This discussion is locked
-
All replies
-
Helpful answers
-
Mar 15, 2009 3:02 PM in response to Macindowsby BShrope,It sounds to me that it isn't actually "compromised" and it's just a glitch... have you updated the firmware for your wireless device? everyone I've seen used has some way to update the firmware. -
Mar 15, 2009 3:17 PM in response to Macindowsby Barney-15E,How does this message get delivered to you and who (what) is sending it?
I've never seen it nor heard of it.
P.S. @Macindows: Apple doesn't read these forums. It's a user to user help site. Apple employees only moderate the forum for terms of service violations. -
Mar 15, 2009 4:11 PM in response to Macindowsby nerowolfe,Macindows wrote:
Hi,P.S. @Apple: This problem goes back over five years. How about releasing some kind of bugfix or at least give us the chance to switch of this "protection"?
To reach Apple, file a bug report here:
https://bugreport.apple.com
Apple does not, as a rule, read these posts - - certainly not each and every one of them.
BTW, that message is coming from your modem and has nothing to do with Apple. Time to get a new modem or update the firmware. -
Mar 16, 2009 3:29 AM in response to nerowolfeby William Kucharski,★HelpfulActually, nerowolfe, that message comes from the *AirPort driver* when it detects a problem with the TKIP Message Integrity Check or the associated checksum.
(See the file:
/System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resource s/ClientController.bundle/Contents/Resources/English.lproj
it contains the strings:
"wpaIsFailureMIC" = "The wireless network appears to have been compromised and will be disabled for about a minute.";
"wpaIsReplayAttack" = "The wireless network appears to have been compromised and will be disabled for about a minute.";
)
Two "easy" ways of avoiding this are to change to a different router or, if possible, only use WPA2 encryption.
Detail:
When the message is seen, it's because:TKIP uses a keyed Message Integrity Check (MIC) to detect packets that are replayed or forged. Anyone can send (that is, inject) a TKIP-encrypted packet that has been captured and modified, but those packets are dropped because the MIC and checksum do not match the data carried by the packet. APs using TKIP usually transmit an error report when the first bad MIC is received. If a second bad packet arrives within 60 seconds, the AP stops listening for another minute and then "rekeys" the WLAN, requiring all clients to start using a new "pairwise master key" to generate both the MIC key and those per-packet encryption keys.
http://searchnetworking.techtarget.com.au/tips/28356-How-to-avoid-the-WPA-attack -entirely
Now there are TKIP injection attacks, and it could be that the wireless network involved is under attack, but it's more likely that the router is incorrectly calculating the MIC or checksum, or the MIC or checksum are being corrupted during transmission, usually due to interference from another router nearby. -
Mar 17, 2009 6:00 AM in response to William Kucharskiby Macindows,I think the problem has been solved. I changed my SSID and enhanced security to WPA2 and haven't received the message since then.
So thanks everybody! -
Mar 17, 2009 10:53 AM in response to Macindowsby William Kucharski,Yes - since WPA2 uses AES rather than TKIP encryption, the TKIP MIC and checksums don't apply, so the message will never be generated.