Feeds

Sky Broadband puts the fault into default Wi-Fi security

Users in guess-able random keys quandary

Security for virtualized datacentres

Sky Broadband advises customers to consider changing their default Wi-Fi passwords - because the apparently random network keys are guess-able.

The ISP issues customers with a wireless router that is pre-configured with wireless security switched on, and an apparently random network key. This sounds like a good plan. However, the key is based on the router's MAC address, which is broadcast "in the clear" - i.e in unencrypted form.

Reg reader James, who brought the issue to our attention, said that getting the MAC address is trivial and working out the algorithm that links it to a network key is "not exactly rocket science".

The security shortcoming affects only Sky Broadband's original router, a rebadged Netgear DG834GT, and applies only where customers keep the default network key. This leaves plenty of scope for problems. "With about a million Sky customers using the original DG834GT router, there's likely to be hundreds of thousands of Sky customers thinking that they're safe, when in fact they are not," James notes.

Sky has not issued a general alert, even though it was informed of the matter a month ago, through its SkyUser community support forum. "Sky offered advice to users on that forum, to either disable wireless networking, or change their wireless password, but they still haven't told their wider customer base about this problem," James said.

In response to our questions, Sky Broadband said users can improve security by changing their default password (as explained here), comparing this, more or less, to adding a lock to an already bolted door.

"A wireless router is great for flexibility and convenience but no one wants to unwittingly share their connection with another user. We pre-configure all our routers with security settings so that customers' bandwidth is protected from day one. Our website offers advice to customers on how to further enhance this level of protection by changing their default password to another of their own choice," a Sky spokeswoman told El Reg. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.