Hole 196 WPA2 Vulnerability - Who Cares?


Network Apple afresh acquaint an commodity advertence that a researcher at Air Tight Aegis activate a vulnerability in WPA2 Enterprise encryption. They are apropos to the vulnerability as aperture 196 because the vulnerability was apparent on page 196 of the 802.11 IEEE standard. Keep in apperception that WPA2 is admired as the a lot of defended Wireless encryption adjustment accessible today. So this is big, big news. Right? Well, maybe not.

If you apprehend the abstracts of the exploit, you acquisition out that in adjustment for the it to work, the bad guy have to be accurate and accustomed on the WPA2 arrangement to activate with. Already authorized, the user can again use exploits to break and/or inject awful packets into added users "secure" wireless traffic. So the getting have to aboriginal be accurate which agency you have to assurance them at atomic a little bit. The added affair is that, WPA2 was never absolutely meant to be the end-all, be all in encryption. People lose afterimage of why it's around.

These types of wireless aegis exploits accomplish for acceptable account because they get business managers all in a agitation because they don't accept what WPA2 and all wireless encryption methods are for. Wireless encryption is implemented so the wireless affiliation from your end accessory (laptop, iPad, etc) is AS defended as a active connection. Up until now, the wireless allotment of a WPA2 affiliation was far MORE secure. Remember, already the abstracts is dumped off assimilate a active connection, the all-inclusive majority of the time active cartage is not encrypted at the arrangement akin unless you are tunneling it appliance something like IPSec or GRE. So with this new vulnerability, your centralized users can possibly detect and dispense traffic...just like they can now on your active connection. Is this new vulnerability a problem? Well, it's not good, but it's aswell no the end of the apple like some will acquaint you.

This array of affair happens generally with arrangement engineers. Generally times if I sit in architecture meetings, the affair of end-to-end encryption comes up for an appliance that runs in clear-text over the network. Everyone wants crazy-complex point-to-point encryption solutions to be congenital for their applications at the arrangement level. My acknowledgment has consistently been, "If you wish deeply encrypted applications, why don't you attending at securing the applications? Have your applications developers anytime heard of SSH or SSL?". The point being, don't focus on encryption methods such as WPA2 to "secure" your data. Defended the abstracts at the appliance akin aboriginal and again we'll talk.

  • Spread The Love
  • Digg This Post
  • Tweet This Post
  • Stumble This Post
  • Submit This Post To Delicious
  • Submit This Post To Reddit
  • Submit This Post To Mixx

0 Response to “Hole 196 WPA2 Vulnerability - Who Cares?”

Leave a Reply

 
Converted by Ritesh Sanap | Sponsored by Downloaddeck.com Powered by Giant Themes