Difference between revisions of "KRACK Vulnerability"
(→Important Things to Note:) |
(→Should I be worried?) |
||
(23 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
− | + | This page is specifically written to help members to understand the most relevant aspects of '''KRACK''' Wi-Fi attacks. | |
− | =What is KRACK?= | + | ==What is KRACK?== |
− | * | + | * KRACK stands for Key Re-installation Attack and refers to attacks on Wi-Fi networks using weaknesses in the WPA2 protocol which secures most modern protected Wi-Fi networks. |
− | * | + | * KRACK allow attackers to read and access information on Wi-Fi networks that were considered secured. |
− | * | + | * Wi-Fi networks use a password through WPA2 for two general purposes: |
** Controlling who can connect to the network; and | ** Controlling who can connect to the network; and | ||
− | ** Encrypt (or conceal) the data shared over the network between the access point ( | + | ** Encrypt (or conceal) the data shared over the network between the access point (Router) and clients (computers, phones, tablets, etc). Encryption is done by using the Wi-Fi password to generate an even stronger key that is used to encrypt the data between the access point and client. |
− | =Why should I care?= | + | ==Why should I care?== |
− | * WPA2 is widely used and is presently the strongest form of | + | * WPA2 is widely used and is presently the strongest form of Wi-Fi security available to the average person including modems configured by NCF. |
− | * Almost every client device is vulnerable to KRACK whether on | + | * Almost every client device is vulnerable to KRACK whether on Wi-Fi at home or elsewhere. |
− | ** Variations of KRACK can be used against clients of various kinds including devices running Android, Apple | + | ** Variations of KRACK can be used against clients of various kinds including devices running Android, Apple, Windows and Linux OSs. |
− | = | + | ==Should I be worried?== |
− | * '''NCF modems with standard configuration are | + | '''NO'''. Why? |
− | * And,although your modem/router may not be vulnerable, your client devices may be. | + | * '''NCF modems with standard configuration are NOT VULNERABLE to KRACK.''' Nevertheless, NCF will continue the practice of making firmware updates available as they become available from our modem providers. |
+ | ** Modems or routers connected to each other in a wireless chain (using WDS) are potentially at risk unless a firmware patch is applied. | ||
+ | ** Also, other networking devices like Wi-Fi repeaters and extenders which are not connected to your modem by Ethernet may be vulnerable. | ||
+ | * And, although your modem/router may not be vulnerable, your client devices may be. Updating your devices with a security patch that address KRACK will protect each device from this vulnerability. | ||
+ | * Vulnerability vs. Infection: Be vigilant but not anxious. A security vulnerability on a device does not mean that the device is already infected or has a high likelihood of being infected. Follow the recommendations in the sections below to be safe against this vulnerability and keep informed. | ||
+ | * Proximity: An attacker needs to be within Wi-Fi range of your network (close enough to connect to your Wi-Fi). | ||
+ | * Time: This attack works only during periods of connection and re-connection of your client device to a Wi-Fi network. As such, an attacker has a very limited time window in which to attempt this attack (usually a few seconds). | ||
− | + | ==What should I do?== | |
− | + | [[File:HTTPS_ncf.PNG|300px|thumb|right|NCF website showing secure logo]] | |
− | + | # Update the operating system on your phone, computer and other client devices when they receive security updates. Each device you update becomes protected against the KRACK vulnerability. | |
− | + | #* You can [https://char.gd/blog/2017/wifi-has-been-broken-heres-the-companies-that-have-already-fixed-it check if your client devices have received updates] | |
− | =What should I do?= | + | # Do not trust Wi-Fi outside of your home (public Wi-Fi). KRACK is just one of many known security risks associated with using public Wi-Fi. Using a trusted [[Virtual Private Network]] (VPN) service is one way of keeping your data encrypted on public Wi-Fi. |
− | # Update the operating system on your phone, computer and other client devices when they receive security updates. | + | # Connect your devices, where possible, to the router by Ethernet cables, especially those without an available security update. |
− | #* You can | ||
− | # | ||
− | # | ||
# Use HTTPS to connect to secured services and websites. This means information transmitted to such web pages will have end-to-end encryption. Web pages that use HTTPS or another secure connection will include HTTPS in the URL. | # Use HTTPS to connect to secured services and websites. This means information transmitted to such web pages will have end-to-end encryption. Web pages that use HTTPS or another secure connection will include HTTPS in the URL. | ||
− | #* Check on your browser's address bar to ensure the. If your browser shows a little lock in the address bar and says "secure," you should be safe. | + | #* Check on your browser's address bar to ensure the above. If your browser shows a little lock in the address bar and says "secure," you should be safe. |
− | #* | + | #* [https://chrome.google.com/webstore/detail/https-everywhere/gcbommkclmclpchllfjekcdonpmejbdp HTTPS Everywhere for Chrome] |
− | #* | + | #* [https://chrome.google.com/webstore/detail/https-everywhere/gcbommkclmclpchllfjekcdonpmejbdp HTTPS Everywhere for Mozilla Firefox] |
− | # Consider using a VPN service. | + | # Consider using a [[Virtual_Private_Networks|VPN]] service. |
− | = | + | ==External links== |
*[https://www.krackattacks.com/ Krack Attacks Website by Mathy Vanhoef of imec-DistriNet] | *[https://www.krackattacks.com/ Krack Attacks Website by Mathy Vanhoef of imec-DistriNet] | ||
*[https://www.krackattacks.com/#faq Krack Attacks FAQ] | *[https://www.krackattacks.com/#faq Krack Attacks FAQ] | ||
Line 39: | Line 42: | ||
*[https://www.ncf.ca/ncf/dg/dgView.jsp?thread=19659 NCF Discussion Group on KRACK] | *[https://www.ncf.ca/ncf/dg/dgView.jsp?thread=19659 NCF Discussion Group on KRACK] | ||
*[http://www.tp-link.com/en/faq-1970.html TP-Link KRACKs Vulnerability Statement] | *[http://www.tp-link.com/en/faq-1970.html TP-Link KRACKs Vulnerability Statement] | ||
+ | * Good online references for understanding some of the terms used in this article are [https://www.webopedia.com Webopedia] and [https://en.wikipedia.org Wikipedia] | ||
+ | |||
+ | [[Category: DSL]] |
Latest revision as of 19:10, 11 November 2017
This page is specifically written to help members to understand the most relevant aspects of KRACK Wi-Fi attacks.
Contents
What is KRACK?
- KRACK stands for Key Re-installation Attack and refers to attacks on Wi-Fi networks using weaknesses in the WPA2 protocol which secures most modern protected Wi-Fi networks.
- KRACK allow attackers to read and access information on Wi-Fi networks that were considered secured.
- Wi-Fi networks use a password through WPA2 for two general purposes:
- Controlling who can connect to the network; and
- Encrypt (or conceal) the data shared over the network between the access point (Router) and clients (computers, phones, tablets, etc). Encryption is done by using the Wi-Fi password to generate an even stronger key that is used to encrypt the data between the access point and client.
Why should I care?
- WPA2 is widely used and is presently the strongest form of Wi-Fi security available to the average person including modems configured by NCF.
- Almost every client device is vulnerable to KRACK whether on Wi-Fi at home or elsewhere.
- Variations of KRACK can be used against clients of various kinds including devices running Android, Apple, Windows and Linux OSs.
Should I be worried?
NO. Why?
- NCF modems with standard configuration are NOT VULNERABLE to KRACK. Nevertheless, NCF will continue the practice of making firmware updates available as they become available from our modem providers.
- Modems or routers connected to each other in a wireless chain (using WDS) are potentially at risk unless a firmware patch is applied.
- Also, other networking devices like Wi-Fi repeaters and extenders which are not connected to your modem by Ethernet may be vulnerable.
- And, although your modem/router may not be vulnerable, your client devices may be. Updating your devices with a security patch that address KRACK will protect each device from this vulnerability.
- Vulnerability vs. Infection: Be vigilant but not anxious. A security vulnerability on a device does not mean that the device is already infected or has a high likelihood of being infected. Follow the recommendations in the sections below to be safe against this vulnerability and keep informed.
- Proximity: An attacker needs to be within Wi-Fi range of your network (close enough to connect to your Wi-Fi).
- Time: This attack works only during periods of connection and re-connection of your client device to a Wi-Fi network. As such, an attacker has a very limited time window in which to attempt this attack (usually a few seconds).
What should I do?
- Update the operating system on your phone, computer and other client devices when they receive security updates. Each device you update becomes protected against the KRACK vulnerability.
- Do not trust Wi-Fi outside of your home (public Wi-Fi). KRACK is just one of many known security risks associated with using public Wi-Fi. Using a trusted Virtual Private Network (VPN) service is one way of keeping your data encrypted on public Wi-Fi.
- Connect your devices, where possible, to the router by Ethernet cables, especially those without an available security update.
- Use HTTPS to connect to secured services and websites. This means information transmitted to such web pages will have end-to-end encryption. Web pages that use HTTPS or another secure connection will include HTTPS in the URL.
- Check on your browser's address bar to ensure the above. If your browser shows a little lock in the address bar and says "secure," you should be safe.
- HTTPS Everywhere for Chrome
- HTTPS Everywhere for Mozilla Firefox
- Consider using a VPN service.
External links
- Krack Attacks Website by Mathy Vanhoef of imec-DistriNet
- Krack Attacks FAQ
- Microsoft Security TechCenter KRACK Update
- Ars Technica Reports on KRACK
- NCF Discussion Group on KRACK
- TP-Link KRACKs Vulnerability Statement
- Good online references for understanding some of the terms used in this article are Webopedia and Wikipedia