TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Serious flaws leave WPA3 vulnerable to hacks that steal Wi-Fi passwords

130 pointsby eaguyhnabout 6 years ago

6 comments

zamadatixabout 6 years ago
Downgrade attacks:<p>WPA3 has a transitional mode which allows legacy WPA2 clients to connect. In this mode legacy WPA2 security issues are still present. Is this really a discovery or a given? How is WPA3 supposed to protect against it without requiring either WPA2 clients to be upgraded to support WPA3 security fixes (in which case you don&#x27;t need WPA2 support anymore anyways) or without dropping support for transitional mode? 802.11w fixes much of this but WPA2 didn&#x27;t mandate support for this which is one of the big reasons WPA3 is so much better.<p>Dragonfly downgrade:<p>&quot;The hack can force the access point to use a different curve, presumably one that’s weaker.&quot; note: not &quot;The hack can force the access point to use a different curve, one that’s weak.&quot;.<p>Side channel leaks:<p>Are failures in implementations not WPA3. If you&#x27;re allowing local timing attacks while generating your keys it doesn&#x27;t really matter what protocol you&#x27;re using you&#x27;ve just failed. A real discovery of things in the wild that need to be fixed but nothing to do with the security of the specification.<p>Denial of service:<p>It&#x27;s far more effective and simple to DoS the air than to DoS the APs CPU anyways. Always has been always will be. Besides, would you rather it be faster and have the AP expose side channel attacks instead?<p>&quot;dragonblood&quot;:<p>Makes me think some researchers were out for their 5 minutes of fame with a cool sounding &quot;vulnerability&quot;. To be a little less critical the researches discovered in-the-wild side channel attacks on popular client implementations of the crypto (but that doesn&#x27;t sound as cool as &quot;serious flaws leave WPA3 vulnerable&quot;.
评论 #19634886 未加载
评论 #19634569 未加载
评论 #19637390 未加载
评论 #19634639 未加载
评论 #19643353 未加载
penagwinabout 6 years ago
For some reason I&#x27;m surprised we&#x27;ve had so many issues with Wi-Fi security.<p>I don&#x27;t know if it was addressed in WPA3 (or if it would be addressed there), but my understanding is that a good chunk of the protocol isn&#x27;t authenticated at all, such as the de-auth packets.<p>In a world with growing HTTPS support, OpenVPN, WireGuard, etc. and we can&#x27;t secure a wifi network with a shared key?
评论 #19634374 未加载
评论 #19634229 未加载
rdlabout 6 years ago
My dream is to eliminate PSK from all the networks I care about&#x2F;am responsible for, but it&#x27;s really challenging to deploy 802.1X in anything but a fully managed enterprise (and also hard when you also have random other IOT&#x2F;etc. type devices; usually the &quot;important&quot; ones you can just put onto wired network, and the unimportant ones go onto dedicated psk, but it&#x27;s still a pain.<p>Still hate it all less than captive portals (which I hate so so much), but it&#x27;s pretty annoying.
评论 #19637489 未加载
评论 #19637411 未加载
robocatabout 6 years ago
Aside: “A valid SSID is 0-32 octets with arbitrary contents”<p>An SSID is up to 16 bytes of arbitrary data e.g. 16 nulls is a valid SSID - I wonder how many UI flaws (or security flaws) result from that decision...<p>Why wouldn’t WPA3 introduce sane limitations on SSIDs?
评论 #19635644 未加载
coldacidabout 6 years ago
Why can&#x27;t a Wi-Fi encryption standard be developed in the open and added to IEEE 802.11 as another annex? Or at least what&#x27;s to keep people like us from making our own standard in the open and implement it in our own systems at least?
dborehamabout 6 years ago
The paper underlying this article : <a href="https:&#x2F;&#x2F;papers.mathyvanhoef.com&#x2F;dragonblood.pdf" rel="nofollow">https:&#x2F;&#x2F;papers.mathyvanhoef.com&#x2F;dragonblood.pdf</a>