Tsitroulis, Lampoudis, Tsekleves WPA2 vulnerability


A little under a year ago Tsitroulis, Lampoudis, and Tsekleves, published a paper on a possible WPA2 vulnerability. Has anyone heard anymore information regarding it. None of my searches have come up with anything more recent than the initial reports.


Discussion is locked
Reply to: Tsitroulis, Lampoudis, Tsekleves WPA2 vulnerability
PLEASE NOTE: Do not post advertisements, offensive materials, profanity, or personal attacks. Please remember to be considerate of other members. If you are new to the CNET Forums, please read our CNET Forums FAQ. All submitted content is subject to our Terms of Use.
Reporting: Tsitroulis, Lampoudis, Tsekleves WPA2 vulnerability
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
- Collapse -
Clarification Request
It's not a big deal.
- Collapse -

Thanks for the reply Bob. It seem to get a lot of press for about a week, and then it just dropped off the radar.


- Collapse -
It's on some radars.

But as WPA2 was put to cloud cracking it buckled and as the cloud grew I've heard it cracks in minutes now so any other method is, well, interesting the bottom line is that WiFi isn't that secure. It takes a lot of determination and the attacker has to be in range to do the work.

Most of the time you can piss off the attacker by putting the WiFi on a timer so it shuts off when you aren't there as well as changing passwords and SSID every week so they give up and go after something else.

For me this is more newsworthy ->

With that, who needs to crack WiFi?

- Collapse -

Yeah, I noticed all the bundled stuff on the CNET downloads quite some time ago. If I download something from there, which isn't often anymore, I always look for the bundleware and un-click what I don't want.

As far as my wireless networks are concerned, for the devices that don't support WPA2 Enterprise where I have to use WPA2-PSK on that subnet, I use a maximum length value for the key. So, hopefully they'll go in search of an easier target. Wink

Have a good one.

- Collapse -
The thing is, key length doesn't matter.

The cloud crackers obliterated that last year. Still, it does give you a day of safety if they are using that.

The timer on the router or WiFi looks to be the best way to secure a hot spot.

In parting, I find that it's best to let a client think that key length helps. It does for the homebrew cracking but then there's the cloud cracker. Measure your client's tolerance levels for how deep they can go. Don't go too deep or you may sound too much like Dr. Doom.

- Collapse -

Really? Last thing I read from a while back indicated an ability for around 3.84 e11 keys per second. What is it up to now?

- Collapse -

All I know is the cloud is bigger, the code is finely tuned so it's like an arms race. For fun I think the best line is from War Games. " The only winning move is not to play "

That is, you can avoid most of the attempts by turning off WiFi when you can. I really like routers that let you set hours of operation. Why?

Most of these folk want a connection to run Torrents so it can really upset them when the connection is not 24x7.

Now there were folk that thought MAC filtering would work but we know that is too easy to spoof today.
Bob is not Dr. Doom.

- Collapse -

I guess I'm stunned by the mathematical implications. Suppose I have a PSK consisting of a 64 digit hex. This avoids the PMK = PBKDF2(passphrase, ssid, ssidLength, 4096, 256) hashing process and becomes the 256 bit AES key. This provides approximately 1.15e+77 possible keys. The article I referenced earlier indicated the ability to try 3.84e+11 possibilities per second. If we factor in that the current cloud cracking capability increases that ability by a magnitude of 1 trillion(an obvious WAG) or 3.84e+23, it would still take 9.55e+45 years to exhaust the possible key space for a 256 bit key. To exhaust the key space in one day would require the ability to run 1.34e+72 possibilities per second, which is a magnitude increase of e+61 over the referenced ability and e+49 over my WAG. I would think that folks like Schneier, would be shouting it from the rooftops if this were the case. Happy Yet, I can find nothing of the sort. So, I'm obviously missing something.

- Collapse -
Sure. Look at bitcoin miners.

They often reach 1 terahash per second on one box. Folk have created boxes with a gang of video cards to do something similar. All this is on the web so I'll skip duplication and share how I mitigate the risk. Nod to the War Games line.

But you seem to want to believe it can't be done, so what about "/WPA2-E) they can enumerate the whole space in 1 day." which was noted in May 2013? Advancements in computing (custom ASICs, code and GPUs) mean they cover it all in minutes now.

- Collapse -

All I can say is wow! The implications of this is enormous. That effectively means that no encryption currently in use is secure, since the key can now be effectively brute forced.

- Collapse -
Part of why this is, is our governments.

There are laws concerning "too secure" communications and export there of.

Read more about Lavabit's closure over well, not wanting to install taps from a certain government. PGP's author was hounded forever it seems.

--> Most folk will be fine with a WPA2 secured WiFi but to think it's secure, well, we have to think about what our goals are. Here I follow my advice and check the connection log from time to time to see if anything pops out. The usage log helps here and my thought is that no one in the area is war or other driving.

- Collapse -

Yes, I check my authentication server logs fairly frequently as well.

- Collapse -
Pick your battles?

We've pretty dashed that WPA2 is secure enough to stand up to the most determined person that wants on your connection so moving on.

I don't want to sound as if the game is over, but we can pick our battles and win a few. Timed outages of the WiFi is one of the better moves.

CNET Forums