Wasting two hours on an Airport Express setup

by Volker Weber

I wasted a good two hours this week getting an Airport Extreme (AE) to work. The owner has a WLAN in place that I secured a few month ago with WEP. The new AE was to either hook up the network to the stereo, or the printer to the network.

The basic task seemed so simple. You hook up the AE to a power outlet, then join its WLAN, fire up the AirPort Express Assistant (AEA) on the Mac/PC and configure it to join the existing network. However, there was no existing network. WTF?

The network was not in the same configuration that I left it a few months ago. Someone had decided it would be much safer to hide the SSID, in a neighborhood that has lots of other WLANs, some of them without encryption at all. Yeah, sure. As if anybody would bother to crack your network, when there is a free one 5 channels away. Talking about channels, the WLAN was on channel 8 and the neighbor with on channel 6. That is a 2-channel separation which is not too smart. Alas, with the hidden SSID, how could the neighbor make a better choice? Time for a rant:

<rant>Hiding the SSID in a WLAN is about as useful as driving at night with your lights off. It works very well for the military, but everybody else puts themselves into more danger than it's worth.</rant>

So once that was cleared up, the AEA was able to see the existing WLAN and asked for the password. Entered that, the AE rebooted. And did not show up on the network. Huh?

First thing you try is, you switch off security on the existing network, go back to square one, and repeat the procedure. That worked. So it was something with this "password". To cut a long story short:

- never use WEP "passwords"
- use HEX keys instead
- if you enter the HEX key into a password field, then put a $ in front of the key

Nobody tells you that. At least not in the documentation. Probably because Apple assumes that you have an all-Apple setup, where all the devices share the same idea of what a password is. So, today we have an AE update to 4.01. See what they worked on? Third party access points WEP keys.

airportextreme401.png

Comments

This relates to a one hour session I had last week, trying to get my Windows XP SP2 laptop into a secured network. The owner of the WLAN had a "password" that was only 8 characters long. XP does not allow me to enter that short a password...

Finally we found the HEX value and entered that - and presto - it worked. (On XP, don't put a $ in front, just enter the hex values directly)

Jens-Christian Fischer, 2004-08-27

Tanks a lot, you saved me about one or two hours! I'm going to configure an AE tonight ;-)

Thomas Lang, 2004-08-27

I have an AE for testing since yesterday. Could not get it up and running as well - and i have an Airport Extreme Network (= all Apple). Same phenomenon - set up the AE with the assistant, then it reboots and does not show up.

I had WPA encryption first. Switched that off and used no encryption (just the MAC address whitelist), but that did not help at all.

Haven't tried it with the 4.0.1 update yet (i'm at the office right now).

Thomas, 2004-08-27

Good hint - but there are also the message that WEP Password are not working with "older" Cards only from apple last year. Personally, i run a iBook and a FSC Notebook with newer WLAN Card (since 2 months - don´t know the version right know :-> ) over airport express station, there are no problems to connect w/in normal Passes.

cheers
Ingo

Ingo Harpel, 2004-08-27

Spent several hours here in Spain setting up a secure WLAN with Win98 and WinXP. Got there in the end, but oof, what a slog. Especially when the wireless router has a Telefonica ’wizard‘ interface..!

Ben Poole, 2004-08-27

The whole WLAN security discussion is totally pointless in crowded city scenarios, as you already say: Why bother cracking a network when a free one is 5 Channels away. But: what, if the locked down WLAN just looked much, much more interesting? ;-)

We would not have these WLAN security issues if electrical engineers would not have tried to make the job of cryptographers, in the first place. Preshared keys (WPA-PSK) are a little improvement, but if you have to guard serious data, you'll be stuck with IPSec, anyway.

Interesting hint with the '$' sign for hex keys, though.

Regards,
/k

Karsten W. Rohrbach, 2004-08-27

Had the same problems on setting up my airport express.
Apple Airport Express: In The Air Tonight ...
Apple did a good job in designing AE but a bad job explaining how to set it up.

Wolfgang, 2004-08-28

Indeed. Exactly the same two problems.

- You created the first one yourself by hiding the SSID. Shame on you. :-)

- Apple created the second by not understanding the HEX value. This has been changed with version 4.01. I checked this yesterday.

The reset is explained in the manual, and was easy to find there.

Volker Weber, 2004-08-28

Some time ago I stumbled over one or other airport document/blog that I printed for safekeeping (and prompty lost) where they dscribed the problem with entering WEP passwords as that they need to be a certain lenght (and no longer).

eg for a 40-bit key you needed to type in exactly 5 characters (or somesuch, I can't find the docs !!) for a 128-bit key you needed to type in that many characters, etc.. In windows they just throw away the extra chars, while the mac does not do this.

Has anybody heard of this (or something that resembles the above ramblings) ?

Don't blame me, blame the indian resto that gave me good wine this noon !

Alex, 2004-08-30

Recent comments

Hilbert Trekel on Why Apple AirPods Came to Be Everywhere :: GQ at 17:54
Frank Stoermer on Why Apple AirPods Came to Be Everywhere :: GQ at 12:48
Frank Stoermer on Why Apple AirPods Came to Be Everywhere :: GQ at 12:45
Volker Weber on Why Apple AirPods Came to Be Everywhere :: GQ at 12:28
Volker Weber on Why Apple AirPods Came to Be Everywhere :: GQ at 12:26
Hilbert Trekel on Why Apple AirPods Came to Be Everywhere :: GQ at 10:08
Alexander Siemes on Why Apple AirPods Came to Be Everywhere :: GQ at 02:37
Volker Weber on Why Apple AirPods Came to Be Everywhere :: GQ at 23:13
Hilbert Trekel on Why Apple AirPods Came to Be Everywhere :: GQ at 23:07
Bastian Anthon on Why Apple AirPods Came to Be Everywhere :: GQ at 21:33
Volker Weber on The Apple Watch keeps me hooked at 19:12
Manfred Wiktorin on The Apple Watch keeps me hooked at 18:42
Armin Auth on Lange erwartet :: Neue AirPods at 15:24
Jochen Schug on Lange erwartet :: Neue AirPods at 17:59
Michael Hertlein on Lange erwartet :: Neue AirPods at 14:53
Patrick Bohr on Lange erwartet :: Neue AirPods at 11:00
Roland Dressler on Lange erwartet :: Neue AirPods at 10:43
Arne Sigurd Rognan Nielsen on Now is a good time to buy a new iMac at 10:40
Frank Köhler on Lange erwartet :: Neue AirPods at 18:55
Jochen Schug on Lange erwartet :: Neue AirPods at 17:28
Michael Hertlein on Lange erwartet :: Neue AirPods at 16:52
Friedrich Holstein on Lange erwartet :: Neue AirPods at 16:41
Volker Weber on Lange erwartet :: Neue AirPods at 14:43
Michael Hertlein on Lange erwartet :: Neue AirPods at 13:44
Stefan Kremer on Lange erwartet :: Neue AirPods at 12:44

Ceci n'est pas un blog

I explain difficult concepts in simple ways. For free, and for money. Clue procurement and bullshit detection.

vowe

Contact
Publications
Stuff that works
Amazon Wish List
Frequently Asked Questions

rss feed  twitter  amazon

Local time is 18:38

visitors.gif

buy me coffee

Paypal vowe