Discussion:
[GTALUG] Suggestions for stopping occasional spurious use of commercial wi-fi
David Collier-Brown via talk
2018-09-16 17:45:50 UTC
Permalink
I have a Rogers-supplied router and cable modem package, which twice has
shown significant usage when I was out, once with the original unit and
once with their replacement Cisco.  That makes me suspicious of the
current state of authentication for wi-fi schemes (and I use the term
"schemes" advisedly: they used to horribly leaky (;-))

What's a good approach? I have considered

* MAC address lists,
* no wi-fi (strictly wired doesn't work with solid concrete walls),
* a second router with a more secure protocol (/is/ there such a
protocol? And will my wife's Mac speak it?))
* something I haven't thought of

--dave

[The usage never runs me over my limit: I think someone is using me for
downloads that might put /them/ over their limit]
--
David Collier-Brown, | Always do right. This will gratify
System Programmer and Author | some people and astonish the rest
***@spamcop.net | -- Mark Twain
James Knott via talk
2018-09-16 17:50:14 UTC
Permalink
Post by David Collier-Brown via talk
What's a good approach? I have considered
Many people use separate routers, as they're not happy with the Rogers
hardware.  I run pfSense on a refurb computer.  All you have to do is
put the modem in bridge mode and connect your router.  Also, you may
want to get something other than a Cisco modem.  Rogers doesn't support
IPv6 on them.  I have a Hitron modem in bridge mode.

BTW, when I switched from Cisco to Hitron, I wound up with a significant
price decrease for my Internet/TV/Home phone service.

---
Talk Mailing List
***@gtalug.org
https://gta
Don Tai via talk
2018-09-16 18:32:02 UTC
Permalink
I daisy chain in my own router, then MAC address filtering. Turn off wifi
on the Rogers router. If you are not home during the day you can possibly
programmatically turn off wifi. The MAC address filtering is a bit of work
to maintain, as you need all device MAC addresses, but I've gotten used to
it.

You can also look into using metal mesh/aluminium foil to limit your
router's directionality. For example if you are in an apartment and the
router is on the west perimiter, put up some chicken wire blocking access
further west. If you are in an apartment with a single floor then reorient
your antenna to not transmit your signal higher or lower than your floor.
That will further limit access.

Don
Post by James Knott via talk
Post by David Collier-Brown via talk
What's a good approach? I have considered
Many people use separate routers, as they're not happy with the Rogers
hardware. I run pfSense on a refurb computer. All you have to do is
put the modem in bridge mode and connect your router. Also, you may
want to get something other than a Cisco modem. Rogers doesn't support
IPv6 on them. I have a Hitron modem in bridge mode.
BTW, when I switched from Cisco to Hitron, I wound up with a significant
price decrease for my Internet/TV/Home phone service.
---
Talk Mailing List
https://gtalug.org/mailman/listinfo/talk
James Knott via talk
2018-09-16 18:36:52 UTC
Permalink
Post by Don Tai via talk
You can also look into using metal mesh/aluminium foil to limit your
router's directionality. For example if you are in an apartment and
the router is on the west perimiter, put up some chicken wire blocking
access further west. If you are in an apartment with a single floor
then reorient your antenna to not transmit your signal higher or lower
than your floor. That will further limit access.
WPA2 encryption would be more effective.  Start with a new password.  I
use the "Perfect Passwords" from www.grc.com to generate 63 random
characters.


---
Talk Mailing List
Don Tai via talk
2018-09-16 18:42:12 UTC
Permalink
I am assuming that on the Rogers router you are already using WPA2 and that
someone has cracked it using a tool like AirCrack-NG (Kali dist or
download). Physical barriers to limit signal strength will not alone
protect you. There are numerous tutorials out there on how to use
Aircrack-NG.
Post by Don Tai via talk
You can also look into using metal mesh/aluminium foil to limit your
router's directionality. For example if you are in an apartment and
the router is on the west perimiter, put up some chicken wire blocking
access further west. If you are in an apartment with a single floor
then reorient your antenna to not transmit your signal higher or lower
than your floor. That will further limit access.
WPA2 encryption would be more effective. Start with a new password. I
use the "Perfect Passwords" from www.grc.com to generate 63 random
characters.
---
Talk Mailing List
https://gtalug.org/mailman/listinfo/talk
James Knott via talk
2018-09-16 18:57:44 UTC
Permalink
Post by Don Tai via talk
I am assuming that on the Rogers router you are already using WPA2 and
that someone has cracked it using a tool like AirCrack-NG (Kali dist
or download). Physical barriers to limit signal strength will not
alone protect you. There are numerous tutorials out there on how to
use Aircrack-NG.
From the FAQ:

"How can I crack a WPA-PSK network ?

You must sniff until a handshake takes place between a wireless client
and the access point. To force the client to reauthenticate, you can
start a deauth attack with aireplay-ng. Also, a good dictionary is
required."

By avoiding passwords found in the dictionary, you're much less
Try finding that in a dictionary.

And also:

Will WPA be cracked in the future ?

It's extremely unlikely that WPA will be cracked just like WEP was.

The major problem with WEP is that the shared key is appended to the IV;
the result is directly used to feed RC4. This overly simple construction
is prone to a statistical attack, since the first ciphertext bytes are
strongly correlated with the shared key (see Andrew Roos' paper). There
are basically two counter-measures against this attack:

    Mix the IV and the shared key using a hash function or
    Discard the first 256 bytes of RC4's output.

There has been some disinformation in the news about the “flaws” of TKIP:

For now, TKIP is reasonably secure but it is also living on borrowed
time since it still relies on the same RC4 algorithm that WEP relied on.

Actually, TKIP (WPA1) is not vulnerable: for each packet, the 48-bit IV
is mixed with the 128-bit pairwise temporal key to create a 104-bit RC4
key, so there's no statistical correlation at all. Furthermore, WPA
provides counter-measures against active attacks (traffic reinjection),
includes a stronger message integrity code (michael), and has a very
robust authentication protocol (the 4-way handshake). The only
vulnerability so far is a dictionary attack, which fails if the
passphrase is robust enough.

WPA2 (aka 802.11i) is exactly the same as WPA1, except that CCMP (AES in
counter mode) is used instead of RC4 and HMAC-SHA1 is used instead of
HMAC-MD5 for the EAPOL MIC. Bottom line, WPA2 is a bit better than WPA1,
but neither are going to be cracked in the near future.


https://www.aircrack-ng.org/doku.php?id=faq
---
Talk Mailing List
***@gt
Kevin Cozens via talk
2018-09-16 19:33:53 UTC
Permalink
Post by James Knott via talk
Will WPA be cracked in the future ?
It's extremely unlikely that WPA will be cracked just like WEP was.
A method of cracking WPA systems that use the Temporal Key Integrity
Protocol (TKIP) algorithm was found in 2009. It was reported that the attack
does not work on WPA systems using Advanced Encryption Standard (AES)
algorithm, or WPA2 devices. However, WPA2 was cracked as of last October.
--
Cheers!

Kevin.

http://www.ve3syb.ca/ | "Nerds make the shiny things that
https://www.patreon.com/KevinCozens | distract the mouth-breathers, and
| that's why we're powerful"
Owner of Elecraft K2 #2172 |
#include <disclaimer/favourite> | --Chris Hardwick
---
Talk Mailing List
***@gtalug.org
https://gtalug.org/mail
James Knott via talk
2018-09-16 19:58:39 UTC
Permalink
Post by Kevin Cozens via talk
Post by James Knott via talk
Will WPA be cracked in the future ?
It's extremely unlikely that WPA will be cracked just like WEP was.
A method of cracking WPA systems that use the Temporal Key Integrity
Protocol (TKIP) algorithm was found in 2009. It was reported that the
attack does not work on WPA systems using Advanced Encryption Standard
(AES) algorithm, or WPA2 devices. However, WPA2 was cracked as of last
October.
Still, it's more effective than relying on properly placing foil.  As I
recall, there's WPA3 in the works, which should be more secure.  Then
again, I suppose they could always set up an RADIUS server.  ;-)


https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#WPA3
---
Talk Mailing List
***@gtalug.org
https://gtalug.org/mai
James Knott via talk
2018-09-16 20:18:19 UTC
Permalink
Post by Don Tai via talk
I am assuming that on the Rogers router you are already using WPA2 and
that someone has cracked it using a tool like AirCrack-NG (Kali dist
or download). Physical barriers to limit signal strength will not
alone protect you. There are numerous tutorials out there on how to
use Aircrack-NG.
You can't assume people use a decent password.  That's why I suggested
www.grc.com.

BTW, I am currently rereading "The Cuckoo's Egg", by Clifford Stoll.  I
first read it almost 30 years ago, when I was a computer tech
maintaining VAX 11/780 computers, among others.  It's a good read that
describes attacks on a computer and what was done to track down the
attacker.  IIRC, the VAX's had a default account "admin" and password
"password", which often wasn't changed.  So, even with the big systems,
security wasn't always the greatest.  Back in those days, it wasn't all
that hard to walk in from Front St., past the security desk, hop on the
elevator and walk into the data centre.  My wife did that on occasion,
to meet me.  IIRC, there weren't even locks on the data centre doors
until the first Gulf war.

https://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg
---
Talk Mailing List
***@gtalug.org
https:/
Howard Gibson via talk
2018-09-17 13:07:37 UTC
Permalink
On Sun, 16 Sep 2018 13:50:14 -0400
Post by James Knott via talk
Post by David Collier-Brown via talk
What's a good approach? I have considered
Many people use separate routers, as they're not happy with the Rogers
hardware.  I run pfSense on a refurb computer.  All you have to do is
put the modem in bridge mode and connect your router.  Also, you may
want to get something other than a Cisco modem.  Rogers doesn't support
IPv6 on them.  I have a Hitron modem in bridge mode.
My DSL modem has a firewall feature that my vendor recommends not using. I have a wireless router that serves as my firewall, and I have a long security key. I am so glad I took typing in high school.
--
Howard Gibson
***@eol.ca
***@gmail.com
http://home.eol.ca/~hgibson
---
Talk Mailing List
***@gtalug.org
https://gtalug.org/mailman/
Alvin Starr via talk
2018-09-17 13:21:28 UTC
Permalink
Post by Howard Gibson via talk
On Sun, 16 Sep 2018 13:50:14 -0400
Post by James Knott via talk
Post by David Collier-Brown via talk
What's a good approach? I have considered
Many people use separate routers, as they're not happy with the Rogers
hardware.  I run pfSense on a refurb computer.  All you have to do is
put the modem in bridge mode and connect your router.  Also, you may
want to get something other than a Cisco modem.  Rogers doesn't support
IPv6 on them.  I have a Hitron modem in bridge mode.
My DSL modem has a firewall feature that my vendor recommends not using. I have a wireless router that serves as my firewall, and I have a long security key. I am so glad I took typing in high school.
Take a  look at the TR-069 standard.
It allows a service provider to remotely manage and control the device
at the customer location.
This can be a great thing if you have unsophisticated customers who need
help but it does mean that you have complete control over their security
and can do what you like with their device.

I would suggest that if your concerned about external hacks or access
get a device that has the TR-069 removed or disabled.
--
Alvin Starr || land: (905)513-7688
Netvel Inc. || Cell: (416)806-0133
***@netvel.net ||

---
Talk Mailing List
***@gtalug.org
https://gtalug.org/
David Collier-Brown via talk
2018-09-16 21:51:06 UTC
Permalink
Post by David Collier-Brown via talk
I have a Rogers-supplied router and cable modem package, which twice
has shown significant usage when I was out, once with the original
unit and once with their replacement Cisco.  That makes me suspicious
of the current state of authentication for wi-fi schemes (and I use
the term "schemes" advisedly: they used to horribly leaky (;-))
What's a good approach? I have considered
* MAC address lists,
* no wi-fi (strictly wired doesn't work with solid concrete walls),
* a second router with a more secure protocol (/is/ there such a
protocol? And will my wife's Mac speak it?))
* something I haven't thought of
--dave
I've set up MAC address lists, after a surprising number of reboots to
unwedge the router  (did I even mention I hate flaky PC-style software?).

How can my hacker avoid them? Wait until my wife's Mac drops off-line
and steal her MAC?

--dave
--
David Collier-Brown, | Always do right. This will gratify
System Programmer and Author | some people and astonish the rest
***@spamcop.net | -- Mark Twain
Jamon Camisso via talk
2018-09-17 15:17:41 UTC
Permalink
Post by David Collier-Brown via talk
I've set up MAC address lists, after a surprising number of reboots to
unwedge the router  (did I even mention I hate flaky PC-style software?).
How can my hacker avoid them? Wait until my wife's Mac drops off-line
and steal her MAC?
Actually I'd like to know more about your wifi setup. What kind of
security is/was in place?

I'd be somewhat dubious about a malicious hacker if you were using WPA2
with a decent passphrase. Ok, if WEP, well that takes a few minutes, but
if you're using WEP then all hope is lost..

If WPA2, try it out, fire up aireplay, capture the 4 way handshake and
then run wpacrack against it with a decent dictionary.

If you have a moderately ok passphrase, it will take days on a decently
speced machine to brute force it, if at all.

Howto here: https://aircrack-ng.org/doku.php?id=cracking_wpa

Are you sure something else isn't going on?
---
Talk Mailing List
***@gtalu
UU via talk
2018-09-17 01:47:59 UTC
Permalink
On Sun, 16 Sep 2018, David Collier-Brown wrote:

|I have a Rogers-supplied router and cable modem package, which twice has shown
|significant usage when I was out, once with the original unit and once with
|their replacement Cisco.  That makes me suspicious of the current state of
|authentication for wi-fi schemes (and I use the term "schemes" advisedly: they
|used to horribly leaky (;-))
|
|What's a good approach? I have considered
|
| * MAC address lists,
| * no wi-fi (strictly wired doesn't work with solid concrete walls),
| * a second router with a more secure protocol (/is/ there such a
| protocol? And will my wife's Mac speak it?))
| * something I haven't thought of


!. yes, allow only designated MAC addresses
2. change SSID & don't broadcast it
2. consider LoRa as a possible adjunct/replacement
https://en.wikipedia.org/wiki/LoRa


O . Bruce Becker Toronto, Ontario +1 416 410 0879
o _///_ // Email: ***@0123456789-abcdefghijklmnopqrstuvw.xyz
<`)= _<< Cave Pilus Cani
\\\ \\ ( Beware of the Hair of the dog ;)
James Knott via talk
2018-09-17 12:37:03 UTC
Permalink
Post by UU via talk
2. change SSID & don't broadcast it
That's generally not effective.  It provides a false sense of security.

---
Talk Mailing List
***@gtalug.org
https://gtalug.org/mailman/lis
Jamon Camisso via talk
2018-09-17 12:51:16 UTC
Permalink
Post by James Knott via talk
Post by UU via talk
2. change SSID & don't broadcast it
That's generally not effective.  It provides a false sense of security.
Likewise MAC address white listing. It is easy enough to use ip link set
dev address, or ifconfig hw ether to spoof a MAC address.

Anyone who has gone to the trouble to crack your WPA2 PSK security will
be able to spoof a MAC address. Their packet captures will contain
legitimate authenticated clients that can be copied.

arping can be used to hijack the MAC of a currently connected client as
well, no need to wait for them to be offline.

So there's really no benefit to white listing if someone is targeting
you - far more trouble to maintain, and very much encourages a false
sense of security.

Cheers, Jamon
---
Talk Mailing List
t
Bill Duncan via talk
2018-09-17 04:51:19 UTC
Permalink
Hey Dave,
I agree with Bruce on his first 2 points, not sure about LoRa..

What I do is turn the bell wifi off, link it to my own router over the wire.

It'll take a few years for manufacturers and device makers, but WPA3 has
been released. Doesn't help you now, but..

https://www.schneier.com/blog/archives/2018/07/wpa3.html
https://www.theverge.com/circuitbreaker/2018/6/26/17501594/wpa3-wifi-security-certification

Cheers.
Post by UU via talk
|I have a Rogers-supplied router and cable modem package, which twice has shown
|significant usage when I was out, once with the original unit and once with
|their replacement Cisco.?? That makes me suspicious of the current state of
|authentication for wi-fi schemes (and I use the term "schemes" advisedly: they
|used to horribly leaky (;-))
|
|What's a good approach? I have considered
|
| * MAC address lists,
| * no wi-fi (strictly wired doesn't work with solid concrete walls),
| * a second router with a more secure protocol (/is/ there such a
| protocol? And will my wife's Mac speak it?))
| * something I haven't thought of
!. yes, allow only designated MAC addresses
2. change SSID & don't broadcast it
2. consider LoRa as a possible adjunct/replacement
https://en.wikipedia.org/wiki/LoRa
O . Bruce Becker Toronto, Ontario +1 416 410 0879
<`)= _<< Cave Pilus Cani
\\\ \\ ( Beware of the Hair of the dog ;)
_______________________________________________
u-u mailing list
https://unixunanimous.org/mailman/listinfo/u-u
--
Bill Duncan, | http://billduncan.org/
***@beachnet.org | - linux/unix/network
+1 416 697-9315 | - performance engineering
---
Talk Mailing List
***@gtalug.org
https://gtalug.org/ma
Don Tai via talk
2018-09-17 14:30:23 UTC
Permalink
I'm on Bell, who gave me a Home hub 3000. It has a log, so you can see
errors. You can even download the log, but the info is not very useful.
From the Bell router I also use RJ45 to my personal router.
Post by Bill Duncan via talk
Hey Dave,
I agree with Bruce on his first 2 points, not sure about LoRa..
What I do is turn the bell wifi off, link it to my own router over the wire.
It'll take a few years for manufacturers and device makers, but WPA3 has
been released. Doesn't help you now, but..
https://www.schneier.com/blog/archives/2018/07/wpa3.html
https://www.theverge.com/circuitbreaker/2018/6/26/17501594/wpa3-wifi-security-certification
Cheers.
Post by UU via talk
|I have a Rogers-supplied router and cable modem package, which twice
has shown
Post by UU via talk
|significant usage when I was out, once with the original unit and once
with
Post by UU via talk
|their replacement Cisco.?? That makes me suspicious of the current
state of
Post by UU via talk
|authentication for wi-fi schemes (and I use the term "schemes"
advisedly: they
Post by UU via talk
|used to horribly leaky (;-))
|
|What's a good approach? I have considered
|
| * MAC address lists,
| * no wi-fi (strictly wired doesn't work with solid concrete walls),
| * a second router with a more secure protocol (/is/ there such a
| protocol? And will my wife's Mac speak it?))
| * something I haven't thought of
!. yes, allow only designated MAC addresses
2. change SSID & don't broadcast it
2. consider LoRa as a possible adjunct/replacement
https://en.wikipedia.org/wiki/LoRa
O . Bruce Becker Toronto, Ontario +1 416 410 0879
<`)= _<< Cave Pilus Cani
\\\ \\ ( Beware of the Hair of the dog ;)
_______________________________________________
u-u mailing list
https://unixunanimous.org/mailman/listinfo/u-u
--
Bill Duncan, | http://billduncan.org/
+1 416 697-9315 | - performance engineering
---
Talk Mailing List
https://gtalug.org/mailman/listinfo/talk
D. Hugh Redelmeier via talk
2018-09-17 20:48:02 UTC
Permalink
| From: David Collier-Brown via talk <***@gtalug.org>
| To: UU <u-***@unixunanimous.org>, GTALUG Talk <***@gtalug.org>

I don't think that it is great to post a message once to two public
mailing lists. It can lead to odd entanglements. It's fine to
separately post the same message to two lists. I'm violating this
suggestion with this message.

| I have a Rogers-supplied router and cable modem package, which twice has shown
| significant usage when I was out, once with the original unit and once with
| their replacement Cisco.  That makes me suspicious of the current state of
| authentication for wi-fi schemes (and I use the term "schemes" advisedly: they
| used to horribly leaky (;-))

Wow. Interesting.

If it were me, I'd try to figure out who was doing this. But in
reality that's probably more work than it is worth.

| What's a good approach? I have considered
|
| * MAC address lists,

MACs a so spoofable. Why bother?

If I remember correctly, OSX now has a feature that lets you use a
random MAC on your wireless just to avoid other people tracking you.

| * no wi-fi (strictly wired doesn't work with solid concrete walls),

I don't imagine your threat models are so severe that this matters.
But for the paranoid: even traffic analysis (without decryption)
reveals a lot.

| * a second router with a more secure protocol (/is/ there such a
| protocol? And will my wife's Mac speak it?))

I think that the best compromise for most individuals who care even a
bit is:

- Turn off the modem's WiFi and put it in bridge mode. You may have
to repeat this after a power failure or a (generally unannounced)
firmware update.

Why: Rogers has 100% control of the modem (remote provisioning,
firmware updates). They have (if they choose) access to your LAN
unless you put something between the modem and the LAN.

- use your own wireless router. Choose one that has a decent radio
and is well supported by OpenWRT. Run OpenWRT on it.

Why: firmware from the manufacturers is crappy in known and unknown
ways. Other third party firmware providers are badly constituted
(dictatorships, NDAs, glued together bits of binary stuff).

- alternatively use a little PC and install whatever amuses you as
software to make it a router.

Why not: takes more resources than just using OpenWRT on consumer
router hardware. Cost, time, electricity, noise, heat, risk of
misconfiguring, maintenance effort.

Why: more flexible, more controllable. Sometimes better
performance. Can perform server roles (email, web, ...).

This is what I do. I run CentOS an two of my three consumer-grade
internet connections. I run Fedora 28 on the other -- that adds to
the maintenance burden (so many updates!).

- alternative: <https://omnia.turris.cz/en/>
I'd like this to be a great solution but I don't know whether it is.
It's not as inexpensive as I'd like.

One of my connections is gigabit from Rogers. Ordinary wireless
routers cannot pass 1G though unless proprietary NAT hardware
acceleration is used. That hardware is not supported by OpenWRT.
Even if it were, there are serious restrictions on what can be done to
the packet before it gets punted to the software path.

My little PC solution seems to handle gigabit just fine. I use Zotac
ZBoxes that come with two gigabit ethernet ports (only a few do). My
gigabit gateway is an RI323Nano (out of production). My others
(untested for gigabyte throughput) are both CI321NANO. These cost me
about the same as an expensive router. I don't use them for providing
WiFi. I use a couple of consumer WiFi routers as (just) APs.

As for WiFi passwords: make them long and replete with entropy. I use
the mkpasswd command that is part of the expect package. Don't use
the magic button on the router to make the password crap easier: it
can make you vulnerable. Typing these is very error-prone so I use a
USB flash drive to carry them to a new system.
James Knott via talk
2018-09-18 00:48:46 UTC
Permalink
Post by D. Hugh Redelmeier via talk
- Turn off the modem's WiFi and put it in bridge mode. You may have
to repeat this after a power failure or a (generally unannounced)
firmware update.
I've had my Rogers modem in bridge mode for several years and a few
different  models.  I've never seen that.

---
Talk Mailing List
***@gtalug.org
https://gtalug.org/mailman

Loading...