{"id":85702,"date":"2018-03-24T12:37:21","date_gmt":"2018-03-24T16:37:21","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-09-19T12:48:08","modified_gmt":"2022-09-19T16:48:08","slug":"will-wi-fi-be-secure-this-time","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/will-wi-fi-be-secure-this-time\/","title":{"rendered":"Will Wi-Fi Be Secure This Time"},"content":{"rendered":"<p><a href=\"https:\/\/cio.ucop.edu\/stop-think-connect-partnership-for-systemwide-information-security-awareness\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Will Wi-Fi Be Secure This Time\" src=\"https:\/\/i0.wp.com\/cio.ucop.edu\/wp-content\/uploads\/2018\/03\/STOP-THINK-CONNECT-MAN.png?resize=188%2C75&#038;ssl=1\" alt=\"Will Wi-Fi Be Secure This Time\" width=\"188\" height=\"75\" \/><\/a>One event at <strong><a href=\"https:\/\/www.ces.tech\/\" target=\"_blank\" rel=\"noopener noreferrer\">CES 2018<\/a><\/strong> that was overlooked\u00a0by many people was the <strong><a href=\"https:\/\/www.wi-fi.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wi-Fi Alliance<\/a><\/strong> <a href=\"https:\/\/www.wi-fi.org\/news-events\/newsroom\/wi-fi-alliance-introduces-security-enhancements\" target=\"_blank\" rel=\"noopener noreferrer\">announcement<\/a> of <strong>WPA3<\/strong>, a long overdue <strong>update to Wi-Fi Protected Access<\/strong> (WPA). This increases the strength of a security protocol that hasn\u2019t been updated in 14 years.<\/p>\n<p><a href=\"https:\/\/www.wi-fi.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-115870 size-thumbnail\" title=\"Wi-Fi Alliance\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wifi_icon-7.jpg?resize=75%2C47&#038;ssl=1\" alt=\"Wi-Fi Alliance\" width=\"75\" height=\"47\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wifi_icon-7.jpg?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wifi_icon-7.jpg?w=124&amp;ssl=1 124w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>The Wi-Fi Alliance says Wi-Fi carries more than half of the internet\u2019s traffic, so improvements to WPA are\u00a0<strong>good news<\/strong>. The WPA3 update is a response to the evolution of Wi-Fi usage and WPA2 vulnerabilities. There are <strong>four improvements<\/strong> to <a href=\"http:\/\/searchmobilecomputing.techtarget.com\/definition\/Wi-Fi-Protected-Access\" target=\"_blank\" rel=\"noopener noreferrer\">Wi-Fi Protected Access<\/a> via WPA3 over the current standard (WPA2).<\/p>\n<h3>Stronger passwords<\/h3>\n<p>WPA3 gets a new layer of protection so its security is not contingent on passwords (<em>as followers of the <\/em><a href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Bach Seat<\/em><\/a><em> know, <\/em><a href=\"https:\/\/wp.me\/p2wgaW-t6d\" target=\"_blank\" rel=\"noopener\"><em>passwords suck<\/em><\/a>). WPA3 is an improvement on WPA2\u2019s largest vulnerability the handshake when the key is being exchanged. <a href=\"https:\/\/www.howtogeek.com\/329671\/your-wi-fi-network-is-vulnerable-how-to-protect-yourself-against-krack\/\" target=\"_blank\" rel=\"noopener noreferrer\">KRACK<\/a> (<strong>K<\/strong>ey <strong>R<\/strong>einstallation <strong>A<\/strong>tta<strong>ck<\/strong>) is a major vulnerability discovered in 2017 in WPA2 and WPA. It exploits the Wi-Fi handshake. <a href=\"https:\/\/www.krackattacks.com\/?_ga=2.182670950.1957743772.1508163997-2044333671.1507156536\" target=\"_blank\" rel=\"noopener noreferrer\">KRACK<\/a> allows attackers to snoop on encrypted data being transferred between computers and wireless access points (WAP).<\/p>\n<p><a href=\"https:\/\/www.electronicdesign.com\/technologies\/embedded-revolution\/article\/21805719\/wpa2-krack-why-security-in-depth-matters\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-115868 size-medium\" title=\"WPA2 uses a four-way handshake mechanism, starting with a nonce provided by the access point.\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wpa2_4way.png?resize=134%2C150&#038;ssl=1\" alt=\"WPA2 uses a four-way handshake mechanism, starting with a nonce provided by the access point.\" width=\"134\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wpa2_4way.png?resize=134%2C150&amp;ssl=1 134w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wpa2_4way.png?resize=67%2C75&amp;ssl=1 67w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wpa2_4way.png?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 134px) 100vw, 134px\" \/><\/a>Brute force \u201c<a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/dictionary-attack\" target=\"_blank\" rel=\"noopener noreferrer\">dictionary attacks<\/a>&#8221; are the backbone of the KRACK attack. WPA3 implements <a href=\"https:\/\/www.ieee.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">IEEE<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/IEEE_802.11s\" target=\"_blank\" rel=\"noopener noreferrer\">802.11s<\/a>, Simultaneous Authentication of Equals (SAE) to provide protection against this flaw. SAE is also known as the Dragonfly protocol. The\u00a0<a href=\"https:\/\/tools.ietf.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Internet Engineering Task Force<\/a> (IETF) describes\u00a0<a href=\"https:\/\/tools.ietf.org\/html\/rfc7664\" target=\"_blank\" rel=\"noopener noreferrer\">Dragonfly,<\/a>\u201c <em>employs discrete logarithm cryptography to perform an efficient exchange in a way that performs mutual authentication using a password that is probably resistant to an offline dictionary attack.<\/em>\u201d<\/p>\n<p>This improvement will offer better security even if <strong>poor passwords<\/strong> are used. This feature is very useful since we know that users have <a href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/25-most-used-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">difficulties creating<\/a>\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2013\/07\/17\/how-to-create-strong-passwords-without-driving-yourself-mad\/\" target=\"_blank\" rel=\"noopener noreferrer\">strong and hard-to-guess passwords<\/a>. The Wi-Fi Alliance claims WPA3 makes it almost impossible to breach a Wi-Fi network using the current dictionary and brute-force attacks. \u00a0Mathy Vanhoef, the security researcher who discovered KRACK, appears <a href=\"https:\/\/twitter.com\/vanhoefm\/status\/950398187830988801\" target=\"_blank\" rel=\"noopener noreferrer\">very enthusiastic<\/a>\u00a0about the security improvements in WPA3.<\/p>\n<h3>Secure public Wi-Fi<\/h3>\n<p><a href=\"https:\/\/andersontech.com\/wireless-security-vulnerable-network\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Secure public Wi-Fi\" src=\"https:\/\/i0.wp.com\/andersontech.com\/wp-content\/uploads\/2016\/09\/WirelessSecurity.jpg?resize=96%2C88&#038;ssl=1\" alt=\"Secure public Wi-Fi\" width=\"96\" height=\"88\" \/><\/a>WPA3 secured open networks will offer more privacy than ever before. Everything transmitted over today&#8217;s open Wi-Fi networks at airports, coffee shop, libraries, are sent in plain text\u00a0<a href=\"https:\/\/www.howtogeek.com\/219384\/how-to-avoid-snooping-on-hotel-wi-fi-and-other-public-networks\/\" target=\"_blank\" rel=\"noopener noreferrer\">that people can intercept<\/a>. WPA3 will apply <strong>encryption<\/strong> to each user on the public Wi-Fi to eliminate clear text with \u201c<strong>individualized data encryption<\/strong>\u201d.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Malwarebytes Lab<\/a> <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/01\/wpa3-will-secure-wi-fi-connections-in-four-significant-ways-in-2018\/\" target=\"_blank\" rel=\"noopener noreferrer\">speculates<\/a> that WPA3 will include\u00a0<strong><a href=\"https:\/\/tools.ietf.org\/html\/rfc8110\" target=\"_blank\" rel=\"noopener noreferrer\">Opportunistic Wireless Encryption<\/a><\/strong>. OWE enables connection on an open network without a shared and public <a href=\"https:\/\/www.techopedia.com\/definition\/22921\/wi-fi-protected-access-pre-shared-key-wpa-psk\" target=\"_blank\" rel=\"noopener noreferrer\">Pre-Shared Key<\/a> (PSK).\u00a0That\u2019s important because a PSK can give hackers easy access to the Traffic Encryption Keys (TEKs), allowing them access to a data stream. OWE implements a <a href=\"https:\/\/www.khanacademy.org\/computing\/computer-science\/cryptography\/modern-crypt\/v\/diffie-hellman-key-exchange-part-2\" target=\"_blank\" rel=\"noopener noreferrer\">Diffie-Hellman key exchange<\/a> during network sign-on and uses the resulting <strong>secret for the 4-way 802.11 handshake<\/strong> and not the shared, public Pre-Shared Key (PSK) that can be easily exploited. WPA3 will be more difficult for people to snoop on your web browsing without actually cracking the encryption while you\u2019re at <a href=\"http:\/\/www.bbc.com\/news\/technology-42338754\" target=\"_blank\" rel=\"noopener noreferrer\">Starbucks<\/a>.<\/p>\n<h3>Stronger encryption<\/h3>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-116539\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Data_Encryption-3.png?resize=150%2C85&#038;ssl=1\" alt=\"\" width=\"150\" height=\"85\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Data_Encryption-3.png?resize=150%2C85&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Data_Encryption-3.png?resize=75%2C43&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Data_Encryption-3.png?w=253&amp;ssl=1 253w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n<p>WPA3 will use stronger cryptographic algorithms. The new security protocol will use the\u00a0 Commercial National Security Algorithm (CNSA) <strong>192-bit encryption<\/strong> mandated by the U.S. government for secure Wi-Fi networks. Experts speculate WPA3 will use a 48-bit initialization vector to support backward compatibility with WPA and WPA2\u00a0 The 192-bit encryption will make WPA3 compliant with the highest security standards and fit for use in networks with the most stringent security requirements. (<em><strong>rb-<\/strong> Ironic &#8211; Go to the CNSA site and get an invalid cert warning in Chrome<\/em>) The <a href=\"https:\/\/en.wikipedia.org\/wiki\/Committee_on_National_Security_Systems\" target=\"_blank\" rel=\"noopener noreferrer\">CNSS<\/a> is part of the US <strong>National Security Agency<\/strong>.<\/p>\n<h3>Easier IoT security<\/h3>\n<p>The WPA3 update simplifies setting up secure Wi-Fi connections for devices that don\u2019t have a graphical user interface. This is critical the <strong>secure the <a href=\"https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/\" target=\"_blank\" rel=\"noopener noreferrer\">30.7 billion IoT devices<\/a><\/strong> that will be on the network by 2020. The new protocol will add <strong><a href=\"https:\/\/web.archive.org\/web\/20210218161656\/https:\/\/www.wi-fi.org\/downloads-registered-guest\/Device_Provisioning_Protocol_Draft_Technical_Specification_Package_v0_0_23_0.zip\/31255\" target=\"_blank\" rel=\"noopener noreferrer\">Device Provisioning Protocol<\/a><\/strong> (DPP) which sets up a simple, secure and consistent method for securing devices with limited or no display. <em><a href=\"https:\/\/www.networkworld.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">NetworkWorld<\/a><\/em> <a href=\"https:\/\/web.archive.org\/web\/20180518115141\/https:\/\/www.networkworld.com\/article\/3247658\/wi-fi\/wi-fi-alliance-announces-wpa3-to-secure-modern-networks.html\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that You will be able to tap a smartphone against a device or sensor and then provision the device on\u00a0the network.<\/p>\n<h3>What happens to WPA2 devices<\/h3>\n<p>So far, most manufacturers have been quiet about legacy device support. We do know that future W-Fi certified WPA3 routers will be backward compatible to support WPA2. The question remains whether current WPA2 devices will be capable of connecting to WPA3.<\/p>\n<p><strong>WPA2 devices are not immediately obsolete<\/strong>. The Wi-Fi Alliance explained that current WPA2 devices will be able to connect with WPA3 hardware.\u00a0The Alliance also announced that it will continue to do security tests on WPA2 to further protect wireless networks. WPA3 is not an immediate replacement for WPA2<\/p>\n<p><a href=\"https:\/\/www.denverdumpsterrentals.com\/blog\/2014\/09\/can-you-throw-a-copier-in-your-dumpster-rental\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright \" src=\"https:\/\/i0.wp.com\/www.denverdumpsterrentals.com\/wp-content\/uploads\/48398351.jpg?resize=72%2C90&#038;ssl=1\" width=\"72\" height=\"90\" \/><\/a>Even after you get a WPA3 enabled router, you\u2019ll need <strong>WPA3 compatible client devices<\/strong>\u2014your laptop, phone, <a href=\"https:\/\/www.homedepot.com\/b\/Smart-Home-Smart-Appliances-Smart-Refrigerators\/N-5yc1vZch9h\" target=\"_blank\" rel=\"noopener noreferrer\">refrigerator<\/a>, <a href=\"https:\/\/www.cctvcameraworld.com\/wireless-ip-cameras.html\" target=\"_blank\" rel=\"noopener noreferrer\">security camera,<\/a>\u00a0<a href=\"https:\/\/www.monnit.com\/Product\/MNS-9-WF-TS-ST\" target=\"_blank\" rel=\"noopener noreferrer\">industrial temperature sensor<\/a>,\u00a0or <a href=\"https:\/\/www.wired.co.uk\/article\/strangest-internet-of-things-devices\" target=\"_blank\" rel=\"noopener noreferrer\">anything<\/a> that connects to Wi-Fi\u2014to fully take advantage of the WPA3 features. The good news is that shiny new router will accept both WPA2 and WPA3 connections at the same time.<\/p>\n<p>Even when WPA3 is widespread, expect a <strong>long transition period<\/strong> where some devices are connecting to your router with WPA2 and others are connecting with WPA3.\u00a0Once all your devices support WPA3, you should disable WPA2 connectivity on your router to improve security.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>I am suspicious about the NSA link to the new WPA3 encryption. The <a href=\"https:\/\/www.reuters.com\/article\/us-usa-security-rsa\/exclusive-secret-contract-tied-nsa-and-security-industry-pioneer-idUSBRE9BJ1C220131220\" target=\"_blank\" rel=\"noopener noreferrer\">NSA has introduced weaknesses<\/a> in other encryption protocols.<\/em><\/p>\n<p><em> Until we get our hands on real hardware, it is safe to speculate that like all things Wi-Fi, backward compatibility will cost your performance. What will the impact of one legacy device have on the capabilities of the WAP? Have a pair and turn off 802.11, 802.11b, WEP, and WPA connections on your current router.<\/em><\/p>\n<p><em>It&#8217;s about time to update WPA. But as the 802.11n process proved, if you want to get nothing done, turn it over to an industry consortium. <a href=\"https:\/\/web.archive.org\/web\/20230924110632\/https:\/\/www.networkworld.com\/author\/Andy-Patrizio\/\" target=\"_blank\" rel=\"noopener noreferrer\">Andy Patrizio<\/a> at <a href=\"https:\/\/www.networkworld.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">NetworkWorld<\/a> <a href=\"https:\/\/web.archive.org\/web\/20180518115141\/https:\/\/www.networkworld.com\/article\/3247658\/wi-fi\/wi-fi-alliance-announces-wpa3-to-secure-modern-networks.html\" target=\"_blank\" rel=\"noopener noreferrer\">explained<\/a>\u00a0that\u2019s where standards go to die because everyone wants their IP used so they make money off every sale. The end result is nothing gets done.<\/em><\/p>\n<p><strong>Related article<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.information-age.com\/front-line-cyber-security-mobility-123471096\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The new front line of cyber security is mobility<\/a>\u00a0<a href=\"https:\/\/www.information-age.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">(Information Age)<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New WPA3 will give better security to Wi-Fi networks with four improvements to Wi-Fi Protected Access via WPA3 over the current standard (WPA2).<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3046,3008,3007,3006,824,76,1824,944,3005,2541,4,2496,579,1512,3004],"class_list":["post-85702","post","type-post","status-publish","format-standard","hentry","category-security","tag-3046","tag-802-11s","tag-cnsa","tag-diffie-hellman","tag-encryption","tag-ieee","tag-ietf","tag-iot","tag-krack","tag-passwords","tag-security","tag-tla","tag-wi-fi-2","tag-wi-fi-alliance","tag-wpa-3"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/85702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=85702"}],"version-history":[{"count":15,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/85702\/revisions"}],"predecessor-version":[{"id":130244,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/85702\/revisions\/130244"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=85702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=85702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=85702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}