banner



Your router's security stinks: Here's how to fix it

Your router'due south security stinks: Here's how to fix information technology

Most Wi-Fi routers and network gateways used by dwelling house customers are greatly non secure. Some are so vulnerable to attack that they should exist thrown out, a security expert said at the Promise X hacker briefing in New York.

  • Best Wi-Fi routers for your dwelling house or small role
  • The best antivirus software to continue your PC clean
  • Modem vs. router: How they're different and what they practice
  • How to access your router'southward settings
  • Millions of routers may be vulnerable to hacker assail — what to exercise

"If a router is sold at [a well-known retail electronics chain with a blueish-and-yellow logo], yous don't want to buy it," independent computer consultant Michael Horowitz told the audience.

"If your router is given to y'all past your cyberspace service provider [Internet service provider], yous don't want to employ it either, because they give abroad millions of them, and that makes them a prime number target both for spy agencies and bad guys," he added

Horowitz recommended that security-conscious consumers instead upgrade to commercial routers intended for pocket-sized businesses, or at least separate their modems and routers into ii dissever devices. (Many "gateway" units, often supplied by ISPs, can human activity every bit both.) Failing either of those options, Horowitz gave a listing of precautions users could take.

  • A router VPN may be the best way to secure your Wi-Fi at home

Bug with consumer routers

Routers are the essential just unheralded workhorses of modernistic calculator networking. Yet few domicile users realize routers are in fact total-fledged computers, with their own operating systems, software and vulnerabilities.

"A compromised router tin spy on you," Horowitz said, explaining that a router under an assaulter'southward control tin can stage a human being-in-the-heart attack, change unencrypted data or ship the user to "evil twin" websites masquerading equally oft-used webmail or online-cyberbanking portals.

Many consumer-grade home-gateway devices neglect to notify users if and when firmware updates go bachelor, even though those updates are essential to patch security holes, Horowitz noted. Some other devices will non accept passwords longer than sixteen characters — the minimum length for password safety today.

Universal Pwn and Play

Millions of routers throughout the earth accept the Universal Plug and Play (UPnP) networking protocol enabled on internet-facing ports, which exposes them to external attack.

"UPnP was designed for LANs [local surface area networks], and equally such, it has no security. In and of itself, it's not such a large deal," Horowitz said.

Only, he added, "UPnP on the internet is like going in for surgery and having the doctor work on the wrong leg."

Some other problem is the Dwelling Network Assistants Protocol (HNAP), a management tool found on some older consumer-class routers that transmits sensitive information about the router over the Web at http://[router IP accost]/HNAP1/, and grants total command to remote users who provide administrative usernames and passwords (which many users never alter from the factory defaults).

In 2014, a router worm chosen TheMoon used the HNAP protocol to identify vulnerable Linksys-make routers to which it could spread itself. (Linksys chop-chop issued a firmware patch.)

"As soon as you lot get home, this is something you want to do with all your routers," Horowitz told the tech-savvy crowd. "Go to /HNAP1/, and, hopefully, you'll get no response dorsum, if that's the just proficient thing. Frankly, if y'all become whatsoever response back, I would throw the router out."

  • Setting upwards a virtual router is the perfect way to share your connections

The WPS threat

Worst of all is Wi-Fi Protected Setup (WPS), an ease-of-use feature that lets users bypass the network password and connect devices to a Wi-Fi network simply past entering an viii-digit PIN printed on the router itself. Even if the network password or network name is changed, the PIN remains valid.

"This is a huge curse-deleted security problem," Horowitz said. "That eight-digit number volition go you into the [router] no affair what. So a plumber comes over to your house, turns the router over, takes a picture of the bottom of it, and he can now get on your network forever."

That eight-digit PIN isn't even really 8 digits, Horowitz explained. It's actually 7 digits plus a final checksum digit. The first four digits are validated as one sequence and the final three as another, resulting in only 11,000 possible codes instead of 10 million.

"If WPS is active, you can become into the router," Horowitz said. "You just need to make eleven,000 guesses" — a trivial task for most mod computers and smartphones.

Then, in that location's networking port 32764, which French security researcher Eloi Vanderbeken in 2013 discovered had been quietly left open on gateway routers sold past several major brands.

Using port 32764, anyone on a local network — which includes a user's Internet service provider — could take total administrative control of a router, and even perform a factory reset, without a countersign.

The port was closed on virtually affected devices post-obit Vanderbeken'south disclosures, but he later found that it could easily be reopened with a peculiarly designed data packet that could exist sent from an ISP.

"This is and then obviously done by a spy agency, it's amazing," Horowitz said. "It was deliberate, no doubt about it."

  • Read more: The best Dubai VPN can sidestep the UAE's callous internet laws

How to lock down your home router

The first footstep toward home router security, Horowitz said, is to make certain the router and cable modem are not a single device. Many ISPs lease such dual-purpose devices to customers, but those customers volition have little control over their own home networks. (If you need to get your own modem, check out our recommendations for the all-time cable modem.)

"If you were given a single box, which almost people I think call a gateway," Horowitz said, "you should be able to contact the Isp and have them impaired downwards the box so that information technology acts as only a modem. And then yous can add your own router to it."

Next, Horowitz recommended that customers buy a low-end commercial-class Wi-Fi/Ethernet router, such equally the Pepwave Surf SOHO, which retails for nearly $200 (though beware price gougers), rather than a consumer-friendly router that can cost equally little as $20.

Commercial-form routers are unlikely to have UPnP or WPS enabled. The Pepwave, Horowitz noted, offers additional features, such equally firmware rollbacks in instance a firmware update goes wrong. (Many meridian-end consumer routers, especially those aimed at gamers, offer this as well.)

Regardless of whether a router is commercial- or consumer-course, there are several things, varying from easy to hard, that dwelling-network administrators tin can practise to make sure their routers are more than secure.

Easy fixes for your home wireless router

Alter the authoritative credentials from the default username and countersign. They're the start things an aggressor volition try. Your router's instruction transmission should show you how to practise this. If it doesn't, then Google it.

Make the countersign long, strong and unique, and don't make it anything resembling the regular password to access the Wi-Fi network.

Change the network name, or SSID, from "Netgear," "Linksys" or whatever the default is to something unique — but don't give information technology a name that identifies you lot.

"If you alive in an apartment building in flat 3G, don't call your SSID 'Apartment 3G,'" Horowitz quipped. "Telephone call it 'Apartment 5F.'"

Plow on automatic firmware updates if they're available. Newer routers, including most mesh routers, will automatically update the router firmware.

Enable WPA2 wireless encryption then that but authorized users can hop on your network. If your router supports only the erstwhile WEP standard, information technology's time for a new router.

Enable the new WPA3 encryption standard if the router supports information technology. Every bit of mid-2021, however, only the newest routers and customer devices (PCs, mobile devices, smart-home devices) do.

Disable Wi-Fi Protected Setup, if your router lets y'all.

Ready a guest Wi-Fi network and offer its use to visitors, if your router has such a feature. If possible, set the guest network to turn itself off after a set period of fourth dimension.

"You can turn on your guest network, and gear up a timer, and 3 hours after, it turns itself off," Horowitz said. "That'southward a actually nice security feature."

If yous have a lot of smart-home or Net of Things devices, odds are many of them won't exist terribly secure. Connect them your guest Wi-Fi network instead of your primary network to minimize the damage resulting from any potential compromise of an IoT device.

Do not use deject-based router direction if your router'due south manufacturer offers it. Instead, figure out if yous tin can plough that feature off.

"This is a really bad idea," Horowitz said. "If your router offers that, I would not practice it, because at present y'all're trusting some other person between you and your router."

Many "mesh router" systems, such every bit Nest Wifi and Eero, are entirely deject-dependent and can interface with the user just through deject-based smartphone apps.

While those models offer security improvements in other areas, such as with automatic firmware updates, it might be worth looking for a mesh-style router that permits local administrative access, such as the Netgear Orbi.

Moderately hard habitation router fixes

Install new firmware when information technology becomes available. This is how router makers install security patches. Log into your router's administrative interface routinely to bank check — here'due south a guide with more information.

With some brands, you may have to check the manufacturer's website for firmware upgrades. Merely have a backup router on mitt if something goes wrong. Some routers also let you back up the current firmware before installing an update.

Gear up your router to utilize the 5-GHz band for Wi-Fi instead of the more standard 2.iv-GHz band, if possible — and if all your devices are compatible.

"The five-GHz ring does not travel as far as the two.iv-GHz ring," Horowitz said. "So if there is some bad guy in your neighborhood a cake or ii away, he might see your ii.4-GHz network, simply he might not meet your 5-GHz network."

Disable remote authoritative access, and disable administrative access over Wi-Fi. Administrators should connect to routers via wired Ethernet only. (Again, this won't be possible with many mesh routers.)

Advanced router security tips for tech-savvy users

Alter the settings for the administrative Spider web interface, if your router permits information technology. Ideally, the interface should enforce a secure HTTPS connection over a non-standard port, so that the URL for administrative access would be something like, to use Horowitz's case, "https://192.168.ane.one:82" instead of the more standard "http://192.168.1.1", which by default uses the internet-standard port fourscore.

Use a browser's incognito or private mode when accessing the administrative interface and so that the new URL you lot set in the to a higher place step is not saved in the browser history.

Disable PING, Telnet, SSH, UPnP and HNAP, if possible. All of these are remote-access protocols. Instead of setting their relevant ports to "airtight," set them to "stealth" so that no response is given to unsolicited external communications that may come up from attackers probing your network.

"Every single router has an pick non to respond to PING commands," Horowitz said. "It'southward absolutely something you lot desire to plow on — a great security feature. It helps you hide. Of form, y'all're not going to hide from your ISP, just you're going to hide from some guy in Russian federation or People's republic of china."

Modify the router'due south Domain Name System (DNS) server from the ISP'southward own server to 1 maintained by OpenDNS (208.67.220.220,  208.67.222.222), Google Public DNS (8.8.viii.8, 8.8.4.4) or Cloudflare (1.1.1.one, 1.0.0.1).

If you lot're using IPv6, the corresponding OpenDNS addresses are 2620:0:ccc::2 and 2620:0:ccd::2, the Google ones are 2001:4860:4860::8888 and 2001:4860:4860::8844, and the Cloudflare ones are 2606:4700:4700::1111 and 2606:4700:4700::1001.

Utilize a virtual private network (VPN) router to supplement or replace your existing router and encrypt all your network traffic.

"When I say VPN router, I mean a router that can be a VPN client," Horowitz said. "Then, you sign upwardly with some VPN company, and everything that you send through that router goes through their network. This is a great way to hide what you're doing from your internet service provider."

Many home Wi-Fi routers can be "flashed" to run open up-source firmware, such every bit the DD-WRT firmware, which in plough supports the OpenVPN protocol natively. Virtually of the best VPN services back up OpenVPN besides and provide instructions on how to set open up-source routers up to use them.

Finally, use Gibson Research Corp.'s Shields Up port-scanning service at https://world wide web.grc.com/shieldsup. It volition test your router for hundreds of common vulnerabilities, most of which tin exist mitigated by the router'due south ambassador.

[This story was originally published in July 2014 and has been updated with new information ever since.]

  • Are Free VPNs Worth the Adventure? Experts Say No
  • What Is a Mesh Router, and Do Y'all Need One?
  • Best Wi-Fi Extenders

Paul Wagenseil is a senior editor at Tom'due south Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He'south been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom'south Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and fifty-fifty moderated a panel discussion at the CEDIA home-engineering briefing. Y'all tin can follow his rants on Twitter at @snd_wagenseil.

Source: https://www.tomsguide.com/us/home-router-security,news-19245.html

Posted by: harperforting.blogspot.com

0 Response to "Your router's security stinks: Here's how to fix it"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel