Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Networking Security Wireless Networking

New WiFi Setup Flaw Allows Easy Router PIN Guessing 86

Trailrunner7 writes "There is a newly discovered vulnerability in the WiFi Protected Setup standard that reduces the number of attempts it would take an attacker to brute-force the PIN for a wireless router's setup process. The flaw results in too much information about the PIN being returned to an attacker and makes the PIN quite weak, affecting the security of millions of WiFi routers and access points. Security researcher Stefan Viehbock discovered the vulnerability (PDF) and reported it to US-CERT. The problem affects a number of vendors' products, including D-Link, Netgear, Linksys and Buffalo. 'I noticed a few really bad design decisions which enable an efficient brute force attack, thus effectively breaking the security of pretty much all WPS-enabled Wi-Fi routers. As all of the of the more recent router models come with WPS enabled by default, this affects millions of devices worldwide,' Viehbock said."
This discussion has been archived. No new comments can be posted.

New WiFi Setup Flaw Allows Easy Router PIN Guessing

Comments Filter:
  • Re:WPS (Score:2, Informative)

    by Anonymous Coward on Tuesday December 27, 2011 @08:04PM (#38509208)

    There's push button mode, and there's a shared PIN mode.

  • Nothing new (Score:4, Informative)

    by ewanm89 ( 1052822 ) on Tuesday December 27, 2011 @08:15PM (#38509320) Homepage
    Same old thing, default configuration is bad.
  • Re:ok... (Score:5, Informative)

    by stevel ( 64802 ) on Tuesday December 27, 2011 @08:18PM (#38509356) Homepage

    No. If your router supports the "external" authentication mode using only a PIN, it is vulnerable no matter which encryption type you use or how good your password is. I did not realize that there was such a mode - I too thought it required the pushbutton.

    The easiest mitigation is to disable the WPS PIN on your router, re-enabling it when you want to add a device. Some routers may not have such an option, but at least mine does.

    Scary.

  • Re:Nothing new (Score:4, Informative)

    by swillden ( 191260 ) <shawn-ds@willden.org> on Tuesday December 27, 2011 @10:07PM (#38510512) Journal

    Same old thing, default configuration is bad.

    Not really. That would imply that changing the default configuration to something else would fix the problem, but it doesn't. The only thing that fixes it is disabling WPS. Well, I suppose setting a really long PIN -- but the default is 8 digits which most people would expect is reasonable anyway. If the protocol didn't leak information about the PIN, or the device didn't allow brute force searches, this wouldn't be a problem.

    This isn't a default configuration problem, this is a security protocol defect coupled with an implementation error.

  • by LordLimecat ( 1103839 ) on Wednesday December 28, 2011 @01:47AM (#38511984)

    If you don't use Tomato or DD-WRT on your router you obviously don't really care about security anyway so who cares? The OOB ROMs on most consumer routers are full of more holes than a breadboard.

    A) Citation needed.
    B) Apparently youre not aware of the issues that historically plagued DD-WRT, what with their broken HTTPS daemon which would either spike your cpu to 100% or require you to use HTTP only. Thats some mighty good security there.
    C) Apparently youre also not aware that the old WRT-54Gs were the starting point for DD-WRT, and were linux based. What makes you think theres more security in DD-WRT?
    D) Security has never been a chief concern of either Tomato or DD-WRT.

  • by romiz ( 757548 ) on Wednesday December 28, 2011 @04:13AM (#38512724)

    From the PDF, the implementation mistake is to give the attacker feedback on whether the tried key is correct after the first half of authentication (phase M4), and then after the complete authentication (phase M6). Since the PIN is only 8 digits, and the last one is a checksum, the problem is reduced to guessing 1 number in 10000, and then 1 in 1000.

    The document states that there are few possible mitigations for the problem. However, it skips the obvious one: do not notify authentication success/failure until the response to the M6 message. This would restore the 1 in 10,000,000 guessing complexity of the PIN code, without changing the protocol. It should even be a new issue tested by the compliance suite the vendors need to pass to get the WPS certification.

Happiness is twin floppies.

Working...