On Wed, 31 Jul 2019 10:43:48 +0300
Reco <recovery...@enotuniq.net> wrote:

>       Hi.
> 
> On Tue, Jul 30, 2019 at 07:06:08PM -0400, Celejar wrote:
> > On Mon, 29 Jul 2019 13:57:25 +0300
> > Reco <recovery...@enotuniq.net> wrote:
> > 
> > ...
> > 
> > > WPA2's (that's your conventional WiFi standard) secure configuration is
> > > fiendishly difficult. 
> > 
> > I take your point, but "fiendishly difficult"? I think you're
> > exaggerating.
> 
> WPA Enterprise. 802.1r. An "interesting" choice between CCMP and TKIP
> (yep, it's hardware dependent). De-authentication attacks. "Evil twin"
> attacks.
> 
> I meant it when I wrote "fiendishly difficult".

I'm afraid that I'm missing your point. The context here was a home
user choosing between wifi and wired ethernet, and you are arguing that
configuring wifi securely is fiendishly difficult. Why are we talking
about WPA Enterprise, as opposed to PSK?

> > > You have beacon frames that are broadcasted without any encryption.
> > 
> > True, but is there any evidence that this constitutes a security risk?
> 
> Some people believe that hiding AP name gives them another layer of
> security. Beacon frames prove otherwise.

Certainly, but that has no bearing on the underlying question of
whether wifi can be configured to be tolerably secure in a reasonably
straightforward fashion by a home user.

> > > You have authentication frames that can be intercepted (so WPA
> > > passphrase can be bruteforced).
> > 
> > Lots of things (such as TLS, ssh) can theoretically be brute forced -
> > the question is whether such brute forcing is sufficiently practical to
> > be a threat. I have seen nothing to indicate that properly configured
> > WPA2 can be realistically brute forced.
> 
> For WPA2 it's not that hard really, assuming pre-shared key usage.
> Can be expensive (all those videocards and ASICs have their cost), but
> definitely doable.

I'd be interested in seeing some real-world studies, or simply just a
mathematical analysis of how much hardware would be necessary to crack
a good WPA2 password. I've seen lots of sites explaining how to use
hashcat with a GPU, and various real-world tests on lists of hashed
passwords (e.g., [1]), but can you provide a serious analysis of the
practical cost, in time or hardware, of cracking a real-world WPA setup?

> You have several encryption algorithms, but:

...

> > > b) You may have a hardware that lack support for a good ones.
> > 
> > I suppose, but my impression is that most hardware from the last few
> > years is fine.
> 
> Cheap smartphones and tablets. Whatever they put instead of a proper

This misses the point - we're comparing ethernet to wifi. Cheap
smartphones and tablets aren't usually going to support ethernet.

> WiFi in printers (yep, I'm looking at you, HP). Oh, D-Link and Linksys.
> There are *always* some exceptions to "newer is the better" rule.

D-Link and Linksys don't support WPA2-PSK with AES?

[1]
https://arstechnica.com/information-technology/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/

Celejar

Reply via email to