Re: [Discuss] comcast wifi question

2014-11-12 Thread Edward Ned Harvey (blu)
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss- bounces+blu=nedharvey@blu.org] On Behalf Of Bill Ricker On Tue, Nov 11, 2014 at 6:50 PM, Richard Pieri richard.pi...@gmail.com wrote: Nutshell version: pinning is what SSH has been doing with host keys since the get-go.

Re: [Discuss] comcast wifi question

2014-11-12 Thread Richard Pieri
On 11/12/2014 12:02 AM, Bill Ricker wrote: ( Can't imagine why this wasn't done day 1 for HTTPS also unless they thought the initial set of CAs would have indefinite oligopoly. ) Simple: Netscape designed SSL to be easily compromised by federal authorities. They did it that way instead of

Re: [Discuss] comcast wifi question

2014-11-11 Thread Richard Pieri
For example: http://arstechnica.com/security/2014/11/darkhotel-uses-bogus-crypto-certificates-to-snare-wi-fi-connected-execs/ -- Rich P. ___ Discuss mailing list Discuss@blu.org http://lists.blu.org/mailman/listinfo/discuss

Re: [Discuss] comcast wifi question

2014-11-11 Thread Richard Pieri
On 11/8/2014 7:57 PM, Bill Ricker wrote: ​Then time to read up on Certificate Pinning (really CA pinning). https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinning Nutshell version: pinning is what SSH has been doing with host keys since the get-go. -- Rich P.

Re: [Discuss] comcast wifi question

2014-11-11 Thread Bill Ricker
On Tue, Nov 11, 2014 at 6:50 PM, Richard Pieri richard.pi...@gmail.com wrote: Nutshell version: pinning is what SSH has been doing with host keys since the get-go. Yes, that. ( Can't imagine why this wasn't done day 1 for HTTPS also unless they thought the initial set of CAs would have

Re: [Discuss] comcast wifi question

2014-11-08 Thread Edward Ned Harvey (blu)
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss- bounces+blu=nedharvey@blu.org] On Behalf Of Edward Ned Harvey (blu) Additionally, if you get on the network and want to attack another client on the same wifi connection, there's an awful lot of broadcast traffic exposure

Re: [Discuss] comcast wifi question

2014-11-08 Thread Richard Pieri
On 11/8/2014 5:29 PM, Edward Ned Harvey (blu) wrote: If you don't have the password to some network, the key is derived using pbkdf2 with 4096 iterations. This means a single cpu core can guess around 36 guesses per second. Pyrit w/ coWPAtty on a dual RADEON HD 69xx series can exhaustively

Re: [Discuss] comcast wifi question

2014-11-08 Thread Bill Ricker
On Thu, Nov 6, 2014 at 6:54 PM, Edward Ned Harvey (blu) b...@nedharvey.com wrote: tl;dr - Google HTTPS *is* safe from MITM but *only* with Chrome so far. Rest of HTTPS not as much. I'm not following you here. ​Then time to read up on Certificate Pinning (really CA pinning).

Re: [Discuss] comcast wifi question

2014-11-06 Thread Edward Ned Harvey (blu)
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss- bounces+blu=nedharvey@blu.org] On Behalf Of Eric Chadbourne I've tried two different vpn apps (avast surf easy) and both really sucked. If I have some free time I might try rolling up an openvpn server this weekend.

Re: [Discuss] comcast wifi question

2014-11-06 Thread Bill Ricker
Ned - Your comments on WiFi encryption and Insecurity of DNS are right on. But .. If you're connecting to secure services, then your traffic is secure, even on the unencrypted wifi. Maybe. Maybe not. tl;dr - Google HTTPS *is* safe from MITM but *only* with Chrome so far. Rest of HTTPS not

Re: [Discuss] comcast wifi question

2014-11-06 Thread Eric Chadbourne
So you're concerned about people near you sniffing your wifi traffic. You think wifi encryption will help. You're wrong, because #1 everyone near you knows the password anyway. So even with wifi encryption, they can still sniff your traffic. I do not think that is accurate. Probably nobody

Re: [Discuss] comcast wifi question

2014-11-06 Thread Tom Metro
Edward Ned Harvey (blu) wrote: Eric Chadbourne wrote: Using unencrypted wifi just seems insane. Oh. THAT is what you're concerned about? That's a little bit insane, because nevermind the wifi near you, your traffic goes across the whole internet. ... if you're connecting to insecure

Re: [Discuss] comcast wifi question

2014-11-06 Thread Edward Ned Harvey (blu)
From: Bill Ricker [mailto:bill.n1...@gmail.com] tl;dr - Google HTTPS *is* safe from MITM but *only* with Chrome so far. Rest of HTTPS not as much. I'm not following you here. If the hacker with control of the WiFi AP is working for an organization with control of any of the many Root CA

Re: [Discuss] comcast wifi question

2014-11-06 Thread Edward Ned Harvey (blu)
From: discuss-bounces+blu=nedharvey@blu.org [mailto:discuss- bounces+blu=nedharvey@blu.org] On Behalf Of Eric Chadbourne I do not think that is accurate. Probably nobody around me knows my wifi password. Cracking wifi is hard. Not like it used to be. Try it sometime. In the old

Re: [Discuss] comcast wifi question

2014-11-06 Thread Edward Ned Harvey (blu)
From: Tom Metro [mailto:tmetro+...@gmail.com] WPA-PSK and WPA2-PSK encrypt everything with per-client, per-session keys, but those keys are derived from the Pre-Shared Key (the PSK; the key you have to know to get on the network) plus some information exchanged in the clear when the

Re: [Discuss] comcast wifi question

2014-11-05 Thread Eric Chadbourne
On 11/04/2014 08:01 PM, Richard Pieri wrote: On 11/4/2014 7:40 PM, Eric Chadbourne wrote: How do I really know it's them and how do they really know it's me? I'm scared. Can you make me feel better? ;) SSL certificate are 100% reliable. (read: You don't.) There's nothing to worry about.

[Discuss] comcast wifi question

2014-11-04 Thread Eric Chadbourne
I just signed up for comcast internet with the wifi package. Nice and fast, no complaints. I noticed that if I sign a device into 'xfinitywifi' it stays signed in. For example I sign in at my house in Quincy and while switching trains at Part St I notice I'm still signed in to the

Re: [Discuss] comcast wifi question

2014-11-04 Thread Richard Pieri
On 11/4/2014 7:40 PM, Eric Chadbourne wrote: How do I really know it's them and how do they really know it's me? I'm scared. Can you make me feel better? ;) SSL certificate are 100% reliable. (read: You don't.) There's nothing to worry about. (read: You should be.) Don't worry, be happy.