Jump to content
Posted 11 July 2017 - 05:51 AM
Posted 11 July 2017 - 01:53 PM
I’ve not tried this procedure, but this would appear to be the way to do it.
Posted 12 July 2017 - 10:54 AM
Posted 12 July 2017 - 01:30 PM
Certainly puzzling.. What exact model of Mac do you have? What version of macOS is it running? (the first few Lines of "about this Mac" from the apple menu would be useful.
Do you have any other Apple devices on the same network/ is keychain synced between them (through iCloud)? (I'm sure you'd have mentioned it before but need to be sure).
I can't see why a router admin would mess about limiting wi-fi protocols for one user - even if that was possible (which for the kind of routers you'd see in residential use, it's not - the settings are not that granular`- I've only ever seen one set of protocols across an entire SSID).
Are there any wi-fi repeaters or multiple wi-fi access points around the property? (if so) Could the one nearest to you be old enough not to support wpa2, or be configured to only use the older protocol?. A variation on this is someone setting up another wi-fi network with the same SSID as one they want to hijack (however, that kind of attack would be used on public hotspots rather than on residential networks)
If the router admin was malicious he could intercept your traffic within the router (or interfere with your DNS) without going to the hassle of weakening your wi-fi and the further cracking that. Not worth the hassle.
There's also the possibility of a plain old software incompatibility between the Mac and router. I have seen such issues in the past.
Posted 12 July 2017 - 02:23 PM
Edited by JimmyRiddle, 12 July 2017 - 02:28 PM.
Posted 12 July 2017 - 04:18 PM
Hidden network/adding devices manually was always false security. Now technologies sync as MAC address randomisation make that unworkable.
I was wondering if corrupted wifi settings were synced with the keychain... You can check in the new account section at the top of settings on the iPhone and then iCloud (see which elements are turned on). and on the Mac under Settings/iCloud.
In terms of encrypted information being stolen, as long as the website is https and you've not overridden certificate issues when connecting to the site the you're reasonably safe. HTTPS encrypts the information and the way that https/certificates work proves you are actually talking to the server that you think you are (without any possibility of someone sitting in the middle). The only thing at someone in the middle could figure out is what site you're accessing. Not what you're doing on it. Of course plain http information is fair game for interception.
Of course the use of internet access VPNs will protect against that kind of local interception and some offer other added protection such as virus scanning. I'm not a great fan of them however - I do have a subscription but only use it occasionally.
The WPA2/WPA encryption protects traffic between you and the router or direct traffic between you and other devices wired or on wifi form the same router. If you are only accessing the internet, then anything sensitive you are doing should already be encrypted. One more thing to check there 'though...
One thing that amazes me is that some ISPs still run mail servers that permit client access through unencrypted protocols. In Mail for Mac nd iPhone mail, check that TLS is turned on on all pop/imap accounts, and on those for both sending and receiving.
Edited by x64, 12 July 2017 - 04:20 PM.
Posted 17 July 2017 - 08:50 AM
Resolved this - it turns out the router was reset and when turned back on it was with the old settings. Strange how only my Mac got the 'weak security' message, while other devices in property didn't though. Thanks for the input X64.
0 members, 2 guests, 0 anonymous users