Researchers Discover New Dragonblood Vulnerability In Wi-Fi WPA3 Standard

Introduce yourself to us and other members here, or share your own product reviews, suggestions, and tips and tricks of using QNAP products.
Post Reply
User avatar
Moogle Stiltzkin
Guru
Posts: 11445
Joined: Thu Dec 04, 2008 12:21 am
Location: Around the world....
Contact:

Researchers Discover New Dragonblood Vulnerability In Wi-Fi WPA3 Standard

Post by Moogle Stiltzkin »

Researchers have discovered new vulnerabilities that affect the Wi-Fi WPA3 standard. Referred to collectively as Dragonblood, the vulnerabilities allow attackers to steal network password and infiltrate the target’s network.

Specifically, Dragonblood comprises a total of five vulnerabilities. These vulnerabilities consist of a denial of service attack, two downgrade attacks, and two side-channel information leaks. The denial of service attack is not really significant, it only crashes the WPA3 compatible access point. The remaining four, on the other hand, are the ones that the Wi-Fi Alliance is warning people about.

In a downgrade attack, the Wi-FI WPA3 standard is forced into using an older password exchange system. The older system (WPA2) is more insecure and has a handful of vulnerabilities for attackers to exploit.

Additionally, the side channel leak attacks trick the devices into using a weaker algorithm to leak fragments of information about the network password. Eventually, the attackers will collect enough information to piece it together and recover the entire password for the network.

Fortunately, the Wi-Fi Alliance swiftly responded to the issue; it says that it will be releasing a security patch for the WPA3 standard. After which, it will be up to vendors to send out the security patch via firmware updates to their Wi-Fi products.
https://www.xda-developers.com/dragonbl ... i-fi-wpa3/

:(
NAS
[Main Server] QNAP TS-877 (QTS) w. 4tb [ 3x HGST Deskstar NAS & 1x WD RED NAS ] EXT4 Raid5 & 2 x m.2 SATA Samsung 850 Evo raid1 +16gb ddr4 Crucial+ QWA-AC2600 wireless+QXP PCIE
[Backup] QNAP TS-653A (Truenas Core) w. 4x 2TB Samsung F3 (HD203WI) RaidZ1 ZFS + 8gb ddr3 Crucial
[^] QNAP TL-D400S 2x 4TB WD Red Nas (WD40EFRX) 2x 4TB Seagate Ironwolf, Raid5
[^] QNAP TS-509 Pro w. 4x 1TB WD RE3 (WD1002FBYS) EXT4 Raid5
[^] QNAP TS-253D (Truenas Scale)
[Mobile NAS] TBS-453DX w. 2x Crucial MX500 500gb EXT4 raid1

Network
Qotom Pfsense|100mbps FTTH | Win11, Ryzen 5600X Desktop (1x2tb Crucial P50 Plus M.2 SSD, 1x 8tb seagate Ironwolf,1x 4tb HGST Ultrastar 7K4000)


Resources
[Review] Moogle's QNAP experience
[Review] Moogle's TS-877 review
https://www.patreon.com/mooglestiltzkin
mdhwoods
Know my way around
Posts: 188
Joined: Wed Mar 29, 2017 8:30 pm

Re: Researchers Discover New Dragonblood Vulnerability In Wi-Fi WPA3 Standard

Post by mdhwoods »

Ya i was reading about this last week. if you build it, someone will break it.
User avatar
Moogle Stiltzkin
Guru
Posts: 11445
Joined: Thu Dec 04, 2008 12:21 am
Location: Around the world....
Contact:

Re: Researchers Discover New Dragonblood Vulnerability In Wi-Fi WPA3 Standard

Post by Moogle Stiltzkin »

mdhwoods wrote: Mon Apr 15, 2019 9:17 pm Ya i was reading about this last week. if you build it, someone will break it.
actually i found a better article here
Next-gen standard was supposed to make password cracking a thing of the past. It won't.
“In light of our presented attacks, we believe that WPA3 does not meet the standards of a modern security protocol,” authors Mathy Vanhoef of New York University, Abu Dhabi, and Eyal Ronen of Tel Aviv University and KU Leuven wrote. “Moreover, we believe that our attacks could have been avoided if the Wi-Fi Alliance created the WPA3 certification in a more open manner.”

Had the alliance heeded a recommendation made early in the process to move away from so-called hash-to-group and hash-to-curve password encoding, most of the Dragonblood proof-of-concept exploits wouldn't have worked, the researchers went on to say. Now that the Dragonfly is finished, the only option is to mitigate the damage using countermeasures that at best will be "non-trivial" to carry out and may be impossible on resource-constrained devices.
https://arstechnica.com/information-tec ... passwords/


i agree with merlin's statement :(
The expert critics are pretty loud however about the fact that the Wifi Alliance were warned early during the design phase about some of their initial choices, but they decided to keep going on doing their own thing and ignore outside advice (or so those experts say).

Bottom line hasn't changed: if it doesn't move, wire it. If it moves and it's security-sensitive, wire it anyway.

recommended solution from the article
People should ensure that any WPA3 devices they may be using are running the latest firmware. They should also ensure they are using unique, randomly generated passwords that are at least 13 characters long. Password managers or the use of dice words are two useful ways to ensure password requirements are being met. Security experts have long recommended both these practices. They only become more important now.
:)
NAS
[Main Server] QNAP TS-877 (QTS) w. 4tb [ 3x HGST Deskstar NAS & 1x WD RED NAS ] EXT4 Raid5 & 2 x m.2 SATA Samsung 850 Evo raid1 +16gb ddr4 Crucial+ QWA-AC2600 wireless+QXP PCIE
[Backup] QNAP TS-653A (Truenas Core) w. 4x 2TB Samsung F3 (HD203WI) RaidZ1 ZFS + 8gb ddr3 Crucial
[^] QNAP TL-D400S 2x 4TB WD Red Nas (WD40EFRX) 2x 4TB Seagate Ironwolf, Raid5
[^] QNAP TS-509 Pro w. 4x 1TB WD RE3 (WD1002FBYS) EXT4 Raid5
[^] QNAP TS-253D (Truenas Scale)
[Mobile NAS] TBS-453DX w. 2x Crucial MX500 500gb EXT4 raid1

Network
Qotom Pfsense|100mbps FTTH | Win11, Ryzen 5600X Desktop (1x2tb Crucial P50 Plus M.2 SSD, 1x 8tb seagate Ironwolf,1x 4tb HGST Ultrastar 7K4000)


Resources
[Review] Moogle's QNAP experience
[Review] Moogle's TS-877 review
https://www.patreon.com/mooglestiltzkin
User avatar
gibxxi
Know my way around
Posts: 194
Joined: Mon Mar 30, 2015 11:15 pm
Contact:

Re: Researchers Discover New Dragonblood Vulnerability In Wi-Fi WPA3 Standard

Post by gibxxi »

Steve Gibson (The guy who made SpinRite) talked about this in his "Security Now" Podcast (with Leo Laporte). He said pretty much the same thing. Essentially, since the WiFi Alliance decided to be all clandestine in the development of The WPA3 standard, they shot themselves in the foot, as it's resilience wasn't then able to be tested prior to release / adoption by OEMs. Supposedly, there are already WPA3 devices in the field that are affected by this. It was however concluded by the researchers who highlighted the vulnerability, that while not secure (per-se), it was still an improvement over WPA2.

Podcast Episode (TWiT): https://twit.tv/shows/security-now/epis ... tart=false
"Si vis pacem para bellum!"
NAS1: QNAP TS453-Pro (8GB, 4x4TB WD-Red Plus), NAS2: QNAP TS453-Mini (8GB, 4x2TB WD-Red).
User avatar
Moogle Stiltzkin
Guru
Posts: 11445
Joined: Thu Dec 04, 2008 12:21 am
Location: Around the world....
Contact:

Re: Researchers Discover New Dragonblood Vulnerability In Wi-Fi WPA3 Standard

Post by Moogle Stiltzkin »

gibxxi wrote: Sat Apr 27, 2019 6:41 am ..

oo i missed it. i'll take a look at it, ty for the tip :)
NAS
[Main Server] QNAP TS-877 (QTS) w. 4tb [ 3x HGST Deskstar NAS & 1x WD RED NAS ] EXT4 Raid5 & 2 x m.2 SATA Samsung 850 Evo raid1 +16gb ddr4 Crucial+ QWA-AC2600 wireless+QXP PCIE
[Backup] QNAP TS-653A (Truenas Core) w. 4x 2TB Samsung F3 (HD203WI) RaidZ1 ZFS + 8gb ddr3 Crucial
[^] QNAP TL-D400S 2x 4TB WD Red Nas (WD40EFRX) 2x 4TB Seagate Ironwolf, Raid5
[^] QNAP TS-509 Pro w. 4x 1TB WD RE3 (WD1002FBYS) EXT4 Raid5
[^] QNAP TS-253D (Truenas Scale)
[Mobile NAS] TBS-453DX w. 2x Crucial MX500 500gb EXT4 raid1

Network
Qotom Pfsense|100mbps FTTH | Win11, Ryzen 5600X Desktop (1x2tb Crucial P50 Plus M.2 SSD, 1x 8tb seagate Ironwolf,1x 4tb HGST Ultrastar 7K4000)


Resources
[Review] Moogle's QNAP experience
[Review] Moogle's TS-877 review
https://www.patreon.com/mooglestiltzkin
Post Reply

Return to “Users' Corner”