Previous 1 2 Next 19 Replies Latest reply: May 7, 2014 8:43 PM by Bob Timmons
mrt60 Level 1 Level 1 (0 points)

Airport Extreme supports connection with pin (wps)? In Airport's manual I found instructions for connection through pin but in Airport utility I didn't find this option but only through mac address.


MacBook pro 13, Mac OS X (10.7.2), Ipad 3G+WiFi 16 GB - Iphone 4 16GB
  • Bob Timmons Level 10 Level 10 (86,145 points)

    but in Airport utility I didn't find this option

    Did you look here?

     

    Open AirPort Utility - Click Manual Setup

     

    Shift the focus of your eyes up to the uppermost top of the computer screen where you normally see the Help menu.

     

    Locate Help, then move your eyes left until you see the Base Station menu

     

    Click the Base Station menu, then click Add Wireless Clients

  • mrt60 Level 1 Level 1 (0 points)

    sorry, I didn't look at menu. Airport extreme have security issue with pin connection? I heard that Netgear's pin could be reveal with brute force attack. I hope that Airport extreme have protection

  • Bob Timmons Level 10 Level 10 (86,145 points)

    Airport extreme have security issue with pin connection?

    There has not been any statement from Apple on this.

  • mrt60 Level 1 Level 1 (0 points)

    thank you.

  • AccidentalTourist Level 1 Level 1 (0 points)

    This doesn't seem to work in Airport Utility 6. Anyone else having this problem?

  • Bob Timmons Level 10 Level 10 (86,145 points)

    Not sure what you mean by "This doesn't seem to work in AirPort Utility 6".

     

    The setting is not even there.

     

    Use the much more functional AirPort Utility 5.6 for Mac OS X Lion if you need this type of configuration setting.

  • AccidentalTourist Level 1 Level 1 (0 points)

    Exactly. Thanks for the link. Problem solved.

  • christianready Level 1 Level 1 (0 points)

    I notice that the Airport Utility 5.6 for Lion is intended for AirPort Express 802.11g and AirPort Extreme 802.11g base stations. Does it work with the current generation 802.11n AirPort Extreme?

     

    Also, kind of weird that they're hiding WPS in AirPort Utiltiy 6...?

  • Bob Timmons Level 10 Level 10 (86,145 points)

    Does it work with the current generation 802.11n AirPort Extreme?

    AirPort Utility is a full funtion application which will work with both "g" and newer "n" devices.

     

    Also, kind of weird that they're hiding WPS in AirPort Utiltiy 6...?

    It is not really "hiding". It is simply no longer there at all.

  • christianready Level 1 Level 1 (0 points)

    Precisely. Why would Apple take WPS away when so many devices use it?

  • Bob Timmons Level 10 Level 10 (86,145 points)

    Why would Apple take WPS away when so many devices use it?

    This is a question for Apple, I would think.

     

    Apple - Mac OS X - Feedback

  • Wizard One Level 1 Level 1 (0 points)

    Because it was vulnerable to attack.

    A major security flaw was revealed in December 2011 that affects wireless routers with the Wi-Fi Protected Setup (WPS) feature, which most recent models have and enable by default. The flaw allows a remote attacker to recover the WPS PIN and, with it, the router's WPA2 password in a few hours.http://en.wikipedia.org/wiki/WPA2#cite_note-0

  • Bob Timmons Level 10 Level 10 (86,145 points)

    Apple's WPS setup was never enabled by default, and could only be enabled manually for a very short period of time...about 30 seconds as I recall.

     

    Also wondering why...if this is an issue.....Apple included WPS in the new 5.6.1 version of AirPort Utility just released a few weeks ago.

  • Corey Edwards Level 1 Level 1 (0 points)

    To give a simple explanation as to why Apple is reluctant to incorporate WPS into the AirPort and Time Capsule firmware, please see this post on Lifehacker: http://mnch.us/vfskZ

     

    It's basically because WPS is designed to work with a PIN that's hard-coded (meaning it can only be changed by a firmware modification) into the device. Since this PIN is set by the company (i.e. Apple if they included WPS), the PIN for one specific model or firmware version will work on all devices of the same model or firmware version. Since this PIN cannot be changed by the user, a program (such as Reaver, discussed in that post) can perform a brute force attack and eventually open the router to reconfiguration by an adversary. When this happens, your entire network can immediately break down because few people take the time to secure individual devices or nodes on their home network, out of convenience.

     

    Basically, I could pull up outside your house, use my Chromebook laptop with Reaver installed, and if I know what type of router you're using (which is fairly easy to find, regardless of your WiFi security), I can use WPS and easily break your WiFi password, leech off your network, release a virus to your Windows computers, or use other malicious techniques to break into your Mac machines. (OS X is a very secure operating system, but few people take the time to properly lock it down, leaving their Mac vulnerable).

     

    In a nutshell, Apple tries to avoid any technology that has the potential to easily backfire on user security, which WPS does for the sake of convenience.

Previous 1 2 Next