logoalt Hacker News

jcalvinowenstoday at 5:31 PM2 repliesview on HN

> Essentially everyone with the SSID on multiple access point MAC addresses can get pwned

You still have to be able to authenticate to some network: the spoofing only allows users who can access one network to MITM others, it doesn't allow somebody with no access to do anything.

In practice a lot of businesses have a guest network with a public password, so they're vulnerable. But very few home users do that.


Replies

economistbobtoday at 5:44 PM

I run a website, video game servers, and Nextcloud. I have the nextcloud set to only allow access from my IP. It has to be open to the world with a domain name so I can use LetsEncrypt certs so it cannot only use private ip addresses which cannot be easily configured and trusted for https.

I have been relying on EAP TLS via wifi so my phones could upload their photos and videos to Nextcloud.It was way cheaper than doing it via AWS, which is what I used to do and used ethernet LAN connections only. If this works asynchronously across time to allow authentication to my network which uses EAP TLS, will knock me out of being able to use Nexctloud on my mobile devices since plugging an ethernet in after I take photos is too cumbersome to do very often.

I love Nextcloud, but do not want to pay Amazon for EC2 etc.

My read is this allows them to mimic both client and access point to assemble the handshake and obtain radius authentication. Rather than have to verify a certificate on the client or crack complex passwords, they pretend to the client sending the response it sends when the certificate is verified. Then they switch MAC to the SSID MAC and send the next part to the client. Previous evil twin attacks were one sided rather than basic frame assemblers.

I read that paper as describing a successful reconstruction of the Radius authentication handshakes at layer 2 after the fact for use later rather than caring about actual certificate validations. Basically handing a three letter agency quality tool to the Kali Linux fan club.

I am hoping I read it wrong,

show 2 replies
2OEH8eoCRo0today at 5:36 PM

It is common for ISPs to issue network equipment that enable a guest network by default. I wonder if those are vulnerable.