This is not how you implement WiFi (PSP)

Panajev2001a

GAF's Pleasant Genius
I am a bit disappointed in the fact that the PSP can connect to a WEP secured Network (even though WPA would have been preferred, but our Home network still has several 802.11b devices which do not support WPA) only thanks to a caveat... it seems the WiFi network has to be a Open Key WEP encrypted network for the PSP to be able to connect and exchange traffic.

It is true that our network does MAC Address Filtering and does not broadcast the SSID (even though good hackers can still break in... still they could break in even with 128 bits WEP with Shared Key in about 1 hour and 30 minutes or less) thus some form of access control is done, but I would have liked Shared Key better.

The difference between Open System WEP and Shared Key WEP is that, although data is encrypted on both after the WiFi device was accepted into the network/authenticated, Open System WEP authenticates without asking for the WEP key (the other checks that I mentioned before are performed though).

I appreciate they included WiFi and WEP support, but I would have preferred if you could specify Shared Key WEP as well as Open System WEP.

Hopefully this will arrive in a Firmware update.

P.S.: our router here is a U.S. Robotics 8504 Wireless Turbo Router (802.11 b/g compatible with latest Firmware installed) : I do not think it is a Router issue though.

P.P.S.: whoa... I am bitchy today... :(.

P.P.P.S.: well yes, the PSP arrived thanks to a Knight in Shiny Armor who sometimes wears the "Sony is D0000000000M33333333333DDDD" cloak and speaketh unto the fourm villagers ;).

P.P.P.P.S.: this seems to be the issue of the day ;).
 
If you've you've got a mixed 'b' and 'g' environment then things can be unstable...or at least mine seems to bomb occasionally! :(

Oh and bake some cakes...I heard it's good for curing bitchiness! :)
 
Panajev2001a said:
P.P.S.: whoa... I am bitchy today... :(.

un·der·state·ment Audio pronunciation of "understatement" ( P ) Pronunciation Key (ndr-sttmnt, ndr-stt-)
n.

1. A disclosure or statement that is less than complete.
2. Restraint or lack of emphasis in expression, as for rhetorical effect.
3. Restraint in artistic expression.
 
stop moaning, at least it can connect (ahem)

Seriously though, you can't expect it to have access point level security, its mostly designed for ad-hoc use for multiplayer, the only thing that uses infrastructure so far is network update.

Surely switching off BSSID and using MAC filtering should be enough? Thats what I use and have WEP switched off. PSP reports is MAC address so I've added that to the list of trusted devices.
 
mrklaw said:
stop moaning, at least it can connect (ahem)

Seriously though, you can't expect it to have access point level security, its mostly designed for ad-hoc use for multiplayer, the only thing that uses infrastructure so far is network update.

Surely switching off BSSID and using MAC filtering should be enough? Thats what I use and have WEP switched off. PSP reports is MAC address so I've added that to the list of trusted devices.

Well, it works with WEP turned on and Open System authentication, so I will leave WEP on and lose a bit of signal strenght :).

PSP wa added to the list to trusted devices too if not it would not be able to connect to the WiFi network.
 
you have a perfect unit.

DC am cry

and a free copy of popolocrois due to "sender retardedness"
 
its mostly designed for ad-hoc use for multiplayer, the only thing that uses infrastructure so far is network update.
Well, online games shoud be available at the US launch, so infrastructure WiFI connectivity does have a big play there.
 
DCharlie said:
you have a perfect unit.

DC am cry

and a free copy of popolocrois due to "sender retardedness"

No, there is a pixel that sometimes gets stuck on white/white-ish on the right side of the screen, but it is not there all the time: you can really see it when the screen turns black.

The copy of popolocrois is not free as it has to be shipped back due to the fact that the sender is a good fellow :).
 
»developer.intel.com/technology/itj/q22..
The same shared key used to encrypt/decrypt the data frames is also used to authenticate the station. It is considered a security risk to have both the encryption keys and authentication keys be the same. There is also a method where stations and AP's can utilize WEP alone without shared key authentication, essentially using WEP as an encryption engine only. This is done in open system mode. This is considered to be the most protected implementation in 802.11 thus far and still enables reasonable authentication.


»www.giac.org/practical/GSEC/Kevin_Sacc..
Though the requirement of using WEP in shared key authentication might make it seem more secure, it is not. Shared key authentication provides false security to the WLAN because of its weakness of sending the challenge in plaintext. If the plaintext is sent in the clear and then encrypted with WEP anyone sniffing the transmission can gather this information. By performing a brute force attack against the key space of the encrypted challenge, the WEP secret key can be discovered. Due to this problem, open key authentication with WEP is considered a more secure implementation of WEP.


»www.cisco.com/en/US/netsol/ns340/ns394..
The process of exchanging the challenge text occurs over the wireless link and is vulnerable to a man-in-the-middle attack. An eavesdropper can capture both the plain-text challenge text and the cipher-text response. WEP encryption is done by performing an exclusive OR (XOR) function on the plain-text with the key stream to produce the cipher-text. It is important to note that if the XOR function is performed on the plain-text and cipher-text are XORed, the result is the key stream. Therefore, an eavesdropper can easily derive the key stream just by sniffing the shared key authentication process with a protocol analyzer (Figure 10).

I was not aware of that weakness described in this post about WEP encription plus Shared Key Authentication.

I stand humbly corrected.

If you use WEP... well Open System authentication everyone ;).
 
Smiles and Cries said:
Dear Pana,

Please do not Sin against Sony for the world may end.

P.S. Praise PS3 a little more.

P.S.P. Please buy me one thank you :)

-Naz

Well, it turns out that Sony/SCE made the smart decision as they paid attention to a small detail I ignored.

So, good for them :).
 
Well, at least you tried to find something original to complain about. I guess that counts for something.
 
kaching said:
Well, at least you tried to find something original to complain about. I guess that counts for something.

Yes, I am very well known Sony/SCE hater... uhm...

I was mistaken about this small, but key (no pun intended) difference between Open System Authentication + WEP and Shared Key Authentication + WEP. Reading more about this, it is clear that they did drop the worst part of WEP.

I did not try to find a problem, I thought there was a problem. In fact I am glad I learned the truth and I happily changed the WiFi network in this house to Open System WEP + the other access control mechanism which were already used before (MAC address control + SSID broadcasting being turned off).

You win some, you lose some ;).

I guess I lost today :lol.
 
You can't spoof a MAC address, right? So as long as you can't spoof it, you're fine. I have my SSID still broadcasting (don't ask), but I put on MAC filtering, so while it's possible to see the network, no one can get at it...from what I can tell. When I setup my mom's laptop last week, this was the case. I could see the network, but even with the correct pass, I was unable to connect. Couldn't even get to the ip address. That was until I remembered the MAC filters, and then it was a piece of cake. I wish MAC filtering worked for wired connections too. PEACE.
 
Pimpwerx said:
You can't spoof a MAC address, right?

Yes... yes you can spoof a mac address IIRC... google the phrase spoof a mac address. I don't know all the in's and out's but the short answer is... even with all of the security features and mac filtering enabled on a wireless router, if a hacker is determined and smart enough they can still get in.
 
surely though you'd need to know what MAC addresses were allowed on the access point? how would someone be able to do that, without having to try every combination? If they are that determined, I think I'd noticed their big 'delivery' van sat outside my house 24/7
 
Pimpwerx said:
I wish MAC filtering worked for wired connections too. PEACE.


Why would you need it? The assumption is that anything that is wired into your network is legit, because its in your house.
 
mrklaw said:
surely though you'd need to know what MAC addresses were allowed on the access point? how would someone be able to do that, without having to try every combination? If they are that determined, I think I'd noticed their big 'delivery' van sat outside my house 24/7

MAC addresses can be read from the packets the WiFi router sends out IIRC... I do not know if they are encripted (the MAC address info), but I'd almost say no, they are not encripted.
 
I don't want to be one of those people who bump old posts but is there any word on support for WPA in a future firmware update?
 
dream said:
I don't want to be one of those people who bump old posts but is there any word on support for WPA in a future firmware update?

Maybe, but I would not say very likely for quite a bit.
 
It's really unfortunate these devices are only supporting WEP. It was never really secure and now it's laughable how fast it can be cracked.

This article details the process of injecting packets into a wireless network to break WEP encryption in minutes.
http://securityfocus.com/infocus/1824

Lets hope that we get firmware upgrades and next-gen consoles that support better encryption mechanisms.
 
Panajev2001a said:
Well, it turns out that Sony/SCE made the smart decision as they paid attention to a small detail I ignored.

So, good for them :).


I just want to say that God saw this and was not amused.

Doubt destroys faith.

SONY loves you.
 
Top Bottom