(no title)
benlivengood | 3 days ago
I'm curious if I missed something because that doesn't sound like it allows the worst kind of attacks, e.g. drive-by with no ability to associate to APs without cracking keys.
benlivengood | 3 days ago
I'm curious if I missed something because that doesn't sound like it allows the worst kind of attacks, e.g. drive-by with no ability to associate to APs without cracking keys.
tialaramex|3 days ago
Their University example is pertinent. The victim is an Eduroam user, and the attacker never has any Eduroam credentials, but the same WiFi hardware is serving both eduroam and the local guest provision which will be pretty bare bones, so the attacker uses the means described to start getting packets meant for that Eduroam user.
If you only have a single appropriately authenticated WiFi network then the loss of isolation doesn't matter, in the same way that a Sandbox escape in your web browser doesn't matter if you only visit a single trusted web site...
dijit|3 days ago
benlivengood|3 days ago
vanhoefm|3 days ago
What we can do is that, when an adversary is connected to a co-located open network, or is a malicious insider, they can attack other clients. More technically, that we can bypass client isolation. We encountered one interesting case where the open Wi-Fi network of a university enabled us to intercept all traffic of co-located networks, including the private Enterprise SSID.
In this sense, the work doesn't break encryption. We bypass encryption.
If you don't rely on client/network isolation, you are safe. More importantly, if you have a router broadcasting a single SSID that only you use, we can't break it.
delBarrio|3 days ago
pdonis|2 days ago
To clarify, the passphrase for each SSID is different, and the question is whether, first, an client that doesn't know any of the passphrases can somehow attack other clients who do, and second, whether a client that knows the passphrase for one SSID can attack clients connected to the other SSID (which has a different passphrase)?
NetMageSCW|3 days ago
blobbers|3 days ago
Thanks for your work on the topic! This is quite interesting!
MetaWhirledPeas|1 day ago
- Buy cheap IOT device
- Isolate it on guest network
- IOT device is compromised (or shipped that way)
- IOT device now has clear access to traffic on both your guest and primary networks
Is that accurate?
nickburns|3 days ago
Not to minimize the recon value of the plaintext stuff. But not really fair to say you're 'bypassing' any encryption but for the WPA-specific kind.
hpdigidrifter|2 days ago
Absolutely love your work, go strong. I click these thread and always expect your name to pop up
upboundspiral|3 days ago
bronco21016|3 days ago
I haven’t paid attention to one in a while but I seem to remember the need to authenticate with the guest network using Xfinity credentials. This at least makes it so attribution might be possible.
1bpp|3 days ago
happyPersonR|3 days ago
I turn WiFi mine off and use my own WiFi ap.
ProllyInfamous|3 days ago
vee-kay|3 days ago
[deleted]
strongpigeon|3 days ago
Still an interesting attack though.
NetMageSCW|3 days ago
ectospheno|3 days ago
wat10000|3 days ago