Re: [Dorset] SSID Hiding

2017-02-06 Thread Terry Coles
On Tuesday, 7 February 2017 07:47:19 GMT Patrick Wigmore wrote:
> MAC address filtering does not really add any security. Before it
> comes into play, the attacker still needs to crack your WPA2
> encryption. If that's within their capability, then they almost
> certainly know how to discover and spoof an authorised MAC
> address by eavesdropping on your network traffic.

A fair point. 

> Determining and spoofing the MAC address and SSID is totally
> feasible.

But probably not by an up and coming geek.  I live on the edge of Corfe 
Mullen, if there are any seasoned, skilled and determined hackers out there, 
then they'll probably get through anyway.

To a certain extent, I agree with you and Ralph on this; some of these 
measures are simply security theatre; the manufacturers want to be seen to be 
doing something.

However, my view is that by using belt, braces *and* safety pins, all but the 
most determined are likely to fall at one hurdle or another.

-- 



Terry Coles

-- 
Next meeting:  Bournemouth, Tuesday, 2017-02-07 20:00
Meets, Mailing list, IRC, LinkedIn, ...  http://dorset.lug.org.uk/
New thread:  mailto:dorset@mailman.lug.org.uk / CHECK IF YOU'RE REPLYING
Reporting bugs well:  http://goo.gl/4Xue / TO THE LIST OR THE AUTHOR

Re: [Dorset] SSID Hiding

2017-02-06 Thread Patrick Wigmore
On Monday, 6 February 2017, at 19:50:24 GMT, Terry Coles wrote:
> I understand what that is saying, but I'm not just relying on
> cloaking; I'm using MAC Adress filtering too (as well as WPA2
> PSK encryption).

MAC address filtering does not really add any security. Before it 
comes into play, the attacker still needs to crack your WPA2 
encryption. If that's within their capability, then they almost 
certainly know how to discover and spoof an authorised MAC 
address by eavesdropping on your network traffic.

> My main reason for using it is to reduce the chances of some
> young up and coming geek from even trying to hack me.

That is interesting to consider. I wonder how the psychology 
works out. Are hidden networks "off the radar", or do they look 
like juicier targets, because somebody is trying to hide them?

I find Ralph's suggestion of choosing a SSID that doesn't stand 
out interesting too. Are attackers even looking for SSIDs that 
stand out?

Some attackers might actually be attracted to default-sounding 
SSIDs, in the hope of finding an easy target with a weak 
password.

But, mind-games aside, at the end of the day you are still just 
relying on the WPA2 encryption. If that's broken, then the other 
measures are just ways to paper over cracks in the dam.


> 'Worse still, because a station must probe for a hidden SSID, a
> fake access point can offer a connection.'
> 
> Correct me if I'm wrong, but wouldn't that fake AP have to
> spoof the MAC Address of my Router or know what the SSID was?

Determining and spoofing the MAC address and SSID is totally 
feasible.

However (and I could be wrong about this -- I was unable to 
verify with a web search), I think WPA2-PSK uses mutual 
authentication of the client and access point. So, your devices 
would not connect to a fake access point unless the fake AP could 
prove that it knew the passphrase for your network. If the 
attacker knows the passphrase, then all bets are off.

-- 
Next meeting:  Bournemouth, Tuesday, 2017-02-07 20:00
Meets, Mailing list, IRC, LinkedIn, ...  http://dorset.lug.org.uk/
New thread:  mailto:dorset@mailman.lug.org.uk / CHECK IF YOU'RE REPLYING
Reporting bugs well:  http://goo.gl/4Xue / TO THE LIST OR THE AUTHOR

Re: [Dorset] SSID Hiding

2017-02-06 Thread Ralph Corderoy
Hi Terry,

> hide the SSID.

You may not want to bother doing this as there are downsides, especially
if you take any of those devices elsewhere.
https://en.wikipedia.org/wiki/Network_cloaking
I just plumped for a SSID that matched the pattern of the majority of my
neighbours so I didn't stand out.

> The wireless connects fine until I hide the SSID and then the
> Transformer reports that there is no Internet and there is no wireless
> symbol in the task bar.

I think I had that in that past, it certainly seems common for Android
according to Google.  Most success seems to come from deleting Android's
entry added when the SSID was beaconed, and then re-entering the details
manually, remembering it's all case sensitive.
http://androidforums.com/threads/connecting-to-wifi-network-with-a-hidden-ssid.123819/#post-7450833

Cheers, Ralph.

-- 
Next meeting:  Bournemouth, Tuesday, 2017-02-07 20:00
Meets, Mailing list, IRC, LinkedIn, ...  http://dorset.lug.org.uk/
New thread:  mailto:dorset@mailman.lug.org.uk / CHECK IF YOU'RE REPLYING
Reporting bugs well:  http://goo.gl/4Xue / TO THE LIST OR THE AUTHOR

[Dorset] SSID Hiding

2017-02-06 Thread Terry Coles
Hi,

I have just installed a shiny new Netgear VSDL Router to replace the never 
updated Plusnet supplied one.

The main reasons that I bought it is that the Plusnet router has the above 
mentioned lack of security patches and the inability to filter on MAC Addresses 
or hide the SSID.

Having set the router up, I find that all of the devices in the house work 
fine, 
except an aging (but frequently used) Asus Transformer.  The wireless connects 
fine until I hide the SSID and then the Transformer reports that there is no 
Internet and there is no wireless symbol in the task bar.  A message then pops 
up stating that wireless networks are available, but needless to say, not my 
hidden ones.

Devices that work include two Android phones, a Chromebook, a Raspberry Pi, 
two Win 10 machines (an old MSI laptop and a new home-brewed gaming desktop), 
a Roku TV box, a Panasonic TV box, a YouView TV box and this Dell Optiplex 
running Kubuntu.

I'm assuming that the problem is the incredibly early version of Android on 
the Transformer, but has anyone got any other ideas?

-- 



Terry Coles

-- 
Next meeting:  Bournemouth, Tuesday, 2017-02-07 20:00
Meets, Mailing list, IRC, LinkedIn, ...  http://dorset.lug.org.uk/
New thread:  mailto:dorset@mailman.lug.org.uk / CHECK IF YOU'RE REPLYING
Reporting bugs well:  http://goo.gl/4Xue / TO THE LIST OR THE AUTHOR