Wi-Fi Protected Setup security hole discovered

Sephire

Golden Member
Feb 9, 2011
1,689
3
76
Wi-Fi Protected Setup (WPS) has become popular among router manufacturers as a way to make adding new devices to your wireless network simpler, meaning you don't have to remember your wireless key every time. However, security researcher Stefan Viehbock has uncovered a major security hole which allows him to use brute force to access a WPS PIN-protected network in an average of two hours.

An inherent design flaw means that the 8-digit PIN's security falls dramatically as more attempts are made — a message sent by the router when the PIN fails informs the hacker if the first four digits are correct, while the last digit of the key is used as a checksum and is given out by the router in negotiation. This means that instead of the 108 (100,000,000) possibilities that WPS should represent, the actual level of security is closer to 104 + 103 (or 11,000 — over 9,000 times less).

Advice from the US Computer Emergency Readiness Team (US-CERT) suggests that the safest option for users is to disable WPS on your router, though as Viehbock says, "good luck telling users to turn off functionality that has 'protect' in its name." He also claims to have attempted to discuss the issue with hardware vendors — with routers from Buffalo, D-Link, Linksys, and Netgear all vulnerable to the attacks — but has been ignored. None of the manufacturers have yet released statements or updated firmware, though with Viehbock promising to release the brute force tool soon, it seems likely that they'll be forced to respond.

http://www.theverge.com/2011/12/28/2665476/wi-fi-protected-setup-wps-security-breach


I use WPA2-Personal from my Linksys 4200. I never used that one touch setup button on Linksys products. I always put in my own PIN.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
If you're using the PIN, you're using WPS. It was a terrible idea to begin with and I'm not surprised it's been compromised. When you make it easier to use, you inherently make it less secure.

I agree, WPS should be disabled on any device you own.
 

Sephire

Golden Member
Feb 9, 2011
1,689
3
76
I tought its different the way Verge is describing it. I go to my routers setup and put in my own PIN and then on Windows/Mac use the same PIN to connect. I never use the "Easy connect" software that came with Linksys or push the "Easy" button.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
I tought its different the way Verge is describing it. I go to my routers setup and put in my own PIN and then on Windows/Mac use the same PIN to connect. I never use the "Easy connect" software that came with Linksys or push the "Easy" button.

There's a WPA1/2 passphrase or "key", it should be alphanumeric 12 characters or more and follow strong password policy.

Then there is a "PIN". If using a PIN, you're using WPS.
 

imagoon

Diamond Member
Feb 19, 2003
5,199
0
0
All of the WPS stuff I have set up for family had a button to push to make it work for about a minute before if shut off and changed... Are not all devices like this?
 

VirtualLarry

No Lifer
Aug 25, 2001
56,587
10,225
126
All of the WPS stuff I have set up for family had a button to push to make it work for about a minute before if shut off and changed... Are not all devices like this?

Yeah, that's part of what I don't get.

I remember setting up a Belkin EasyConnect 150 for someone, and the first thing windows did after trying to connect to that router's SSID was to prompt for a WPS pin. There is no switch on those routers I don't think.

It may be true that as long as the router has WPS enabled, then any device which attempts to connect, just has to provide the PIN. Push the physical button allows pairing without even putting in any PIN, I think.


Is DD-WRT affected by this? Do they support WPS at all?

Edit: DD-WRT on my WRN2000v2 only has an option to use the WPS push-button as a control to turn the radio off. Which is interesting, since these device have a seperate radio on/off button on the back, but I'm guessing DD-WRT ignores that button.
 
Last edited:

drebo

Diamond Member
Feb 24, 2006
7,034
1
81
So a tool for people too lazy or stupid to remember an SSID and an alphanumeric passphrase has been compromised. Shit, even an 8 digit pin wouldn't take too long to brute force. Seriously, anyone who expected this to be secure was an idiot.
 

ImDonly1

Platinum Member
Dec 17, 2004
2,357
0
76
Anyone try the tool? I get a lot of timeouts and only did about 0.50% in half an hour or 40 seconds per attempt. Seems kind of slow. Not sure what's up with all of the timeouts.