Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

WPS and Pin in Airport Extreme

Airport Extreme supports connection with pin (wps)? In Airport's manual I found instructions for connection through pin but in Airport utility I didn't find this option but only through mac address.

MacBook pro 13, Mac OS X (10.7.2), Ipad 3G+WiFi 16 GB - Iphone 4 16GB

Posted on Jan 23, 2012 6:54 AM

Reply
Question marked as Best reply

Posted on Jan 23, 2012 7:03 AM

but in Airport utility I didn't find this option

Did you look here?


Open AirPort Utility - Click Manual Setup


Shift the focus of your eyes up to the uppermost top of the computer screen where you normally see the Help menu.


Locate Help, then move your eyes left until you see the Base Station menu


Click the Base Station menu, then click Add Wireless Clients

19 replies
Question marked as Best reply

Jan 23, 2012 7:03 AM in response to mrt60

but in Airport utility I didn't find this option

Did you look here?


Open AirPort Utility - Click Manual Setup


Shift the focus of your eyes up to the uppermost top of the computer screen where you normally see the Help menu.


Locate Help, then move your eyes left until you see the Base Station menu


Click the Base Station menu, then click Add Wireless Clients

Jul 26, 2012 4:22 PM in response to Bob Timmons

Because it was vulnerable to attack.

A major security flaw was revealed in December 2011 that affects wireless routers with the Wi-Fi Protected Setup (WPS) feature, which most recent models have and enable by default. The flaw allows a remote attacker to recover the WPS PIN and, with it, the router's WPA2 password in a few hours.http://en.wikipedia.org/wiki/WPA2#cite_note-0

Oct 29, 2013 1:10 PM in response to mrt60

To give a simple explanation as to why Apple is reluctant to incorporate WPS into the AirPort and Time Capsule firmware, please see this post on Lifehacker: http://mnch.us/vfskZ


It's basically because WPS is designed to work with a PIN that's hard-coded (meaning it can only be changed by a firmware modification) into the device. Since this PIN is set by the company (i.e. Apple if they included WPS), the PIN for one specific model or firmware version will work on all devices of the same model or firmware version. Since this PIN cannot be changed by the user, a program (such as Reaver, discussed in that post) can perform a brute force attack and eventually open the router to reconfiguration by an adversary. When this happens, your entire network can immediately break down because few people take the time to secure individual devices or nodes on their home network, out of convenience.


Basically, I could pull up outside your house, use my Chromebook laptop with Reaver installed, and if I know what type of router you're using (which is fairly easy to find, regardless of your WiFi security), I can use WPS and easily break your WiFi password, leech off your network, release a virus to your Windows computers, or use other malicious techniques to break into your Mac machines. (OS X is a very secure operating system, but few people take the time to properly lock it down, leaving their Mac vulnerable).


In a nutshell, Apple tries to avoid any technology that has the potential to easily backfire on user security, which WPS does for the sake of convenience.

WPS and Pin in Airport Extreme

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.