Subject: Networking | May 30, 2017 - 05:00 AM | Sebastian Peak
Tagged: wireless, wifi extender, wi-fi, Rivet Networks, network, msi, lan, Killer xTend, Killer Networking, gigabyte, Ethernet, computex 2017, computex
Rivet Networks has a new Killer Networking product, but it isn't a line of NICs or Wireless adapters; it's actually a combination of both interfaces (including a minimum of three Gigabit Ethernet ports) that combine to turn your PC into switch and a Wi-Fi extender. They call the new product Killer xTend, and Rivet Networks has partnered with MSI and GIGABYTE to bring the new technology to market.
"Killer xTend delivers powerful network extension capabilities to your computer by integrating a network switch that includes at least three Killer Ethernet ports and using a Killer Wireless-AC module as a Wi-Fi extender. This allows your computer to share its network access with other nearby wired and wireless devices with a strong, powerful network connection.
Consumers no longer need to mess with switches and network extenders that are expensive and difficult to configure. Instead, they can use Killer’s innovative new xTend Technology to connect devices such as gaming consoles, smart phones and tablets directly to their gaming PCs. Killer xTend keeps your games, voice, and video fast and smooth because high priority traffic on the Killer PC is prioritized above the traffic from connected devices. Killer xTend also delivers amazing speeds – with potential throughput up to 1 Gbps for each Killer E2500 plus another 867 Mbps for the Killer Wi-Fi module."
The first motherboard launching with Killer xTend is the MSI Z270 GODLIKE GAMING, with three Killer E2500 NICs and a Killer Wireless-AC 1535 module onboard.
"...the new GODLIKE adapts the Killer™ xTend technology as well and delivers powerful network extension capabilities by integrating a network switch that includes 3 Killer Ethernet ports and a Killer Wireless-AC module as a Wi-Fi extender. This allows the GODLIKE GAMING to provide the network access to other nearby wired and wireless devices with a strong, powerful network connection. Gamers no longer need to mess with switches and network extenders that are expensive and difficult to configure – instead they can use Killer’s innovative new xTend Technology to connect devices such as gaming consoles, smart phones, and tablets directly to your gaming PC. The Killer xTend keeps your games, voice, and video fast and smooth because high priority traffic on the Killer PC is prioritized above the traffic from connected devices. Killer xTend also delivers amazing throughput to your home – with potential throughput up to 1 Gbps for each Killer E2500 plus another 867 Mbps for the Killer Wi-Fi module."
GIGABYTE's AORUS Gaming Series will include Killer xTend, though no specific models were mentioned in the press release from Rivet Networks.
Full press release after the break.
Even before the formulation of the term "Internet of things", Steve Gibson proposed home networking topology changes designed to deal with this new looming security threat. Unfortunately, little or no thought is given to the security aspects of the devices in this rapidly growing market.
One of Steve's proposed network topology adjustments involved daisy-chaining two routers together. The WAN port of an IOT-purposed router would be attached to the LAN port of the Border/root router.
In this arrangement, only IOT/Smart devices are connected to the internal (or IOT-purposed) router. The idea was to isolate insecure or poorly implemented devices from the more valuable personal local data devices such as a NAS with important files and or backups. Unfortunately this clever arrangement leaves any device directly connected to the “border” router open to attack by infected devices running on the internal/IOT router. Said devices could perform a simple trace-route and identify that an intermediate network exists between it and the public Internet. Any device running under the border router with known (or worse - unknown!) vulnerabilities can be immediately exploited.
Gibson's alternative formula reversed the positioning of the IOT and border router. Unfortunately, this solution also came with a nasty side-effect. The border router (now used as the "secure" or internal router) became subject to all manner of man-in-the-middle attacks. Since the local Ethernet network basically trusts all traffic within its domain, an infected device on the IOT router (now between the internal router and the public Internet) can manipulate or eavesdrop on any traffic emerging from the internal router. The potential consequences of this flaw are obvious.
The third time really is the charm for Steve! On February 2nd of this year (Episode #545 of Security Now!) Gibson presented us with his third (and hopefully final) foray into the magical land of theory-crafting as it related to securing our home networks against the Internet of Things.