Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Logging In, TKIP -> AES #6

Open
c00ni opened this issue Oct 14, 2020 · 13 comments
Open

Logging In, TKIP -> AES #6

c00ni opened this issue Oct 14, 2020 · 13 comments

Comments

@c00ni
Copy link

c00ni commented Oct 14, 2020

Hi, I've got MW6's. They only do WPA2 TKIP instead of AES and I've read somewhere along the way they simply disabled AES.

First, can I telnet into it without doing anything special hardware wise? I get the password is just base64 encode of the default password. You say you hold reset for 3 seconds, but you were connected via UART first? Can it be done without opening it up and mucking around?

Next, did you see anything about TKIP vs AES looking around? Happy to look around myself once in.

@crees
Copy link
Contributor

crees commented Oct 15, 2020

No need to do anything special. Just do the reset button thing and the telnet port opens.

@c00ni
Copy link
Author

c00ni commented Oct 15, 2020

Thanks, I got in.
It's the base64 of the current wifi password, not the default (which of course may have been current).

Interestingly I've found the primary node only accepts WPA2 AES but the secondary node does WPA and WPA2, TKIP/AES.

MacOS's airport command showing the following:

Primary
SSID BSSID2G -56  6,-1    Y  -- WPA2(PSK/AES/AES)
SSID BSSID5G -56  40      Y  US WPA2(PSK/AES/AES)
 
Secondary
SSID BSSID2G -49  6,-1    Y  -- WPA(PSK/TKIP,AES/TKIP) WPA2(PSK,FT-PSK/TKIP,AES/TKIP)
SSID BSSID5G -37  40      Y  US WPA(PSK/TKIP,AES/TKIP) WPA2(PSK,FT-PSK/TKIP,AES/TKIP)

@crees
Copy link
Contributor

crees commented Oct 15, 2020

That is really interesting! You could have a go at telnetting into the secondary node, and using cfm to see if there are any settings on that. I find it unlikely that the meshing would rely on WPA1/TKIP as the primary does not use it.

I'd still be very cautious about what you change...

@c00ni
Copy link
Author

c00ni commented Oct 16, 2020

Yeah very interesting indeed.
I’m using Ethernet for backhaul as well.

I dumped all the settings on both nodes and ran a diff between them, only a handful of values came out. I changed the two pertaining to wl2g and wl5g so the secondary matches the primary but no dice.

Doing my head in.

(I noticed there was an issue because iOS 14 now gives a ‘weak security’ banner of shame when connecting to TKIP networks, but the warning disappears when it roams over to the primary node)

@crees
Copy link
Contributor

crees commented Oct 16, 2020

When I get a chance, I'll have a play with my MW5s- I can't really fiddle too much with them right now as I really can't risk breaking them with so little free time, but it's definitely an annoyance (and a concern too I guess.)

@gingerbeardman
Copy link

Watching because I'm also in the same position with the same annoyance/concern.

Aside: I have emailed Tenda about TKIP iOS 14 warning - unrelated to this issue - via the email address from a previous support query when they were very helpful. I doubt they'll address TKIP/AES in a firmware update, but you never know! I didn't share any links in my email, just a screenshot of iOS.

@duoi
Copy link

duoi commented Nov 28, 2020

@c00ni any luck with this? What do you find at /etc/config/wireless?

@c00ni
Copy link
Author

c00ni commented Nov 28, 2020

Just came across this now and haven't gone home yet to test: https://www.ozbargain.com.au/comment/9715402/redir

To quote,

For those who are seeing TKIP, if you go through the settings on the Tenda app, select Fast Roaming and enable it. See if you still have TKIP enabled.
After doing this, it seems like it's AES-only now?

Edit: just tested, TKIP no longer accepted, only AES.

@gingerbeardman
Copy link

gingerbeardman commented Nov 28, 2020

I already had Fast Roaming enabled, and was seeing TKIP for all but the main router.

So I just toggled it off and on again and that seems to have made it only AES. Great news!

Will report back if anything changes.

@gingerbeardman
Copy link

gingerbeardman commented Jan 11, 2021

New firmware since 2020-12-26 claims to solve this.

Though my devices won't update! More here: https://www.reddit.com/r/HomeNetworking/comments/kskl23/unable_to_update_firmware_tenda_mw6_mesh_system/

IMG_0999

@c00ni
Copy link
Author

c00ni commented Jan 13, 2021

New firmware since 2020-12-26 claims to solve this.

Though my devices won't update!

Mine updated successfully to V1.0.0.29(5834)
Thanks for the heads up. Can't help you with the update though

@gingerbeardman
Copy link

gingerbeardman commented Jan 13, 2021

Tenda are fixing the update issue, more details at reddit link.

@gingerbeardman
Copy link

Mine updated shortly after my last post.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants