General > Security & Bug Fixes
WPA2 Wi-Fi Vulnerability KRACK
Mohd Sohail:
--- Quote from: trinidad on October 16, 2017, 05:40:39 PM ---There is a lot one can do to prevent this with TLS layering but normal users will have to wait a while. It's certainly going to foul up some big ISPs for a while. Look for your little green lock.
https://www.kaspersky.com/blog/krackattack/19798/
And this is pathetically predictable. Look at active managemnet subset.
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00101&languageid=en-fr
TC
--- End quote ---
It's always good to note the green lock in the URL bar to confirm the data is transmitted securely. Though not every website has the green lock + the browser can be forced to use an HTTP version of a website. So then this tip won't work. But again we've to follow these tips and also use a good VPN to add an extra layer of security.
I hope the manufacturers will soon provide fixes against KRACK. Till then be a little careful.
Jerry:
As has been mentioned, this has been patched already. Run Install Updates now.
After Install Updates, open a terminal:
--- Code: ---apt policy wpasupplicant
--- End code ---
should return:
--- Code: --- Installed: 2.4-0ubuntu6.2
Candidate: 2.4-0ubuntu6.2
--- End code ---
If you have 'hostapd' installed too, do:
--- Code: ---apt policy hostapd
--- End code ---
should return:
--- Code: --- Installed: 1:2.4-0ubuntu6.2
Candidate: 1:2.4-0ubuntu6.2
--- End code ---
we do not supply hostapd in Linux Lite. You would of had to have installed this yourself at some point.
Now we just have to wait for our:
Mobile phones
Tablets and e-readers that use Wi-Fi
Home and office routers
Home devices like NEST, Amazon Echo and Google Home
Printers, both home and office, that use Wi-Fi
Any other device that uses Wi-Fi
manufacturers to release patches too. :)
If you are 'super tinfoil' about this, use a 3G/4G connection until your device manufacturer has patched your other device/s and watch your browser address bar, make sure there is https where it should be!
rokytnji:
--- Quote ---But because Vanhoef hasn't released any proof-of-concept exploit code, there's little risk of immediate or widespread attacks.
--- End quote ---
There is no confirmation of this existing in the wild. This crack was done by a white hat under controlled conditions. Got any black war driving vans parked in front of your place?
Living on the Mexican border. I don't even sweat this. But then. My wireless router password was changed from the default "admin" ages ago.
You are not Target store, TJ maxx, or a Experian. The ones this hack will probably be aimed at. I try and understand a vulnerability from a attacker.
Physical or cloud based. Before I react in fear.
https://github.com/kristate/krackinfo
Usually. When the Linux world becomes a aware of a threat. You hear next real soon about what should be done.
If you read my gethub link above. Debian and Ubuntu already have patches for this.
bonnevie:
Correct me if I'm wrong, but it looks like there is something related to wpa in the updates today
--- Code: ---archive.ubuntu.com/ubuntu xenial-security/main i386 wpasupplicant i386 2.4-0ubuntu6.2 [987 kB]
--- End code ---
trinidad:
There is a lot one can do to prevent this with TLS layering but normal users will have to wait a while. It's certainly going to foul up some big ISPs for a while. Look for your little green lock.
https://www.kaspersky.com/blog/krackattack/19798/
And this is pathetically predictable. Look at active managemnet subset.
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00101&languageid=en-fr
TC
Navigation
[0] Message Index
[#] Next page
Go to full version