Coder Social home page Coder Social logo

krackinfo's People

Contributors

3lawrence avatar 4ndrej avatar amiablechief avatar andreax79 avatar btclay avatar carloscarnero avatar domenicbrosh avatar eaglerainbow avatar emdantrim avatar fehrm avatar fuga2136 avatar ikkerus avatar joshuarli avatar justforwatching avatar knomepasi avatar kristate avatar mcandre avatar mxxcon avatar nicorusti avatar requenym avatar rosiak avatar seanfeldman avatar sidhenn avatar stephengenusa avatar thorsteneb avatar tjikkun avatar towynlin avatar tyhicks avatar vishwin avatar wojciech-romek avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

krackinfo's Issues

Update AVM (FRITZ!Box)

WPA2 flaw – FRITZ!Box on broadband connections are secure
LINK
AVM will provide updates for its wireless repeaters.

Debian Updated wpasupplicant

The Linux distro Debian (and by extension, Ubuntu) have updated wpasupplicant to address these vulnerabilities;

wpa (2.3-1+deb8u5) jessie-security; urgency=high

  * Non-maintainer upload by the Security Team.
  * Add patches to fix WPA protocol vulnerabilities (CVE-2017-13077,
    CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081,
    CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088):
    - hostapd: Avoid key reinstallation in FT handshake
    - Prevent reinstallation of an already in-use group key
    - Extend protection of GTK/IGTK reinstallation of WNM-Sleep Mode cases
    - Fix PTK rekeying to generate a new ANonce
    - TDLS: Reject TPK-TK reconfiguration
    - WNM: Ignore WNM-Sleep Mode Response if WNM-Sleep Mode has not been used
    - WNM: Ignore WNM-Sleep Mode Response without pending request
    - FT: Do not allow multiple Reassociation Response frames
    - TDLS: Ignore incoming TDLS Setup Response retries

 -- Yves-Alexis Perez <[email protected]>  Sat, 14 Oct 2017 14:11:26 +0200

wpa (2:2.4-1+deb9u1) stretch-security has also been observed.

Allegedly it has also been updated for Arch Linux.

Unsubstantiated Information

The information added in commit 4bfa25b seems unsubstantiated and out-of-place to me.

I personally think it would be best to keep it simple - let other websites and resources explain the implications, or the information could be merged into sections "Attacks that ...".

Xfinity?

Would it make sense to add Comcast/Xfinity to the list, since they have a ton of gateway/APs that only they can patch? Or are their devices listed under another manufacturer?

Thanks so much for this list/your work!

Android: how to better take care of users

I foresee that Android is going to be a huge problem, mainly due to the severity of the issue and also the continued lack of support for devices from OEMs. We are already seeing some poor choices such as Tesco deciding not to patch Hudl.

I am going to start an Android specific page of information regarding each of the devices.

What is the latest from team Android?

Thanks again to everyone for their support!

Why is there some Japanese text?

Not an issue, just a curiosity. Why are two of the headings paraphrased in Japanese? A friend and I couldn't figure out the motivation but we're darned curious.

Pakedge

I have notified Pakedge about this issue today.
http://pakedge.com/

They have acknowledged they have received my enquiry but don’t have any info about the state of this vulnerability in their products.

Also, why are some of the dates in the future? E.g., 2017-10-21 (Last Checked)

IoT Vendors

Probably should add:
Nest Labs - Doesn't seem to be taking things seriously "No known attacks can be carried out against our hardware" was the reply I was told vai support.
Ring - Per support "They promise to update public shortly, actively working with developers."
Yi (Xiaoyi) - Waiting on a reply.

Missing iRobot (Roomba)

No official response.
No response found in any way.

Update:
I have a screen-dump of the response from iRobot.
krack-response-irobot

Add Sonos to the list

As far as I know they didn’t make an official statement. It’s a very popular product and since most of the users typically use the devices wirelessly, it would be very welcome to have them on this list.

Android/recent wpa_supplicant impact assessment is misleading

The KRACK author states that Android 6.0 devices and others using more recent versions of wpa_supplicant are vulnerable to an easier, more powerful attack. However, although the attack against those devices sounds scarier, the real-life implications of that attack are actually less worrisome than against other devices. The KRACK author did not look at the big picture.

The attack specific to those versions of wpa_supplicant which zero out the PTK works by taking over the connection from those devices to the access point. However, it does not allow the attacker to interact in any way with the original access point. Although the attacker now has full control over the connection to the device, they cannot forward it to the real AP and man-in-the-middle the resulting traffic (unless they have credentials to the AP, but then there are many other ways to attack it). This is unlike the original KRACK attack which does allow the attacker to decrypt and possibly modify data while the client remains connected to the original AP.

Crucially, we can already do similar things without relying on KRACK, intrinsic to the way WiFi works. If I want to take over your network connection, all I have to do is show up with a rogue access point with the SSID of a public WiFi that your device is likely to have stored, and then forcibly inject a deauth to kick it off its current network. Chances are it will join my rogue network of its own accord. Anyone who has ever connected to a public WiFi on their phone is vulnerable to this, and the impact is all but identical to what you can do with the specific form of KRACK we're talking about. This is a much simpler attack (you don't even need custom attack tools, just a aircrack to inject deauths and a standard AP) and works on every device.

Other than that, the worst you can do with this variant of KRACK relevant to the original AP's network is to sniff whatever traffic the client attempts to send to the original AP. However, since you can't reply appropriately (unless it's new connections to Internet hosts you can forward to), this is most likely of rather limited use.

Therefore, I would suggest changing the language around this to better reflect the reality of the situation. In my opinion, Android 6.0 and later devices are actually affected by KRACK in a less severe way, in practical situations, all things considered.

For further reading, the wpa_supplicant advisory has a more accurate description of the problem that gauges the impact on older versions as being more severe:

For the station/Supplicant side GTK/IGTK reinstallation and TK configuration:

All wpa_supplicant versions. The impact on older versions can be more severe due to earlier changes in this area: v2.3 and older can also reinstall the pairwise key and as such have similar impact as the AP FT case (CVE-2017-13077); v2.4 and v2.5 end up configuring an all-zero TK which breaks the normal data path, but could allow an attacker to decrypt all following frames from the station and to inject arbitrary frames to the station. In addition, a different message sequence involving 4-way handshake can result in configuration of an all-zero TK in v2.6 and the current snapshot of the development repository as of the publication of this advisory.

Mojo Networks missing from Krack page

Hi Kris,

Mojo Networks would like to be included on your Vendor Patch Matrix for the WPA2. Not only have we already upgraded our cloud server with the fix, we have an upgrade available for all Mojo APs. Further, Mojo is the only vendor with built-in MAC spoofing and Man-in-the-Middle protection that helps users mitigate the majority of the client side vulnerabilities until software updates are available for those clients. (other vendors may cover those features, but only to customers who purchase an extra license/product add on).

You can find info at the following URLs. If you have any questions, please feel free to contact me directly at [email protected]

WPA Vulnerability Announcement (https://www.mojonetworks.com/wpa2-vulnerability)

Blog: WPA2 Key Reinstallation Vulnerabilities (KRACK) Explained (http://blog.mojonetworks.com/wpa2-vulnerability)

Mitigation Plan on Mojo Support Portal
https://support.mojonetworks.com/support/solutions/articles/9000134420-wpa2-wpa-key-reinstall-vulnerabilities

Thanks!
Cherie

ecobee reponse - claims not vulnerable

Not sure I believe them, but I have contacted ecobee support and they claim that ecobees are not vulnerable

Their full response as of 10:21am on 10-17:

Hello,

Thank you for contacting ecobee technical support today.

ecobee is aware of the industry-wide vulnerability in WPA2 referred to as KRACK. The security of our customers is very important to us, and we have confirmed that ecobee device security is not impacted by this issue.

Regards

Samsung update

I spoke with Samsung customer support and they said a fix is in the works, no ETA available.

Missing OmniRom

OmniROM builds updated with KRACK fixes
all official OmniROM N builds have the fix included.
LINK

Missing webOS

After doing some research I found that webOS uses connman. See git LINK
WebOS forum shows no activity concerning KRACK LINK
Connman has not released any information or updates yet. LINK
Other distro's using connman might also be affected.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.