Why is WPA-PSK declared as "medium security" by openwrt despite any protocol using RC4 should be considered vulnerable?

Same for me, so I stick with WPA2 at the moment which should be a secure option specially when also opting in for some additional protection (like 802.11w Management Frame Protection or key reinstallation (KRACK) countermeasures).

But to tell someone to downgrade his WIFI to WPA (with the same weak RC4 cipher base that WEP used btw.) because a device can't speak WPA2?

I would say no way! :stop_sign:

If your device can't connect to a WPA2 AP than just wire that device or replace it with a more recent one (from like the last ~18 years) that supports WPA2 but don't ever downgrade your wifi to WPA or WEP, better than just go with a open network (no encryption) because than there is no doubt about any "security" :unlock:

So I just made a test setup with the "medium security" settings exactly like in the screenshot using a ready made python script which possession could be already a crime in various countries (so I don't bother naming or linking it here) and it took around 80 seconds to have the pre shared key printed in the terminal. Cracking the captured handshake was blazing fast (Cracking WPA Handshake: 100.00% ETA: 0s @ 18711.5kps) and most time consuming is actually the script running and de-authing of the clients (not sure why but the script waits quite a long time before doing that).

Also mentioning that this is probably not the most efficient way - some preferred methods like the PMKID attack were skipped by the script b because missing tools installed on my system.

So should this still really still be called medium security without even checking for a weak key (like it is done already with the router password):question:

I always thought it was naught but a reminder to the user to employ the most secure method capable with his/her situation and equipment. In my user case Open works just fine.

did you try emojis in the password ? :sweat_smile:

I didn't because...

and if you look closely you will see that the key field :point_down:

image

only contains numbers (:one::two::three::four::five::six::seven::eight:)

It's also not really about how to improve the strength of the pre shared key here (that can be done reasonable well within the 63 character limit) but why the "false impression" by the openwrt luci gui is given that such a setup with a 8-digit-key (which can be "hacked" in 80 seconds) is considered still in the category "medium security" :question:

Just thinking that this RC4 encryption algorithm used by WPA (and WEP) is already considered unsafe since many years and probably all major browser have it treated as "unsecure" or even disabled by default already for TLS :unlock:

So others asked already (years ago) to add "weak" or "insecure" instead of the misleading "medium security" to WPA-PSK (with it's default RC4 based TKIP cipher).

http://dev.archive.openwrt.org/ticket/18120

Same is true for the WPA-PSK/WPA2-PSK mixed mode because it's always about the weakest link

Turns out the year was 2016 (that was 6 years ago!) were all major browsers (firefox, chrome, edge/ie) disabled RC4 because it was considered already insecure back then. Guess the "Numerous Occurrence MOnitoring & Recovery Exploit" from 2015 was the last nail in the :coffin: for this chiper.... or not quite yet when using openwrt :see_no_evil:

We can break a WPA-TKIP network within an hour. More precisely, after successfully executing the attack, an attacker can decrypt and inject arbitrary packets
https://www.rc4nomore.com/#faq

Guess because of the weak cipher even with a 63 long and very complex passphrase a WPA-PSK (with default TKIP cipher) setup openwrt device can be exploited within an hour :-1: (yes, the one with the "medium security" :warning:)

As there is apparently no interest in changing this "situation" this topic can get closed :lock:

1 Like

meaning you are not interested in changing the situation?

I don't have the rights to do so and the only thing some one holding that power was doing in this thread was to change the wording from openwrt to OpenWrt. For me that indicates lack of interest :see_no_evil:

For sure the step of marking WPA insecure could also be directly omitted and it could be directly be deleted from the official builds (like WEP). I'm not aware of any device that does support WPA but at the same time doesn't support WPA2 (for WEP that was a different case but it is already long gone....) :put_litter_in_its_place:

why not make your own build with that option?

I don't need that because I'm aware of the (in)security of WPA and would never consider it a option to use.

This was mend for a broader audience (official builds) who one may will think - "medium security" sounds good I'll take that - without knowing that they have choosen the weakest possible option which could be defeated within an hour (with the default RC4 encryption algorithm) even when they choose a very complex 63 long pre shared key :unlock:

anyone with their head on their shoulder will obviously choose strong security if they aren't using really old devices.

I only came to know devices that only supported WEP and not WPA.

At the same time all devices (I touched) that supported WPA also supported WPA2 (which was shortly introduced after WPA btw.)

So "really old devices" (WEP only) are not supported anymore because WEP is gone already from openwrt.

I wonder what leads to the decision to remove WEP but keep RC4 based WPA at the same time :thinking:

These labels were added a while ago because people complained that all crypto choices were listed without giving any indication of their strength. Back then, the range was WEP to WPA2, so WEP was dubbed low, WPA medium and WPA2 strong.

2 Likes

That clarifies a lot! Thank's for this information. So it's just "out of date" (like 10 years or more) some one could say :bulb:

can it be updated in the next release? removing WPA and setting WPA2 as low and rest to follow?

1 Like

Don't think that would be a good idea. Removing WPA, setting WPA2 to low and promoting WPA3 as high which will not properly work with a lot of existing clients and supported routers will add confusion.

I can relabel WPA(1) to low though.

5 Likes

and get rid of RC4 please!

Not a LuCI matter.

Is there any particular place to "request" this? In another forum category or some issue tracker?

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.