Linksys WRT1200ACv2 can't secure Wifi

Post new topic   Reply to topic    DD-WRT Forum Index -> Marvell MVEBU based Hardware (WRT1900AC etc.)
Goto page Previous  1, 2, 3, 4, 5, 6  Next
Author Message
JediMaster666
DD-WRT User


Joined: 04 Apr 2017
Posts: 56

PostPosted: Thu Jun 23, 2022 20:55    Post subject: Reply with quote
the-joker wrote:
Im not entirely sure what you expect to achieve here by checking those boxes


I didn't check the boxes. They were already checked. I only went through the trouble of looking and making the screenshot because Monza was nice to me.
Sponsor
the-joker
DD-WRT Developer/Maintainer


Joined: 31 Jul 2021
Posts: 2146
Location: All over YOUR webs

PostPosted: Thu Jun 23, 2022 21:16    Post subject: Reply with quote
Yes, but checked to what, to allow or deny? If deny once applied and filter is enabled the machines are unable to connect, if allow only those machines can connect to router, my screenshot is whitelisting, so they can connect anyone else with authorized macs cannot, unless they spook one of my macs and force a disconnect from my AP so they can connect intead with a spoofed MAC.

I assure you both work. Not much of a security feature since it can be bypassed with some sweat.

_________________
Saving your retinas from the burn!🔥
DD-WRT Inspired themes for routers
DD-WRT Inspired themes for the phpBB Forum
DD-WRT Inspired themes for the SVN Trac & FTP site
Join in for a chat @ #style_it_themes_public:matrix.org or #style_it_themes:discord

DD-WRT UI Themes Bug Reporting and Discussion thread

Router: ANus RT-AC68U E1 (recognized as C1)
JediMaster666
DD-WRT User


Joined: 04 Apr 2017
Posts: 56

PostPosted: Thu Jun 23, 2022 21:31    Post subject: Reply with quote
the-joker wrote:
I assure you both work.


Please read the thread. I've tested. It does not work.
JediMaster666
DD-WRT User


Joined: 04 Apr 2017
Posts: 56

PostPosted: Thu Jun 23, 2022 23:06    Post subject: Reply with quote
ho1Aetoo wrote:
It is true that you can prevent the router from broadcasting the SSID but your clients are still broadcasting the SSID. Smile


I created a diagram that I get the feeling I'm going to be using a lot.

This illustrates the 3 things cracking software needs to get right to be able to penetrate this security scheme. The area in red we all agree there is no stopping. It may even be true that if this diagram were scaled by the amount of existing software and it's capabilities, the red area might be the largest piece. We can never truly know how much functional cracking software exists or what all it can do. The objections coming my way seem to be over the size of the slices.

Let's also take what we know as members of this forum into consideration. By the way people have been confronting me, I think we all agree the users are idiots. As members of this forum we can also see that the combination of these technologies cause complications from both a coding and administrative standpoint. We can argue about the size of the slices, but you cannot argue with evidence you see whenever you log in here.

With all of this in mind, there is also my personal situation to consider. Where I live, there are literally hundreds of ssids being broadcast. Those are just the ones I see when I passively scan. Now keep in mind that I'm the only adult for 5 blocks who knows that a MAC address isn't where to find McDonald's. All of my attacks will be from uninformed attackers trying to find a way to connect to their russian minecraft server, watch porn, or whatever.

My plan is to make myself only vulnerable in the red zone. I want someone to have to go through as much bullshit to break it as I have been going through to try and get it to work for the past year. Even if they have the tools for the red zone, I can still count on plenty of user error. I can also count on plenty of other signals being easier to get into. I don't think that's unreasonable.

I have enough know how to get whatever information you need. I have SSH and NAS. I can put in a dummy configuration and send you anything you need. What do you need so I can help you get this to work?
BrainSlayer
Site Admin


Joined: 06 Jun 2006
Posts: 7492
Location: Dresden, Germany

PostPosted: Fri Jun 24, 2022 9:54    Post subject: Reply with quote
that diagram doesnt help. for me its more important to have a shortlist for "approach" and "whats not working" and your configuration of course. this thread here is too long. i can guarantee that whitelist/blacklist mac filtering works. i can guarantee that wpa/wpa etc. is working. hiding or not hiding ssid works too
_________________
"So you tried to use the computer and it started smoking? Sounds like a Mac to me.." - Louis Rossmann https://www.youtube.com/watch?v=eL_5YDRWqGE&t=60s
the-joker
DD-WRT Developer/Maintainer


Joined: 31 Jul 2021
Posts: 2146
Location: All over YOUR webs

PostPosted: Fri Jun 24, 2022 10:06    Post subject: Reply with quote
I dont know if you ever did any penetration testing, that diagram illustrates what you are trying to achieve and we all understand you. However to the right and left of your red portion (currently white) is all red to me, that diagram is not representing the overlap correctly as the complete attack surface.

If you breach WPA2 and Mac filtering you're done and full access results (MAC filtering is bypassed easily with MAC spoofing and forcing a legitimate client to disconnect and using a spoofed client to connect instead using the key obtained from the effort), you dont need to care about SSID because hidden/not hidden its known either way.

The best way to ensure you're chosen security approach is working is to try hacking it yourself.

As for your claims that MAC filtering doesn't work, to which you should post screenshots so we can help you diagnose.

Your post here https://forum.dd-wrt.com/phpBB2/viewtopic.php?p=1265545#1265545 already points to the fact filtering works, because in that instance the added mac addresses to the list were set to deny/blacklist, so MAC filtering works, hence the machines arent able to connect because they are blacklisted on that example, nothing else makes sense from that perspective.

In any case, what you want is to whitelist your known legit clients, everything else not listed (whitelisted) is by default blacklisted (unless someone spoofs a legit client MAC address which is easy to do)

You dont want to maintain blacklists, its not only time consuming, but its the wrong security approach, you need to blacklist all of the undesired MACs, while you can tell what all your neighbors MACs are you will never account for the drive by/visitor devices. You would end up running out of entries on the blacklist and also nvram space for the settings where they are stored is incredibly limited.

So whitelists are shorter and predictable therefore manageable and easy to maintain.

Your last screenshot is the advanced part (where you manually add/remove specific mac's from the filter), if they are already checked on that dialog means they are part of the list already, nothing else.

The main part after adding MAC to the filter list is important for complete proper setup enabling/disabling of the filters or whitelisting/blacklisting selection.

Which is the portion I showed you on my last screenshot, which is what you need to show us to and then its easy, if whitelisted listed clients, they will connect, everything else not whitelisted is by default blacklisted.

_________________
Saving your retinas from the burn!🔥
DD-WRT Inspired themes for routers
DD-WRT Inspired themes for the phpBB Forum
DD-WRT Inspired themes for the SVN Trac & FTP site
Join in for a chat @ #style_it_themes_public:matrix.org or #style_it_themes:discord

DD-WRT UI Themes Bug Reporting and Discussion thread

Router: ANus RT-AC68U E1 (recognized as C1)
JediMaster666
DD-WRT User


Joined: 04 Apr 2017
Posts: 56

PostPosted: Fri Jun 24, 2022 12:44    Post subject: Reply with quote
BrainSlayer wrote:
that diagram doesnt help. for me its more important to have a shortlist for "approach" and "whats not working" and your configuration of course. this thread here is too long. i can guarantee that whitelist/blacklist mac filtering works. i can guarantee that wpa/wpa etc. is working. hiding or not hiding ssid works too


It does not work. It has not worked for over a year. I have tested. Please read the thread.
JediMaster666
DD-WRT User


Joined: 04 Apr 2017
Posts: 56

PostPosted: Fri Jun 24, 2022 12:56    Post subject: Reply with quote
the-joker wrote:
I dont know if you ever did any penetration testing, that diagram illustrates what you are trying to achieve and we all understand you. However to the right and left of your red portion (currently white) is all red to me, that diagram is not representing the overlap correctly as the complete attack surface.


I'm sorry the simple diagram is too hard for you.

the-joker wrote:
If you breach WPA2 and Mac filtering you're done and full access results (MAC filtering is bypassed easily with MAC spoofing and forcing a legitimate client to disconnect and using a spoofed client to connect instead using the key obtained from the effort), you dont need to care about SSID because hidden/not hidden its known either way.


Finding a target is the first step. Not the last.

the-joker wrote:
As for your claims that MAC filtering doesn't work, to which you should post screenshots so we can help you diagnose.


I did. Please read the thread.

the-joker wrote:
Your post here https://forum.dd-wrt.com/phpBB2/viewtopic.php?p=1265545#1265545 already points to the fact filtering works


What part of "only works when SSID broadcast is on" don't you understand?

the-joker wrote:
In any case, what you want is to whitelist your known legit clients, everything else not listed (whitelisted) is by default blacklisted (unless someone spoofs a legit client MAC address which is easy to do)


I've been using DD-WRT for over 5 years. I know how to use the software. When it works, I can make it work just fine. Please read the thread.

the-joker wrote:
Your last screenshot is the advanced part (where you manually add/remove specific mac's from the filter)


That screenshot was for someone else. Not for you. I already said that. Please read the thread. I know what I'm doing.
ho1Aetoo
DD-WRT Guru


Joined: 19 Feb 2019
Posts: 2976
Location: Germany

PostPosted: Fri Jun 24, 2022 13:01    Post subject: Reply with quote
Well you could post an informative report with screenshtos.

WLAN client = MAC address (screenshot IF settings)

enter the MAC address in the MAC filter (screenshot)

test with "Prevent clients listed from accessing the wireless network" (screenshot)

test with "Permit clients listed to access the wireless network" (screenshot)

And on the screenshots you posted one client has 2 MAC addresses - that can't be possible unless the client has MAC randomization enabled and then the filter doesn't work anyway.
JediMaster666
DD-WRT User


Joined: 04 Apr 2017
Posts: 56

PostPosted: Fri Jun 24, 2022 13:22    Post subject: Reply with quote
ho1Aetoo wrote:
Well you could post an informative report with screenshtos.

WLAN client = MAC address (screenshot IF settings)

enter the MAC address in the MAC filter (screenshot)


You don't need to see my mac addresses. Posting them to the internet is a security risk. I've already demonstrated I know how to make it works when it works by using firmware where it has worked and by didling around with the newest firmware.

Edit2: I made sure the SSIDs and MAC addresses matched when I started this little escapade and just double checked. They're fine.

ho1Aetoo wrote:
test with "Prevent clients listed from accessing the wireless network" (screenshot)


I'm not blacklisting. I'm whitelisting.

ho1Aetoo wrote:
test with "Permit clients listed to access the wireless network" (screenshot)


What screenshots are going to help? I've already proven I know how to use this function. Do you really think I went through all of this and don't know how to use a radio button?

ho1Aetoo wrote:
And on the screenshots you posted one client has 2 MAC addresses - that can't be possible unless the client has MAC randomization enabled and then the filter doesn't work anyway.


That's a list of recognized clients. 2 are connected. One is disconnected. Even with filtering off, that table still functions.

edit: I see what you're talking about. I have a 4th device that never got an IP because it's not compatible with SHA256.
the-joker
DD-WRT Developer/Maintainer


Joined: 31 Jul 2021
Posts: 2146
Location: All over YOUR webs

PostPosted: Fri Jun 24, 2022 14:26    Post subject: Reply with quote
Im now, unsubscribing from this thread, as its already dangerously close to stomping on forum rules.

Which I will monitor and if such occurs it will be dealt with, I will sort of ignore the rudeness implied and dismiss it as frustration from part of the OP.

No reply necessary.

_________________
Saving your retinas from the burn!🔥
DD-WRT Inspired themes for routers
DD-WRT Inspired themes for the phpBB Forum
DD-WRT Inspired themes for the SVN Trac & FTP site
Join in for a chat @ #style_it_themes_public:matrix.org or #style_it_themes:discord

DD-WRT UI Themes Bug Reporting and Discussion thread

Router: ANus RT-AC68U E1 (recognized as C1)
ho1Aetoo
DD-WRT Guru


Joined: 19 Feb 2019
Posts: 2976
Location: Germany

PostPosted: Fri Jun 24, 2022 15:40    Post subject: Reply with quote
@JediMaster666

But surely something we have to see otherwise the screenshots are useless.

If you post a bug report then it is actually also part of it to provide comprehensible information.

Well, MAC filtering works for me as it should - I tested it briefly earlier.

I can't understand your described problem - this will be because you didn't post any usable settings and because I have another router - I don't know.

But since you apparently do not want to cooperate - well, I also have other things to do.

By the way, not all digits of the MAC address are individual, the first 6 digits are usually the manufacturer code (OUI Organizationally unique identifier).
Millions of devices have this code *yawn
kernel-panic69
DD-WRT Guru


Joined: 08 May 2018
Posts: 14221
Location: Texas, USA

PostPosted: Fri Jun 24, 2022 17:29    Post subject: Reply with quote
From and email discussion about this with the developer:
kernel-panic69 wrote:
I just read your comment and the comments after and it's like talking to a brick wall as we say here.
The mechanisms work as advertised, although there may be some misunderstanding of how multiple
authentication configurations work or do not work with mixed clients (?). The expectation is to have
multiple WPA settings enabled (WPA2 Personal and WPA2 Personal with SHA256 and it to work with
all clients. Without looking deeper, I guess the question for my own sake is, "do we choose the lowest
compatible setting or the highest compatible setting since it also provides everything lower than it?" ...
meaning, if WPA3 Personal is selected, will WPA2 Personal and WPA2 Personal with SHA256 also be
able to connect? Maybe a better explanation would help - I would have to see if the in-firmware help
file has been updated, but I do know there are known misconfigurations (TKIP with AES, for example).

BrainSlayer wrote:
thats not the case. you can setup multiple concurrent algorithms yes. but alot of clients do not like that. ios / iphone for instance.
i tested once wpa3 psk and wpa2 psk. did not work for alot of devices, where wpa2 works, but wpa3 psk did not.
especially if a end device does not support a crypto algorithm it may not work if its just involved as offering in the setup, even if this is absolutelly a client device bug we cannot fix that

General rule of thumb: use the settings that work with all clients.

_________________
"Life is but a fleeting moment, a vapor that vanishes quickly; All is vanity"
Contribute To DD-WRT
Pogo - A minimal level of ability is expected and needed...
DD-WRT Releases 2023 (PolitePol)
DD-WRT Releases 2023 (RSS Everything)

----------------------
Linux User #377467 counter.li.org / linuxcounter.net
ho1Aetoo
DD-WRT Guru


Joined: 19 Feb 2019
Posts: 2976
Location: Germany

PostPosted: Fri Jun 24, 2022 17:47    Post subject: Reply with quote
Well, you can mix the settings.
WPA3 has a transition mode (WPA3+WPA2) according to the spec.
But this is a relatively pointless setting.

The transition mode is not more secure than WPA2 alone.
It is logical if WPA2 is available then also with the typical WPA2 vulnerabilities.

And we say in the forum for a long time that you should not mix the settings - because it can cause additional problems with various clients.

see

Quote:
Table of contents

2.3 WPA3-Personal transition mode


Last edited by ho1Aetoo on Fri Jun 24, 2022 18:13; edited 2 times in total
kernel-panic69
DD-WRT Guru


Joined: 08 May 2018
Posts: 14221
Location: Texas, USA

PostPosted: Fri Jun 24, 2022 18:09    Post subject: Reply with quote
I was just giving examples in the email for the sake of getting an answer that I already expected. I have not tested WPA2 Personal and WPA2 Personal with SHA-256 being enabled at the same time. I have a feeling that the latter requires something that is not CCMP-128 (AES) for algorithm. But there is always a possibility that the correct algorithm selected for WPA2 Personal with SHA-256 will also cause problematic clients to balk and refuse to connect.
_________________
"Life is but a fleeting moment, a vapor that vanishes quickly; All is vanity"
Contribute To DD-WRT
Pogo - A minimal level of ability is expected and needed...
DD-WRT Releases 2023 (PolitePol)
DD-WRT Releases 2023 (RSS Everything)

----------------------
Linux User #377467 counter.li.org / linuxcounter.net
Goto page Previous  1, 2, 3, 4, 5, 6  Next Display posts from previous:    Page 5 of 6
Post new topic   Reply to topic    DD-WRT Forum Index -> Marvell MVEBU based Hardware (WRT1900AC etc.) All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum