Posted: Mon Oct 16, 2017 17:59 Post subject: Re: So, normal user here...
mattlward wrote:
Can I patch my router and access points or will they need to be 30/30/30'ed and reloaded?
I am running TP-Link and Dlink DIR-625's.
Thanks
First, wait for Brainslayer or Kong to compile a suitable build, then if you have a Broadcom device, it does not need 30/30/30 after installing the initial DD-WRT build (it does need it if it is new to DD-WRT). _________________ 2 times APU2 Opnsense 21.1 with Sensei
2 times RT-AC56U running DD-WRT 45493 (one as Gateway, the other as AP, both bridged with LAN cable)
3 times Asus RT-N16 shelved
E4200 V1 running freshtomato 2020.8 (bridged with LAN cable)
3 times Linksys WRT610N V2 converted to E3000 and 1 original E3000 running freshtomato 2020.8 (bridged with LAN cable)
Anything newer than 10/10/2017 should contain the fix.
Then you have to find the folder for your device. _________________ Router Model: Netgear R8000
Firmware: DD-WRT v3.0-r41813 std (12/29/19)
Modem: Super Hub 3.0
ISP: Virgin Media 350/35 Mbps
Seems like for now the only option is to disable WPA2 Personal and maybe use WPA2 Enterprise.
WPA2 is still the best we have, and if you're using AES, it's "just" a lack of confidentiality in that some packets can be decrypted.
Treat every wireless network as hostile (as always) and encrypt all communications like everybody is watching.
I flashed my Netgear WNR3500L v2 some time ago, but I forgot how it works.
I want to flash the latest firmware from within the webadmin due to this security thing. Browsing the FTP for my router i only find a .chk. Don't I need a .bin to flash?
If I read it correctly, they are suggesting all the rekeying and encryption stuff is done by the chip firmware (not dd-wrt)? (At the very least in the case of the hardware they are discussing on that ticket.)
It would be reassuring to hear from someone in the know regarding this issue - considering the scope and severity of this vulnerability.
Posted: Tue Oct 17, 2017 4:51 Post subject: Re: Krack CVE
patsun wrote:
Isn't it just an assumption that the latest dd-wrt build includes an update to address this vulnerability at this time?
No, it is not an assumption, it is patching the vulnerable binaries a short time after KRACK has gone public. If you understand programming, see http://svn.dd-wrt.com/changeset/33525
So far as the router goes, it is patched in Kong's latest test firmware. You also have to patch the clients (Apple and Microsoft already did this, Google needs a few weeks for Nexus, Pixel and AOSP). Lineage OS builds from 17 October or later are patched. _________________ 2 times APU2 Opnsense 21.1 with Sensei
2 times RT-AC56U running DD-WRT 45493 (one as Gateway, the other as AP, both bridged with LAN cable)
3 times Asus RT-N16 shelved
E4200 V1 running freshtomato 2020.8 (bridged with LAN cable)
3 times Linksys WRT610N V2 converted to E3000 and 1 original E3000 running freshtomato 2020.8 (bridged with LAN cable)
I guess ATM BS needs a truck of cigarettes and a tanker of beer
Am I right telling we just need to update only routers running in client or repeater mode (refraining to switch unpatched ones from AP to above modes) ?
[EDIT]: I said sillyness : 33525 is rolled out Thank you BS _________________ ): FoReVeR nEwB
Yeah, my understanding is that the vulnerability only affects a router operating in client/repeater mode. If it is just a straight AP then he patch is pretty useless.