WPA-PSK is vulnerable to offline attack.
WPA-TKIP has been cracked.
TO AVOID THESE PROBLEMS:
1. USE WPA-AES or WPA2 instead of WPA-TKIP (or WEP)
2. USE A PASSPHRASE WITH MORE THAN 20 CHARACTERS. Examples:
BAD: "vintage wine"
GOOD: "floor hiking dirt ocean"
(pick your own words, even longer is better)
FOR HIGH SECURITY, USE MORE THAN 32 CHARACTERS.
Weakness in Passphrase Choice in WPA Interface
Practical attacks against WEP and WPA
A Practical Message Falsication Attack on WPA
New attack cracks common Wi-Fi encryption in a minute
Passphrase Flaw Exposed in WPA Wireless Security
Re: ALERT: WPA-TKIP isn't secure - use WPA2 instead
On Mon, 21 May 2012 16:45:16 +0000, Arklin K. wrote:
> On Sat, 05 May 2012 14:29:45 +0000, John Navas wrote:
>> WPA-PSK is vulnerable to offline attack.
>> WPA-TKIP has been cracked.
> Hi John Navas,
> I don't know you but you seem to be crontabbing alerts so you might want
> to consider making an alert for the WPS vulnerability which negates all
> other security on all wi-fi certified routers.
> Details here: