Tag Archive for WPA 2

Wi-Fi on Wheels

ChWi-Fi on Wheelsevrolet has announced that owners of several new models can turn their rides in a mobile hot spot with Chevrolet Wi-Fi by Autonet Mobile. This option enables full Internet access inside the vehicle and up to a 150 feet radius around the vehicle. Chevrolet Wi-Fi is designed for use by passengers, or by the driver when the vehicle is parked. The system requires no special software and achieves speeds up to 1.5 Mbps. The Chevrolet Wi-Fi internet connection can support up to 10  devices at once, enabling multiple passengers to use the connection for their separate devices.

Chevrolet Wi-Fi by Autonet Mobile enhances commuting, family vacations and work,” says Chris Rauser, Chevrolet Accessories Manager. “It benefits active families on the go, as well as professionals who need immediate information at remote job sites. Its uses are almost endless.” San Francisco-based Autonet Mobile is the world’s first Internet service provider designed exclusively for vehicles. As a GM Officially Licensed Product, Chevrolet Wi-Fi by Autonet Mobile is certified to work with the following new Chevrolet models:

  • Equinox
  • Traverse
  • Silverado
  • Tahoe
  • Suburban
  • Avalanche
  • Express

According to Autonet, the system uses 3G EVDO/2.5g 1xRRT wireless from Novatel Wireless for connectivity and its own patent-pending TRU technology to support Internet connections over the 3G network while the vehicle is in motion. TRU technology maintains the persistent link, even when 3G coverage is sparse. IEEE 802.11b-a-g provides data link protocols along with one built-in Ethernet LAN port that provides wired connectivity.

Its transport protocols include  PPTP, L2TP, IPSec, and PPPoE along with SNMP for remote management.  Security and access control are provided via  WEP/WPA/WPA2 encryption. Additional docking stations are available, enabling customers to easily move the Chevrolet Wi-Fi by Autonet Mobile router from vehicle to vehicle.

Through Dec. 31, Chevrolet Wi-Fi is available for $199 ($399 retail price, less $200 mail-in rebate with a two-year service agreement). Go to GMextras.com for more information.

rb-

Now a soccer mom in her mini-van picking up Happy Meals will have more connectivity options than some of my clients.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

WPA Gone in 60 Seconds

WPA Gone in 60 SecondsJapanese researchers have identified a WPA hack that could give hackers a way to read encrypted Wi-Fi traffic  in less than 1 minute. Toshihiro Ohigashi (Hiroshima University) and Masakatu Morii (Kobe University) presented a way to break the WPA (Wi-Fi Protected Access) encryption system at the Joint Workshop on Information Security. The researchers outlined their work in a paper called “A Practical Message Falsication Attack on WPA” on August 7, 2009.

The new attack builds on 2008 research from Darmstadt University of Technology graduate students Martin Beck and Erik Tews who proved that WPA Temporal Key Integrity Protocol (TKIP) could be attacked. The Beck-Tews attack only worked on short packets in a WPA implementation that supported 802.11 quality of service (QOS) features and took between 12 and 15 minutes to work.

The new threat uses “man in the middle” (MITM) attacks on WPA TKIP systems. The MITM attack uses the “chopchop” attack on a short packet (like ARP broadcasts), decipher its 64-bit Message Integrity Code (MIC), and can then craft whatever packet it wants. The new packet is coded with the proper checksums and passed along to the access point, which should accept it as genuine. Dragos Ruiu, organizer of the PacSec security conference where the first WPA hack was demonstrated told IDGNews, “They took this stuff which was fairly theoretical and they’ve made it much more practical.”

Both attacks work only on WPA systems that use the TKIP algorithm. The new attack does not work on newer WPA2 devices or on WPA systems that use the stronger Advanced Encryption Standard (AES) algorithm. Kelly Davis-Felner, marketing director with the Wi-Fi Alliance, said that people should now use WPA2. She told IDGNews, WPA with TKIP “was developed as kind of an interim encryption method as Wi-Fi security was evolving several years ago.”

Enterprise Wi-Fi networks typically include security software that would detect the type of man-in-the-middle attack described by the Japanese researchers, Robert Graham, CEO of Errata Security told ars technica. He continues, the development of the first really practical attack against WPA should give people a reason to dump WPA with TKIP, he said. “It’s not as bad as WEP, but it’s also certainly bad.”

rb-

This is only an issue if the WLAN is secured at all.  Motorola published a report in April 2009  that says 64% of companies are neglecting WLAN security. The report claims that only 47% of companies are using Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA) encryption on their wireless networks.

These attacks highlight the weaknesses of TKIP-based WLAN encryption. WPA TKIP was developed to fix the worst of the security holes in the first Wi-Fi encryption protocol, WEP. WI-Fi-certified products have had to support WPA2 since March 2006 . Users should move to AES-CCMP which requires WPA2 Personal for home and small office networks or WPA2 Enterprise for larger networks.

Using AES-CCMP may require that some network equipment installed before 2003 be reviewed as AES supports key lengths up to 256 bits, which may not be compatible with older hardware. Any remaining equipment of this vintage may need to be upgraded to newer Wi-Fi adapters, switched to Ethernet only, or retired. WPA2 has not shown any vulnerabilities to date. There is no real good reason to try to secure your WLAN with WPA-TKIP anymore.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.