb ddr3 Crucial
[^] QNAP TL-D400S 2x 4TB WD Red Nas (WD40EFRX) 2x 4TB Seagate Ironwolf, Raid5
[^] QNAP TS-509 Pro w. 4x 1TB WD RE3 (WD1002FBYS) EXT4 Raid5
[^] QNAP TS-253D (Truenas Scale)
[Mobile NAS] TBS-453DX w. 2x Crucial MX500 500gb EXT4 raid1

Network
Qotom Pfsense|100mbps FTTH | Win11, Ryzen 5600X Desktop (1x2tb Crucial P50 Plus M.2 SSD, 1x 8tb seagate Ironwolf,1x 4tb HGST Ultrastar 7K4000)


Resources
[Review] Moogle's QNAP experience
[Review] Moogle's TS-877 review
https://www.patreon.com/mooglestiltzkin
User avatar
Moogle Stiltzkin
Guru
Posts: 11445
Joined: Thu Dec 04, 2008 12:21 am
Location: Around the world....
Contact:

Re: worst-case scenario has unfolded today for Wi-Fi devices.

Post by Moogle Stiltzkin »

Microsoft Has Already Fixed the “Fatal” WiFi Exploit And So Have Many Others
Remember, Vanhoef’s research was kept a closely guarded secret to give vendors and companies enough time to work on a patch. At the time of speaking, several have already released a patch to fix this damning flaw. While Google and Apple are yet to bring a patch, Microsoft in a statement wrote that it has already released a security update to address the issue.
http://wccftech.com/keep-safe-wifi-wpa2-krack-exploit/
NAS
[Main Server] QNAP TS-877 (QTS) w. 4tb [ 3x HGST Deskstar NAS & 1x WD RED NAS ] EXT4 Raid5 & 2 x m.2 SATA Samsung 850 Evo raid1 +16gb ddr4 Crucial+ QWA-AC2600 wireless+QXP PCIE
[Backup] QNAP TS-653A (Truenas Core) w. 4x 2TB Samsung F3 (HD203WI) RaidZ1 ZFS + 8gb ddr3 Crucial
[^] QNAP TL-D400S 2x 4TB WD Red Nas (WD40EFRX) 2x 4TB Seagate Ironwolf, Raid5
[^] QNAP TS-509 Pro w. 4x 1TB WD RE3 (WD1002FBYS) EXT4 Raid5
[^] QNAP TS-253D (Truenas Scale)
[Mobile NAS] TBS-453DX w. 2x Crucial MX500 500gb EXT4 raid1

Network
Qotom Pfsense|100mbps FTTH | Win11, Ryzen 5600X Desktop (1x2tb Crucial P50 Plus M.2 SSD, 1x 8tb seagate Ironwolf,1x 4tb HGST Ultrastar 7K4000)


Resources
[Review] Moogle's QNAP experience
[Review] Moogle's TS-877 review
https://www.patreon.com/mooglestiltzkin
User avatar
Toxic17
Ask me anything
Posts: 6478
Joined: Tue Jan 25, 2011 11:41 pm
Location: Planet Earth
Contact:

Re: worst-case scenario has unfolded today for Wi-Fi devices.

Post by Toxic17 »

The fix needs to be done on all WiFi devices WAP and endpoints. Problem was this has been a flaw for years and most vendors were notified in august about this.

I cannot see most ISP's pushing out a fix on their WiFi routers as quick, months, or even years before it's fixed.

https://www.krackattacks.com

Thank God for Unifi AP's :)

Sent from my ONEPLUS A3003 using Tapatalk
Regards Simon

Qnap Downloads
MyQNap.Org Repository
Submit a ticket • QNAP Helpdesk
QNAP Tutorials, User Manuals, FAQs, Downloads, Wiki
When you ask a question, please include the following


NAS: TS-673A QuTS hero h5.1.2.2534 • TS-121 4.3.3.2420 • APC Back-UPS ES 700G
Network: VM Hub3: 500/50 • UniFi UDM Pro: 3.2.9 • UniFi Network Controller: 8.0.28
USW-Aggregation: 6.6.61 • US-16-150W: 6.6.61 • 2x USW Mini Flex 2.0.0 • UniFi AC Pro 6.6.62 • UniFi U6-LR 6.6.62
UniFi Protect: 2.11.21/8TB Skyhawk AI • 3x G3 Instants: 4.69.55 • UniFi G3 Flex: 4.69.55 • UniFi G5 Flex: 4.69.55
User avatar
Toxic17
Ask me anything
Posts: 6478
Joined: Tue Jan 25, 2011 11:41 pm
Location: Planet Earth
Contact:

Re: worst-case scenario has unfolded today for Wi-Fi devices.

Post by Toxic17 »

More info on Vendor lists of who has a fix or not...

https://github.com/kristate/krackinfo
Regards Simon

Qnap Downloads
MyQNap.Org Repository
Submit a ticket • QNAP Helpdesk
QNAP Tutorials, User Manuals, FAQs, Downloads, Wiki
When you ask a question, please include the following


NAS: TS-673A QuTS hero h5.1.2.2534 • TS-121 4.3.3.2420 • APC Back-UPS ES 700G
Network: VM Hub3: 500/50 • UniFi UDM Pro: 3.2.9 • UniFi Network Controller: 8.0.28
USW-Aggregation: 6.6.61 • US-16-150W: 6.6.61 • 2x USW Mini Flex 2.0.0 • UniFi AC Pro 6.6.62 • UniFi U6-LR 6.6.62
UniFi Protect: 2.11.21/8TB Skyhawk AI • 3x G3 Instants: 4.69.55 • UniFi G3 Flex: 4.69.55 • UniFi G5 Flex: 4.69.55
Post Reply

Return to “Users' Corner”