29 comments

  • benlivengood21 hours ago
    As far as I can tell, all of these attacks require the attacker to already be associated to a victim&#x27;s network. Most of these attacks seem similar to ones expected on shared wifi (airports, cafes) that have been known about for a while. The novel attacks seem to exploit weaknesses in particular router implementations that didn&#x27;t actually segregate traffic between guest and normal networks.<p>I&#x27;m curious if I missed something because that doesn&#x27;t sound like it allows the worst kind of attacks, e.g. drive-by with no ability to associate to APs without cracking keys.
    • tialaramex21 hours ago
      The attacker doesn&#x27;t need to be connected to the victim&#x27;s network, only to the same hardware, the hardware&#x27;s loss of isolation is the unexpected problem.<p>Their University example is pertinent. The victim is an Eduroam user, and the attacker never has any Eduroam credentials, but the same WiFi hardware is serving both eduroam and the local guest provision which will be pretty bare bones, so the attacker uses the means described to start getting packets meant for that Eduroam user.<p><i>If</i> you only have a single appropriately authenticated WiFi network then the loss of isolation doesn&#x27;t matter, in the same way that a Sandbox escape in your web browser doesn&#x27;t matter if you only visit a single trusted web site...
      • dijit20 hours ago
        I should reinforce this point by saying that it&#x27;s the <i>default</i> position for &quot;guest&quot; networks to be using the same hardware as &quot;secure&quot; office wifi and such.
        • TeMPOraL15 hours ago
          I&#x27;d further reinforce this by pointing out that this is what the specific term, <i>guest network</i>, means - it&#x27;s the common name used by router manufacturers to describe an optional feature of serving secondary network from the same hardware, intended for the specific, common use case of serving transient and&#x2F;or less trusted users.<p>This is in contrast to more genetic, descriptive terms like &quot;additional network&quot;, &quot;separate network for guests&quot;, etc.
      • benlivengood20 hours ago
        Yeah, that commercial-grade hardware didn&#x27;t actually isolate at the PHY-MAC layer is a bit surprising. How would they have working VLANs at the AP?
        • eqvinox19 hours ago
          802.11 is kinda poorly designed in this regard, but they <i>do</i> isolate to some degree. I need to read the paper, some claims here have a very strong &quot;misunderstood or wrong or specific vendor problem&quot; smell.
        • thenthenthen9 hours ago
          Fun story, back in uni, if you would spin up a webserver ($ python -m http.server 8000 for example) one could access it from other campuses. We never tried it across countries, but it might (have) worked
          • tialaramex3 hours ago
            That&#x27;s usually just because it&#x27;s the same network, it&#x27;s not a loss of isolation.<p>It is possible for your university to run a single WiFi network that is multi-campus, and so some &quot;local&quot; packets have to be sent between campuses, whether that&#x27;s a good idea doesn&#x27;t necessarily affect whether it&#x27;s how it was set up.<p>If your university has campuses in other countries (as mine does) it is not likely they use a single WiFi LAN though it isn&#x27;t impossible. However the fact that the networks operated by UCLA, Manchester University and the Sorbonne are all named &quot;eduroam&quot; is just for the pragmatic reason that WiFi devices connect by name, those aren&#x27;t the same WiFI LANs, any more than the guy I know named &quot;Steve Harris&quot; is the bassist from Iron Maiden just because they share the same name.<p>[The Eduroam name has more significance than the coincidence of name, but that&#x27;s all the name is doing here, WiFi devices which trust your local cafe &quot;Coffee WiFi&quot; will also connect to the &quot;Coffee WiFi&quot; offered in a completely different store.]
    • vanhoefm18 hours ago
      I&#x27;m a co-author on the paper: I would personally indeed not use the phrase &quot;we can break Wi-Fi encryption&quot;, because that might be misinterpreated that we can break any Wi-Fi network.<p>What we can do is that, when an adversary is connected to a co-located open network, or is a malicious insider, they can attack other clients. More technically, that we can bypass client isolation. We encountered one interesting case where the open Wi-Fi network of a university enabled us to intercept all traffic of co-located networks, including the private Enterprise SSID.<p>In this sense, the work doesn&#x27;t <i>break</i> encryption. We <i>bypass</i> encryption.<p>If you don&#x27;t rely on client&#x2F;network isolation, you are safe. More importantly, if you have a router broadcasting a single SSID that only you use, we can&#x27;t break it.
      • pdonis7 hours ago
        So if you&#x27;re running multiple SSIDs on a single router, but all of them use encryption and require a passphrase (i.e., none of them are open), the attacks you are describing don&#x27;t work?<p>To clarify, the passphrase for each SSID is different, and the question is whether, first, an client that doesn&#x27;t know any of the passphrases can somehow attack other clients who do, and second, whether a client that knows the passphrase for one SSID can attack clients connected to the other SSID (which has a different passphrase)?
        • isomorphic5 hours ago
          My interpretation:<p>First, they can&#x27;t attack a WiFi access point for which they do not know any password(s). Thus your multi-SSID access point with multiple passwords is &quot;safe&quot; from this particular attack.<p>However, second, they <i>can</i> attack an access point for which they know <i>any</i> password, gaining access to clients on the other SSIDs. This means your security is now effectively only the security of your worst SSID&#x27;s password. It also may defeat your purpose in having multiple SSIDs&#x2F;passwords in the first place.
      • delBarrio17 hours ago
        Hi and thanks so much for the valuable research!! I know it has been asked a lot here already, and probably some in-deep reading would help figure that out by myself. But I’ve noticed that you used Cisco 9130 APs, and noticed only part of the attack work on those. So wanted to ask whether you tested those with just IP based network separation, or also the VLAN-based one? Also, since you’ve mentioned the findings have been communicated to the vendors and the WiFi alliance alike, may I ask you to maybe share a CVE number here? I (as probably a lot of us here), use some of the hardware mentioned for personal goals&#x2F;hobby in my home setup, and find it fun to keep that setup reasonably protected for the sake (fun) of it. Much appreciated!
        • vanhoefm15 hours ago
          We don&#x27;t have a CVE number. Whether devices&#x2F;networks are affected also highly depends on the specific configuration of the device&#x2F;network. This means that some might interpret some of the identified weaknesses as software flaws, but other weaknesses can also be seen as configuration issues. That&#x27;s actually what makes some of our findings hard to &#x27;fix&#x27;: it&#x27;s easy to say that someone else is responsible for properly ensuring client isolation :) Hence also hard to really assign CVE(s).<p>One of the main takeaway issues, in my view, is that it&#x27;s just hard to correctly deploy client isolation in more complex networks. I think it <i>can</i> be done using modern hardware, but it&#x27;s very tedious. We didn&#x27;t test with VLAN separation, but using that can definitely help. Enterprise devices also require a high amount of expertise, meaning we might have missed some specialised settings.. So I&#x27;d recommend testing your Wi-Fi network, and then see which settings or routing configurations to change: <a href="https:&#x2F;&#x2F;github.com&#x2F;vanhoefm&#x2F;airsnitch" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;vanhoefm&#x2F;airsnitch</a>
          • blobbers15 hours ago
            I think you could apply specific CVEs to specific devices + setting combination, as:<p>CVE 1 : router brand X software version Y.Z configured with client isolation does not provide sufficient isolation that it cannot be broken with air snitch.<p>CVE 2 : router brand A software version B.C configured with client isolation does not provide sufficient isolation that it cannot be broken with air snitch.<p>etc.
          • spockz15 hours ago
            CVE are handed out like candy in Java land for artifacts that have code that only opens up a vulnerability when another package is available and the first artifact is misconfigured. So I think you would be fully in your right to claim a CVE and list all affected versions of devices&#x2F;firmwares there.
      • hpdigidrifter4 hours ago
        &gt;Of course it&#x27;s you &#x2F; partially you<p>Absolutely love your work, go strong. I click these thread and always expect your name to pop up
      • NetMageSCW17 hours ago
        Do separate VLANs behind the different SSIDs provide protection?
        • blobbers16 hours ago
          I would guess that the VLAN separation should prevent it, but perhaps there are implementation errors on the VLAN implementation inside of individual brands of routers?<p>Inter-VLAN routing shouldn&#x27;t be done at the wifi access point, packets would need to be tagged coming out of the wifi AP and switched upstream, unless I&#x27;m mistaken about this.
          • nickburns14 hours ago
            Access points by their very definition are not capable of inter-VLAN routing.
            • blobbers9 hours ago
              I mean yes and no, if an AP is configured for multiple VLANs you could implement inter VLAN routing on the AP itself. It seems stupid but if your software is ported from a switch or a router to an AP, it could include that.<p>But yeah I agree, generally it would be receive traffic on a bssid, tag it, and send it out the wire upstream and let the switch deal with sending it back if its allowed by whatever VLANing policy you have.
        • vanhoefm15 hours ago
          That should definitely help. You still have to double-check the IP routing tables between the VLANs, but most of the time, that should prevent attacks between SSIDs.
      • blobbers16 hours ago
        Hi! In the case of accessing the private Enterprise SSID, was the network VLAN isolated or some other type of virtualization of the bssid?<p>Thanks for your work on the topic! This is quite interesting!
        • vanhoefm15 hours ago
          When testing our own Enterprise devices, VLANs were not used. This was done to understand the impact of client isolation on its own.<p>For the university networks that we tested, I&#x27;d have to ask my co-author. But perhaps my other comment can further contextualize this: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=47172327">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=47172327</a> Summarized, I&#x27;m sure that it is possible to configure devices securely, and VLANs can play an important role in this. But doing so is more tedious and error-prone than one may initially assume, e.g., there is often no single setting to easily do so.
          • benlivengood13 hours ago
            Without 802.1X (EAP), there isn&#x27;t really a way to achieve client isolation against inside attackers who can mount mc-mitm [0] attacks against base stations and clients. The basic problem is single shared secrets that allow anyone who knows it to act as any of the participants (which also breaks privacy). Unfortunately the infrastructure for EAP is unwieldy for unmanaged devices.<p>The real solution is zero-trust network access which gets closer to reality with passkeys; the last mile will be internal (LAN) devices that need a way to provision trusted identities (Bluetooth proximity, QR codes, physical presence buttons, etc.). Quite a pain for smartbulbs or other numerous IoT. If ZTNA is solved then 802.1x is trivial as well for e.g. preventing bandwidth stealing.<p>EDIT: I guess Matter is leading the way here. I need to do some more reading&#x2F;learning on that.<p>[0] <a href="https:&#x2F;&#x2F;www.rit.edu&#x2F;wisplab&#x2F;sites&#x2F;rit.edu.wisplab&#x2F;files&#x2F;2022-09&#x2F;CNS_2022_AnalysisPreAuth.pdf" rel="nofollow">https:&#x2F;&#x2F;www.rit.edu&#x2F;wisplab&#x2F;sites&#x2F;rit.edu.wisplab&#x2F;files&#x2F;2022...</a>
      • nickburns17 hours ago
        Much of (if not the vast majority of the &#x27;worthwhile&#x27;) traffic you&#x27;re intercepting is still encrypted packets though.<p>Not to minimize the recon value of the plaintext stuff. But not really fair to say you&#x27;re &#x27;bypassing&#x27; any encryption but for the WPA-specific kind.
        • vanhoefm16 hours ago
          People who use or rely on client isolation want to prevent inter-client attacks, for whatever reason. We show that this can often be broken. This can be problematic when you have older hardware in your network that is rarely updated, and many then rely on client isolation to mitigate attacks. If everything is encrypted and properly patched, then our attack indeed has less impact, but then there also wouldn&#x27;t have been a good reason to use client isolation in the first place ;)
          • nickburns15 hours ago
            Disagree with your final statement. There&#x27;s good security (and performance) reason to use any&#x2F;all viable network isolation&#x2F;segmentation&#x2F;separation, etc., whenever&#x2F;wherever possible. So-called Wi-Fi &#x27;client isolation&#x27; is but a single network security strategy. No single strategy should be relied upon exclusively, nor avoided for that matter.<p>But it seems we otherwise agree on the overall impact of this vector. My point was mostly about the statement regarding any &#x27;bypassing&#x27; of encryption.
            • vanhoefm13 hours ago
              It indeed seems we overall agree. Even if I may not have always explicitly said &#x27;Wi-Fi encryption&#x27; for convenience, that can be derived from context normally, though it&#x27;s always hard to estimate how people interpret text (and even harder to predict how others write about it :).
    • upboundspiral20 hours ago
      What about XFinity, which by default shares the wifi you pay for with strangers to create access points around the city?
      • bronco2101620 hours ago
        It sounds like this attack would work in that scenario provided the attacker is able to connect to the guest access point.<p>I haven’t paid attention to one in a while but I seem to remember the need to authenticate with the guest network using Xfinity credentials. This at least makes it so attribution might be possible.
        • russdill18 hours ago
          It looks like both clients must be on the same VLAN for the attack to work. They could be connected on different BSSIDs or even different SSIDs, but they still must be on the same VLAN.
          • cluckindan16 hours ago
            If the vulnerability is between layers 1 and 2, wouldn’t that imply that VLAN tagging at layer 2 might not be effective in segregating the traffic?
            • cyberax15 hours ago
              Wireless cards typically don&#x27;t expose the VLAN tags directly. So VLANs should be OK.
      • 1bpp13 hours ago
        As of a few years ago, you could simply spoof your MAC to that of a Comcast subscriber with these and you&#x27;d get unrestricted access on the hotspot.
      • happyPersonR20 hours ago
        This is probably the biggest issue.<p>I turn WiFi mine off and use my own WiFi ap.
        • chrisweekly19 hours ago
          Yeah, along these lines I&#x27;ve always been biased strongly against using ISP hardware beyond the minimum required to connect to the outside world.
      • ProllyInfamous19 hours ago
        See also: Amazon&#x27;s <i>Sidewalk</i> (which shares your network via Ring camerae, e.g.).
      • vee-kay20 hours ago
        [dead]
    • strongpigeon21 hours ago
      That&#x27;s my read as well. It&#x27;s bad for places that rely on client isolation, but not really for the general case. I feel like this also overstates the &quot;stealing authentication cookies&quot;: most people&#x27;s cookies will be protected by TLS rather than physical layer protection.<p>Still an interesting attack though.
      • NetMageSCW17 hours ago
        I think that places that rely on client isolation might be the general case - every public space that has a guest network - e.g. retail stores, doctor’s offices, hotels, hospitals - is probably using client isolation on their wireless network.
    • ectospheno19 hours ago
      Access points frequently have multiple BSSIDs even if just for broadcasting on 2.4 and 5 at the same time. Any multiple AP scenario will have them regardless. Couple that with weak duplicate MAC checking and shared GTK (WPA2-PSK) and the attack becomes trivial. I imagine old hardware will be broken forever. Especially pre 802.11w.
    • wat1000021 hours ago
      That’s my read as well. It’s not good, but it’s not nearly as bad as the headline makes it sound.
  • ProllyInfamous21 hours ago
    &gt;Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure to bind and synchronize a client across these and higher layers, other nodes, and other network names such as SSIDs (Service Set Identifiers). This cross-layer identity desynchronization is the key driver of AirSnitch attacks.<p>&gt;The most powerful such attack is a full, bidirectional machine-in-the-middle (MitM) attack, meaning the attacker can view and modify data before it makes its way to the intended recipient. The attacker can be on the same SSID, a separate one, or even a separate network segment tied to the same AP. It works against small Wi-Fi networks in both homes and offices and large networks in enterprises.<p>----<p>I wardrove back in the early 2000s (¡WEP lol!). Spent a few years working in data centers. Now, reasonably paranoid. My personal network does not implement WiFi; my phone is an outgoing landline; tape across laptop cameras, disconnected antenna; stopped using email <i>many years ago</i>...<p>Technology is so fascinating, but who can secure themselves from all the vulnerabilities that radio EMF presents? Just give me copper&#x2F;fiber networks, plz.<p>----<p>&gt;the next step is to put [AirSnitch] into historical context and assess how big a threat it poses in the real world. In some respects, it resembles the 2007 PTW attack ... that completely and immediately broke WEP, leaving Wi-Fi users everywhere with no means to protect themselves against nearby adversaries. For now, client isolation is similarly defeated—almost completely and overnight—with no immediate remedy available.
    • JKCalhoun20 hours ago
      You would like the film <i>The Conversation (1974)</i>.
      • dizhn17 hours ago
        Enemy of the State is a pretty good light weight successor of that movie as well. It&#x27;s such a fun watch too. (RIP Gene Hackman)
      • ProllyInfamous20 hours ago
        For a second I thought this was the Mel Gibson movie where he proves a <i>Conspiracy Theory (1997)</i>... but <i>Gene Hackman</i>, post-Watergate — with an ensemble cast of eavesdroppers?! — tonight&#x27;s movie, decided.<p>Thank you for your recommendation - it be crazy up in here (head, country, world).
        • teachrdan20 hours ago
          One fan theory is that Gene Hackman plays the same character, decades later, in Enemy of the State (1998).
          • ProllyInfamous19 hours ago
            I&#x27;ll have to rewatch <i>EofState</i>, after tonights <i>Conversation</i>.<p>Fan theories are the only way I ever finished DFWallace&#x27;s trifecta (<i>2000 pages of gruelling chaos</i>). Thank god for fans.
        • jasomill20 hours ago
          Directed by Francis Ford Coppola, Palme d&#x27;Or at Cannes, three Oscar nominations including Best Picture (which, amusingly, it lost to <i>The Godfather Part II</i>).<p>Great movie.
          • ProllyInfamous19 hours ago
            In all fairness, <i>Part II</i> is <i>absolutely incredible storytelling</i>.<p>Are you suggesting <i>The Conversation</i> is <i>even better</i>?! So excited for tonight&#x27;s showtime — I&#x27;ll make an updated reply here, tomorrow morning (with my viewreport).
            • JKCalhoun19 hours ago
              I think they were simply musing as to how one Coppola film lost to another.
              • ProllyInfamous11 hours ago
                [headsmack] gotcha, <i>of course</i>...<p>----<p>Just finished <i>The Conversation</i> (<i>Godfather II</i> rightly won <i>best film</i>); although it features a neat plot twist, I cannot imagine this film being re-watchable.<p>Gene Hackman definitely acts his paranoid heart out, but his relationships with other characters are stuffy&#x2F;forced. Too much dead air whenever he gets frustrated, almost as if there wasn&#x27;t time to reshoot any scenes.<p>The cinematography&#x2F;editing is fine, but the sound quality is terrible (presume it only won <i>best soundtrack</i> due to new sound warping&#x2F;garbling techniques — to a modern listener, it&#x27;s also sort of a cheap schtick). Particularly with female speakers, subtitles are necessary; but then certain dramatic points are <i>wayyyy too loud</i>.<p>----<p>Thanks again for the rec — actually makes me <i>less paranoid</i> about the modern world... just gonna play some sax uncaringly =P
          • rsync19 hours ago
            … also starring Harrison ford…
            • ProllyInfamous13 hours ago
              I&#x27;m watching this right now... Ford is <i>ssoo yyoouunngg!</i><p>It also has Frodo from Godfather.
    • drnick118 hours ago
      It is hard to disagree with this approach. While I still use WiFi, it is a separate subnet and only whitelisted MACs are allowed to use it. Cameras and microphones are always unplugged when not in use, and my phone runs GrapheneOS. I also removed the hands-free microphone in my car, as well as the cellular modem.
      • kayson18 hours ago
        Is MAC whitelisting anything but security theater? Isn&#x27;t it trivial to determine a valid client MAC then spoof it?
        • drnick118 hours ago
          What makes you say that? It does not seem trivial at all to guess a valid MAC.
          • ProllyInfamous18 hours ago
            It&#x27;s not just a guess.<p>Any decent sniffer (e.g. airsnort) can immediately identify all associations between all WiFi&#x2F;Bluetooth devices. DD-WRT (router firmware&#x2F;OS) has this WiFi-associations detector <i>built-in</i> (&quot;local WiFi map&quot;). There is no need to attempt any sort of hack — associations are publicly-broadcast information.<p>Then, just pick any authorized MAC and duplicate as your own.
          • tirant17 hours ago
            The MAC addresses of all the Wi-Fi clients are broadcasted in plain radio format all over the 2.4GHz. It is trivial.
          • 0x45717 hours ago
            It&#x27;s in managmenet frames that you can sniff.
            • ipython14 hours ago
              Does wpa3 pmf fix this particular issue?
              • ProllyInfamous13 hours ago
                This isn&#x27;t considered &quot;broken&quot; — it&#x27;s part of how WiFi works&#x2F;associates.
  • jwr19 hours ago
    Incidentally, this client isolation thing can be extremely annoying in practice in networks you do not control. Hardware device makers just assume that everything is on One Big Wi-Fi Network and all devices can talk to all other devices and sing Kum-Ba-Yah by the fire.<p>Then comes network isolation and you can no longer turn on your Elgato Wi-Fi controlled light, talk to your Bose speaker, or use a Chromecast.
    • ssl-315 hours ago
      That seems less annoying than a hotel full of people who can play whatever they want with my Chromecast. No malice is required for this to happen; it is completely possible to do by mistake.<p>Words like &quot;<i>I&#x27;ve been trying to use the Chromecast!</i>&quot; &quot;The Living Room Chromecast?&quot; &quot;Yes! It says it&#x27;s playing, but I don&#x27;t see anything on the TV screen!&quot; &quot;You hit the play button, right?&quot; &quot;Yeah, and then it keeps stopping on its own!&quot; &quot;Are you sure you plugged it in?&quot; &quot;What in the world is wrong with this dumb thing?&quot; drift between one partner and another in some other in some far corner of the hotel as they innocently trample my efforts to watch old episodes of How It&#x27;s Made.<p>For all of these reasons, I tend to travel with a network that I control. That&#x27;s usually in the form of some manner of very small router -- with a strong preference towards something that runs (or can run) OpenWRT. There&#x27;s a ton of such &quot;travel routers&quot; in the market that are centered around $60 or so that don&#x27;t take up much space at all.<p>I use this to slurp up whatever free wifi or ethernet I can get, or my phone tethering&#x2F;hotspot, and I don&#x27;t worry at all about how someone else&#x27;s network might decide to treat me today. Whatever stuff I bring with me all works about as well as it does at home.
      • abdhass13 hours ago
        Will a travel router like this prevent this sort of attack?
        • ssl-31 hour ago
          Yes.<p>It&#x27;s a real router with a stateful firewall, just like you use at home. Such devices protect you from the nefarious goings-on of the hotel wifi, just as they protect you from the nefarious goings-on of the big bad Internet on the other side of the cable modem at home.<p>A travel router differs only in that it is designed to be physically small.
        • eu1 hour ago
          well, next day you unplug it and move on.
    • wtallis19 hours ago
      Even when <i>not</i> using client isolation, I&#x27;ve run into similar problems simply from having a computer connected over Ethernet instead of WiFi, and whatever broadcast method a gadget uses for discovery didn&#x27;t get bridged between wired and wireless. (Side note: broadcast traffic on WiFi can be disproportionately problematic because it needs to be transmitted at a lowest common denominator speed to ensure all clients can receive it. IIRC, that usually means 6Mbps.)
    • gh02t19 hours ago
      I mean, yeah, isn&#x27;t that the main purpose of client isolation? It sucks when you&#x27;re on something like a locked down university dormitory network but it also stops (or at least, inhibits) other people from randomly turning on your lightbulb or worse, deploying exploits on your poorly engineered IoT device and lighting you up with malware.
    • Chihuahua063319 hours ago
      Adding exceptions for certain protocols, IP ranges (maybe multicast, even) are certainly ways around this, but I imagine with every hole you poke to allow something, you are also opening a hole for data to leak.
      • c0nsumer19 hours ago
        Client isolation is done at L2. You can&#x27;t add exceptions for IP ranges &#x2F; protocols &#x2F; etc this way because that&#x27;s up the stack. Even if devices can learn about each other in other ways, isolation gets in the way of direct communication between them.
        • oasisbob19 hours ago
          The paper makes the point that you need to consider L3 in client isolation too - they call this the gateway bouncing attack. If you can hairpin traffic for clients at L3, it doesn&#x27;t matter what preventions you have at L2
  • sippeangelo21 hours ago
    Bit of a sensational title? This doesn&#x27;t &quot;break WiFi encryption&quot;, only device isolation if the attacker is already in the same network.
    • iamnothere21 hours ago
      Many businesses and universities, and likely some government offices, rely on client isolation for segmenting their networks. It’s a big deal.
      • eqvinox20 hours ago
        It&#x27;s not a big deal because the Ars Technica summarisation is wrong. You can (and enterprise controllers do in fact) tie IPs and MACs to association IDs (8bit number per client+BSS) and thus prevent this kind of spoofing. I haven&#x27;t had time to read the paper yet to check what it says on this.<p>Also client isolation is not considered &quot;needed&quot; in home&#x2F;SOHO networks because this kind of attack is kinda assumed out of scope; it&#x27;s not even tried to address this. &quot;If you give people access to your wifi, they can fuck with your wifi devices.&quot; This should probably be communicated more clearly, but any claims on this attack re. home networks are junk.
        • supernetworks19 hours ago
          This is mostly accurate, to clarify the association IDs tie into what VLANs will be assigned and that does block all of the injection&#x2F;MITM attacks. This also assumes that the VLAN segments are truly isolated from one another, as in they do not route traffic between each other by default including for broadcast and multicast traffic.<p>However client isolation should be a tool people have at their disposal. Consider the need for people to buy cloud IOT devices and throw them on a guest network (<a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2024&#x2F;09&#x2F;massive-china-state-iot-botnet-went-undetected-for-four-years-until-now&#x2F;" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2024&#x2F;09&#x2F;massive-china-state...</a>). It&#x27;s also about keeping web-browsers away from these devices during regular use, because there are paths for malicious web pages to break into IOT devices.
          • eqvinox19 hours ago
            What exactly a VLAN is (or rather, properly: broadcast domain) gets kinda fuzzy in enterprise controller based wifi setups… and client isolation isn&#x27;t really different from what some switches sell as &quot;Private VLAN&quot; (but terminology is extremely ambiguous and overloaded in this area, that term can mean entirely different things across vendors or even products lines).<p>What exact security guarantees you get really depends on the sum total of the setup, especially if the wireless controller isn&#x27;t also the IP router, or you do local exit (as opposed to haul-all-to-controller).
            • supernetworks18 hours ago
              Yep, unfortunately fuzzy. For enterprise wifi deployments, one amusing thing to do when configuring 802.1X is to test ARP spoofing the upstream radius server after associating, and self-authenticate.<p>It might be interesting to go and apply some of the sneaky packet injection mechanisms in this paper actually to try to bypass ARP spoofing defenses.
        • Gigachad17 hours ago
          What can you even do on the local network these days? Most everything is encrypted before it leaves the device. I guess you could cast stuff to the TV.
          • eqvinox16 hours ago
            Probably more of a problem if combined with other exploitable issues in other devices. Like if your TV doesn&#x27;t properly check signatures on its firmware upgrades…
      • john_strinlai21 hours ago
        you are definitely correct that it is potentially a big deal because it breaks expectation around network segmentation and isolation<p>however, most people will read &quot;breaks wi-fi encryption&quot; and assume that it means that someone can launch this attack while wardriving, which they cant.
        • ProllyInfamous20 hours ago
          &gt;assume that it means that someone can launch this attack while wardriving, which they cant.<p>As a former wardriver (¡WEPlol!), it only makes this more difficult. In my US city every home&#x2F;business has a fiber&#x2F;copper switch, usually outside. A screw-driver <i>and you&#x27;re in</i>.<p>Granted, this now becomes a physical attack (only for initial access) — but still viable.<p>----<p>&gt;the next step is to put [AirSnitch] into historical context and assess how big a threat it poses in the real world. In some respects, it resembles the 2007 PTW attack ... that completely and immediately broke WEP, leaving Wi-Fi users everywhere with no means to protect themselves against nearby adversaries. For now, client isolation is similarly defeated—almost completely and overnight—with no immediate remedy available.<p>----<p>I think the article&#x27;s main point is that so many places have similarly-such-unsecured plug-in points. Perhaps even a user was authorized for one WiFi network segment, and is already &quot;in&quot; — bless this digital mess!
          • tmp1042328844219 hours ago
            You have a modem that you can attach to those switches? They’re completely unauthenticated?
            • ProllyInfamous19 hours ago
              Both, yes. Physical hardware isolation.<p>----<p>As a funny personal anecdote, my brother is a state judge. His <i>most personal thoughts &amp; correspondances</i> are crafted upon typewriters (mine as well). He isn&#x27;t officially allowed to just use any phone&#x2F;computer&#x2F;network. He is a &quot;high value target&quot; [0],<p>My personal attorney still doesn&#x27;t use &quot;the cloud&quot; for client documents (which is respectable) — has local servers, mostly offline. No typewriter, though =P<p>----<p>I&#x27;m just an electrician.<p>[0] Does it bother anybody else that Pam Bondi has reports <i>specifically of which documents each congressman reviewed</i> (photographed by AP, during recent testimony)?
      • athrowaway3z21 hours ago
        Meh. The computers that:<p>- must not be accessible because their services don&#x27;t use authentication&#x2F;encryption<p>- and share a wifi with potential attackers<p>is just not that large.<p>They exist, but the vast majority runs in places that don&#x27;t care about security all that much.<p>This should be a signal to fix the two things I mention, not to improve their wifi&#x2F;firewall security.
      • _bernd19 hours ago
        In addition to equvinox (hey again): In enterprise networks you should rely on 802.1x or what&#x27;s also valid use case is the use of ipsec to ensure the local client connection is &quot;safe&quot;.
        • supernetworks19 hours ago
          Some 802.1x have inherent mitm attacks that have been called out since 2004 and never got the v2 (<a href="https:&#x2F;&#x2F;www.rfc-editor.org&#x2F;rfc&#x2F;rfc6677.html" rel="nofollow">https:&#x2F;&#x2F;www.rfc-editor.org&#x2F;rfc&#x2F;rfc6677.html</a>). EAP-TLS however is the best practice here + VLANs.
          • _bernd18 hours ago
            What do you think about to just use open networks and the use of IPsec&#x2F;wireguard?
      • jeffbee21 hours ago
        Anyone who <i>relies</i> on client isolation was just waiting to get pwned anyway.
        • ProllyInfamous19 hours ago
          This is effectively <i>victim blaming</i>. Most of us are just users. Even <i>corporate users</i> (relying upon other contractors&#x27; default configurations).<p>Is it grandma&#x27;s fault that her ISP-issued router came with vulnerabilities exposing mammy&#x27;s entire digital life?<p>On a massive scale, this is a huge security disclosure of the hardware -level.<p>—justbee
    • vanhoefm18 hours ago
      I&#x27;m a co-author on the paper: I would personally not use the word <i>break</i> but instead <i>bypass</i>, to indeed clarify we can&#x27;t just &#x27;break&#x27; any network. We specifically target client isolation, which is nowadays often used, and that proved possible to bypass. If you don&#x27;t rely on client&#x2F;network isolation, you are safe.
  • economistbob20 hours ago
    I just read the paper, and my take is that practically every home wifi user can now get pwned since most WiFi routers use the same SSID and 2.4 and 5Ghz. It can even beat people using Radius authentication, but they did not deep dive on that one. I am curious about whether the type of EAP matters for reading the traffic.<p>Essentially everyone with the SSID on multiple access point MAC addresses can get pwned.<p>Neighhood hackers drove me to EAP TLS a few years ago, and I only have it on one frequency, so the attack will not work.<p>The mitigation is having only a single MAC for the AP that you can connect to. The attack relies on bouncing between two. A guest and regular, or a 2.4 and 5, etc.<p>I need to research more to know if they can read all the packets if they pull it off on EAP TLS, with bounces between a 2.4 and 5 ghz.<p>It is a catastrophic situation unless you are using 20 year old state of the art rather that multi spectrum new hotness.<p>It might even get folks on a single SSID MAC if they do not notice the denial of service taking place. I need to research the radius implications more. TLS never sends credentials over the channel like the others. It needs investigation to know if they get the full decryption key from EAP TLS during. They were not using TLS because their tests covered Radius and the clients sending credentials.<p>It looks disastrous if the certificates of EAP TLS do not carry the day and they can devise the key.<p>That is my take.
    • Sytten20 hours ago
      They still need to be able to connect to one of the network no? So a home network without guest would be fine is my understanding?
      • economistbob20 hours ago
        It requires disassociating and reassociating to the MAC so it requires two, which would cause a denial of service one would notice while watching it. Whether they can denial of service their way to the key, while someone is not actively watching, was not addressed. The paper is about essentially getting data from clients when there are two MACs. They glossed over the one MAC situation by saying someone would notice it so it was not useful.<p>My concern is doing it asynchronously against things when no one is watching.<p>Basically it takes turn being the client and the AP both so that it can get the traffic from both. It is an evil twin attack doubled.<p>It might have broken EAP TLS.<p>If your wifi is off when you are not using it and you are not getting denial of serviced while using it and you have only one Mac for your SSID, this attack is not occuring.
      • varispeed19 hours ago
        Social vector? Come up with some tradesperson spiel if person invites home, ask for wifi password, you are in.<p>Some people also have passwords easy to break. Friend of mine literally had &quot;hunter22&quot; as WiFi password.
        • economistbob19 hours ago
          I had organized neighbors who broke WPA3 using tools, i disabled downgrade to WPA2 and they still broke it. I had one that setup an evil twin to catch my Linux login They stole the IP of one of boxes so they could get my login, and joined my network to setup the credential stealer. I caught this when my password didn&#x27;t work at the ssh login. That was an apartment and they knew when I caught them.<p>The problem is not wardrivers. The problem is your neighbors running 24x7 cyber operations. It happens everywhere. When I moved to a house there was a persistent attacker, and finally I setup my own key and authentication infrastructure.<p>They broke everything.<p>Finally I had to go EAP TLS and rotate certificates every three months.<p>Evil twin attack that keeps switching sides... The first of its kind, soon to be automated into a single button if it isn&#x27;t already.<p>Does the temporal key mechanisms prevent them from taking a key they denial of serviced their way to while I was work -- do the temporal mechanisms prevent them from sniffing all my packets when I get home. They will not use it to get data during the denial of service.... But if they can get that radius key and use it five hours later during some backups or something...<p>That is the question.
          • kyboren14 hours ago
            Where the fuck do you live?<p>Both an apartment you lived in and a house you moved to had neighbors who cracked your WPA3 network and compromised your infrastructure?<p>Also: You use EAP TLS on your home network but not SSH keys?
          • StilesCrisis19 hours ago
            Is it possible that you have undiagnosed schizophrenia?
    • jcalvinowens20 hours ago
      &gt; Essentially everyone with the SSID on multiple access point MAC addresses can get pwned<p>You still have to be able to authenticate to some network: the spoofing only allows users who can access one network to MITM others, it doesn&#x27;t allow somebody with no access to do anything.<p>In practice a lot of businesses have a guest network with a public password, so they&#x27;re vulnerable. But very few home users do that.
      • economistbob19 hours ago
        I run a website, video game servers, and Nextcloud. I have the nextcloud set to only allow access from my IP. It has to be open to the world with a domain name so I can use LetsEncrypt certs so it cannot only use private ip addresses which cannot be easily configured and trusted for https.<p>I have been relying on EAP TLS via wifi so my phones could upload their photos and videos to Nextcloud.It was way cheaper than doing it via AWS, which is what I used to do and used ethernet LAN connections only. If this works asynchronously across time to allow authentication to my network which uses EAP TLS, will knock me out of being able to use Nexctloud on my mobile devices since plugging an ethernet in after I take photos is too cumbersome to do very often.<p>I love Nextcloud, but do not want to pay Amazon for EC2 etc.<p>My read is this allows them to mimic both client and access point to assemble the handshake and obtain radius authentication. Rather than have to verify a certificate on the client or crack complex passwords, they pretend to the client sending the response it sends when the certificate is verified. Then they switch MAC to the SSID MAC and send the next part to the client. Previous evil twin attacks were one sided rather than basic frame assemblers.<p>I read that paper as describing a successful reconstruction of the Radius authentication handshakes at layer 2 after the fact for use later rather than caring about actual certificate validations. Basically handing a three letter agency quality tool to the Kali Linux fan club.<p>I am hoping I read it wrong,
        • dizhn17 hours ago
          &gt; I have the nextcloud set to only allow access from my IP. It has to be open to the world with a domain name so I can use LetsEncrypt certs so it cannot only use private ip addresses which cannot be easily configured and trusted for https.<p>I would put that nextcloud instance on a private&#x2F;vpn IP and not expose it. For the letsencrypt you can use DNS based approval. Cloudflare DNS is pretty easy to configure for example, they also support setting DNS records for private IPs which I understand is not standard. (If it&#x27;s on a private IP you don&#x27;t strictly need HTTPS anyway). Wireguard is ideal for this kind of thing and it works well on mobile as well.<p>If the above quoted piece is the entirety of your requirements there are a lot of other ways to solve the same issue. Tunnels, reverse proxies etc.<p>EDIT: Letsencrypt just recently add a new authentication method which uses a one time TXT entry into your DNS record.
        • jcalvinowens18 hours ago
          I admittedly don&#x27;t have practical experience with RADIUS, but I read it as a more narrow attack:<p>&gt; We verified that an attacker, having intercepted the first RADIUS packet sent from the enterprise AP, can brute-force the Message Authenticator and learn the AP passphrase.<p>I thought RADIUS fundamentally negotiates based on a PSK between the AP and the RADIUS box, which the attacker doesn&#x27;t have? They&#x27;re saying this gives you the ability to brute force that PSK, but if the PSK isn&#x27;t weak (e.g. a dictionary word) that&#x27;s hopeless.
          • simoncion16 hours ago
            &gt; I thought RADIUS fundamentally negotiates based on a PSK between the AP and the RADIUS box, which the attacker doesn&#x27;t have?<p>Are you talking about the secret shared between the NAS and the RADIUS server? It&#x27;s only used to scramble <i>some</i> attributes (like MS-MPPE-Send-Key), but not all of them. Message-Authenticator is one that&#x27;s not scrambled. Looking at this FreeRADIUS dictionary file I have, I see 42 out of ~6000 attributes that are scrambled.<p>Anyway, yeah, if you have a bigass shared secret, it&#x27;s going to be infeasible to guess. I&#x27;m pretty sure that the long-standing very, very strong suggestion for operators has been something like &quot;If you don&#x27;t co-locate your RADIUS server and your NAS, then you <i>really</i> need have a bigass shared secret, and probably want to be using something like IPSec to secure the connection between the two.&quot; [0][1]<p>[0] &lt;<a href="https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;doc&#x2F;html&#x2F;rfc3579#section-4.3.3" rel="nofollow">https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;doc&#x2F;html&#x2F;rfc3579#section-4.3.3</a>&gt;<p>[1] &lt;<a href="https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;doc&#x2F;html&#x2F;rfc3579#section-4.2" rel="nofollow">https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;doc&#x2F;html&#x2F;rfc3579#section-4.2</a>&gt;
      • 2OEH8eoCRo020 hours ago
        It is common for ISPs to issue network equipment that enable a guest network by default. I wonder if those are vulnerable.
    • supernetworks19 hours ago
      EAP TLS provides strong authentication, is much better than the other enterprise authentication options, but will not block these lateral attacks from other authenticated devices. The second half of the deployment is putting each identity into a VLAN to defend against the L2&#x2F;L3 disconnects that can occur.<p>I work on <a href="https:&#x2F;&#x2F;supernetworks.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;supernetworks.org&#x2F;</a>. We propose a solution to these flaws with per-device VLANs and encourage per-device passwords as well.<p>More practically the risk for these attacks is as follows. A simple password makes sense for easy setup on a guest network, that&#x27;s treated as untrusted. These passwords can probably be cracked from sniffing a WPA2 key exchange -- who cares says the threat model, the network is untrusted. But this attack lets the insecure network pivot out into the secure one.
      • economistbob19 hours ago
        My consumer grade routers cannot handle all that fancy VLAN stuff. Thanks for mentioning that.
        • wtallis18 hours ago
          More precisely: the manufacturer&#x27;s software on your consumer grade routers refuses to expose that functionality to the end user. They&#x27;re almost always relying on VLANs behind the scenes to separate the WAN and LAN ports.
          • simoncion17 hours ago
            &gt; They&#x27;re almost always relying on VLANs behind the scenes to separate the WAN and LAN ports.<p>I don&#x27;t believe this is true. I expect that what&#x27;s going on there is the WAN and LAN ports on the switch [0] are in separate bridges.<p>Why do you believe that they&#x27;re using VLANs behind the scenes? It seems silly to add and remove a whole-ass VLAN tag to traffic based on what port it comes in on. Do you have switch chip or other relevant documentation that indicates that this is what&#x27;s going on?<p>[0] or WAN and LAN interfaces, if the ports are actually separate, entirely-independent interfaces, rather than bound up in a switch
            • wtallis15 hours ago
              It&#x27;s trivial to look up the switch port configuration of a consumer router once you put OpenWRT on it. The most common topology is the CPU has two RGMII&#x2F;XGMII or similar links to an 8-port switch chip, five more ports of the switch are connected PHYs for external ports and configured for the LAN VLAN, and the last port is connected to a PHY for an external port and configured for the WAN VLAN. This does not result in any VLAN tags being emitted over the wire, but from the perspective of the switch silicon it&#x27;s just one of many possible VLAN configurations. Changing which physical port is the WAN port is as simple as assigning a different switch port to that VLAN. If you <i>did</i> want VLAN tags emitted on a particular port, it&#x27;s a single checkbox or single-character config file change.
            • devilbunny15 hours ago
              &quot;Use WAN as LAN&quot; is a pretty common option in aftermarket firmwares like DD-WRT or OpenWRT. I know that OpenWRT displays them as VLANs.<p>That said, this is in no way my area of expertise.
  • jcalvinowens20 hours ago
    This <i>is</i> a big deal: it means a client on one wifi network can MITM anything on any other wifi network hosted on the same AP, even if the other wifi network has different credentials. Pretty much every enterprise wifi deployment I&#x27;ve ever seen relies on that isolation for security.<p>These attacks are not new: the shocking thing here that apparently a lot of enterprise hardware doesn&#x27;t do anything to mitigate these trivial attacks!
    • Waterluvian20 hours ago
      Like as in me being on the Guest network at a business can then read traffic of the Corporate network?
      • daneel_w20 hours ago
        Yes, if they host the guest network on the same hardware, same transmission path etc. Network &quot;hygiene&quot; will obviously differ from one place to the other.
      • jcalvinowens20 hours ago
        &gt; Like as in me being on the Guest network at a business can then read traffic of the Corporate network?<p>Exactly.
    • winstonwinston12 hours ago
      Yes, though do all of these wifi devices actually have a formal assurance (as in written specification) of network L2&#x2F;L3 isolation between virtual APs?<p>I have some of those wifi APs that do not even provide any sort of isolation besides just implementing multiple SSID on the same wifi radio aka Guest SSID. No guarantee, no isolation.
  • jeroenhd21 hours ago
    Paper discussed in this article: <a href="https:&#x2F;&#x2F;www.ndss-symposium.org&#x2F;ndss-paper&#x2F;airsnitch-demystifying-and-breaking-client-isolation-in-wi-fi-networks&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.ndss-symposium.org&#x2F;ndss-paper&#x2F;airsnitch-demystif...</a>
    • ProllyInfamous15 hours ago
      A paper author is here, discussing this bypass: &lt;<a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;threads?id=vanhoefm">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;threads?id=vanhoefm</a>&gt;
  • vxxzy20 hours ago
    Had to read through all the cruft to get:<p>&quot;If the network is properly secured—meaning it’s protected by a strong password that’s known only to authorized users—AirSnitch may not be of much value to an attacker.&quot;
    • nixpulvis20 hours ago
      IIUC the issue is, you could have a &quot;secure&quot; network and a guest network sharing an AP, and that guest network can access clients on the secure network. Someone did mention the xfinity automatic guest network, which might be a pain to disable?<p>This is likely not a big deal for your home network, if you only have one network, but for many enterprise setups probably much worse.
  • zekica21 hours ago
    This only works for one SSID. Even then, one thing that can mitigate this is using Private-PSK&#x2F;Dynamic-PSK on WPA2, or using EAP&#x2F;Radius VLAN property.<p>On WPA3&#x2F;SAE this is more complicated: the standard supports password identifiers but no device I know of supports selecting an alternate password aside from wpa_supplicant on linux.
    • supernetworks19 hours ago
      Hostapd now has support for multi pass SAE &#x2F;WPA3 password as well. We have an implementation of dynamic VLAN+per device PSK with WPA3 (<a href="https:&#x2F;&#x2F;github.com&#x2F;spr-networks&#x2F;super" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;spr-networks&#x2F;super</a>) we&#x27;ve been using for a few years now.<p>Ironically one of the main pain points is Apple. keychain sync means all the apple devices on the same sync account should share a password for wireless. Secondly the MAC randomization timeouts require reassignment.<p>The trouble with SAE per device passwords is that the commit makes it difficult to evaluate more than one password per pairing without knowing the identity of a device (the MAC) a-priori, which is why it&#x27;s harder to find this deployed in production. It&#x27;s possible for an AP to cycle through a few attempts but not many, whereas in WPA2 an AP could rotate through all the passwords without a commit. The standard needs to adapt.
      • bburky17 hours ago
        Is that the same feature as vlanid= in openwrt&#x27;s wpa_psk_file? <a href="https:&#x2F;&#x2F;openwrt.org&#x2F;docs&#x2F;guide-user&#x2F;network&#x2F;wifi&#x2F;basic#wpa_psk_file" rel="nofollow">https:&#x2F;&#x2F;openwrt.org&#x2F;docs&#x2F;guide-user&#x2F;network&#x2F;wifi&#x2F;basic#wpa_p...</a><p>I was leaning towards using this configuration for splitting devices into VLANs while using one SSID. Yeah, dynamic VLAN+per device PSK would be best, but I&#x27;m probably happy enough with a shared PSK per VLAN to isolate a guest or IoT network. Would this VLAN isolation have prevented this attack? At least to prevent an attacker from jumping between VLANs? (I assume shared PSK per VLAN might be vulnerable to attacking client isolation within the VLAN?)
        • zekica5 hours ago
          Yes, VLAN isolation prevents this - devices in different VLANs use different GMK keys even when connected to the same network.
  • madjam00221 hours ago
    Does anyone know of any good firewalls for macOS? The built in firewall is practically unusable, and if client isolation can be bypassed, the local firewall is more important than ever.<p>I often have a dev server running bound to 0.0.0.0 as it makes debugging easy at home on the LAN, but then if I connect to a public WiFi I want to know that I am secure and the ports are closed. &quot;Block all incoming connections&quot; on macOS has failed me before when I&#x27;ve tested it.
    • runjake21 hours ago
      Little Snitch is probably the most popular one, written my devs who deeply understand macOS firewall architecture.<p><a href="https:&#x2F;&#x2F;obdev.at&#x2F;products&#x2F;littlesnitch&#x2F;index.html" rel="nofollow">https:&#x2F;&#x2F;obdev.at&#x2F;products&#x2F;littlesnitch&#x2F;index.html</a>
      • ProllyInfamous21 hours ago
        Little Snitch is a user-friendly, software-level blocker, only – use with caution.<p>Just FYI: LittleSnitch pre-resolves DNS entries <i>BEFORE you click `Accept&#x2F;Deny`</i>, if you care &amp; understand this potential security issue. Your upstream provider still knows whether you denied a query. Easily verifiable with a PiHole (&amp;c).<p>I liken the comparison to disk RAIDs: a RAID is not a true backup; LittleSnitch is not a true firewall.<p>You need isolated hardware for true inbound&#x2F;outbound protection.
        • gruez20 hours ago
          &gt;Just FYI: LittleSnitch pre-resolves DNS entries BEFORE you click `Accept&#x2F;Deny`, if you care &amp; understand this potential security issue. Your upstream provider still knows whether you denied a query. Easily verifiable with a PiHole (&amp;c).<p>This also feels like an exfil route? Are DNS queries (no tcp connect) logged&#x2F;blocked?
          • ProllyInfamous20 hours ago
            &gt;Are DNS queries blocked?<p>No, not with LittleSnitch (neither in&#x2F;out-bound).<p>When you see the LittleSnitch dialogue (asking to `Accept&#x2F;Deny`), whatever hostname is there has already been pre-resolved by upstream DNS provider (does not matter which option you select). This software pares well with a PiHole (for easy layperson installs), but even then is insufficient for OP&#x27;s attack.
      • mrexcess21 hours ago
        Little Snitch is commercial. If you want largely similar features (focused on egress), check out LuLu: <a href="https:&#x2F;&#x2F;github.com&#x2F;objective-see&#x2F;LuLu" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;objective-see&#x2F;LuLu</a>
        • runjake18 hours ago
          +1 Thanks, I forgot about LuLu!
    • roflchoppa21 hours ago
      <a href="https:&#x2F;&#x2F;objective-see.org&#x2F;products&#x2F;lulu.html" rel="nofollow">https:&#x2F;&#x2F;objective-see.org&#x2F;products&#x2F;lulu.html</a>
    • tiger321 hours ago
      LittleSnitch
  • this-is-why21 hours ago
    Even if they can rewrite the MAC and force a new one via ping, which are usually already disabled, they still can’t eavesdrop on the TLS key exchange. I fail to see how this is a risk to HTTPS traffic? It’s a mitm sure but it is watching encrypted traffic.
    • amiljkovic20 hours ago
      The Ars article mentions: “Even when HTTPS is in place, an attacker can still intercept domain look-up traffic and use DNS cache poisoning to corrupt tables stored by the target’s operating system.” Not sure, but I think this could then be further used for phishing.
      • jcalvinowens17 hours ago
        DNSSEC prevents that if set up properly.
  • kevincloudsec20 hours ago
    every tested router was vulnerable to at least one variant. that&#x27;s what happens when a security feature gets adopted industry-wide without ever being standardized, not a bug.
  • blobbers19 hours ago
    If you&#x27;re a panicking IT guy, from the original paper:<p>&quot;WPA2&#x2F;3-Enterprise. These attacks generally do not work against WPA2&#x2F;3-Enterprise networks...&quot;<p>So this is a protocol attack, not an encryption attack. If you&#x27;re using proper encryption per client, there is no attack available.
    • ProllyInfamous19 hours ago
      Only WPA2&#x2F;3-Enterprise networks <i>which offer no guest network access</i>.
  • champtar14 hours ago
    Just being able to inject traffic is already huge as it allow you to send IPv6 router advertisement, which sometimes allows you to change the DNS config
  • mlhpdx19 hours ago
    It seems like this attack would be thwarted by so called “multi PSK” networks (non-standard but common tech that allows giving each client their own PSK on the same SSID). Is that true?
    • supernetworks19 hours ago
      This attack exploits multi PSK networks precisely. If it&#x27;s all one PSK the attacker can already throw up a rogue AP for WPA3 or just sniff&#x2F;inject WPA2 outright. The back half of a secure multi PSK setup is deploying VLANs for segmentation, to block these attacks.<p>WiFi provides half-way measures with client isolation features that break down when the packets hit L3, or in some cases the broadcast key implementations are deficient allowing L2 attacks. The paper is about all of the fun ways they could pivot across networks, and they figured out how to enable full bidirectional MITM in a wider class of attacks than commonly known or previously published.
  • ErneX20 hours ago
    The attacker needs to be connected to a wireless network if I understood this correctly?
    • ProllyInfamous19 hours ago
      For all users reading this on their own home network: DISABLE ALL GUEST NETWORKS<p>It seems as if approved guest access now == system-wide access (at the hardware level). User compartmentalization <i>no longer works</i>.
      • pluralmonad16 hours ago
        Is this still true if the guest network is on its own isolated vlan?
        • ProllyInfamous15 hours ago
          Correct; this appears to be a hardware-level problem.
  • sgalbincea17 hours ago
    I&#x27;d like to see more enterprise-grade equipment tested.
  • fabioyy18 hours ago
    macsec can encrypt data in ethernet for lan, maybe it can solve this
  • g-b-r20 hours ago
    Tangentially, does anyone know why so many of the (enormous amount of) papers accepted at this San Diego conference is from Chinese researchers? (<a href="https:&#x2F;&#x2F;www.ndss-symposium.org&#x2F;ndss2026&#x2F;accepted-papers" rel="nofollow">https:&#x2F;&#x2F;www.ndss-symposium.org&#x2F;ndss2026&#x2F;accepted-papers</a>)<p>Has China become so prominent in security research?
  • api17 hours ago
    Client isolation is helpful in the real world, but it&#x27;s yet another band aid for the deeper more fundamental problem.<p>If a device is insecure when placed directly onto the Internet with no firewall, it is insecure. Full stop. Everything else is a hack around that fact. Sometimes you have to do that since you can&#x27;t fix broken stuff, but it&#x27;s still broken.
    • NetMageSCW16 hours ago
      Just like it isn’t normal to buy one UPS per server, it is sensible to have one more capable firewall for all your servers, even if it does put you in a M&amp;M situation.
  • iamnothere21 hours ago
    Once again I feel justified in hard wiring all connections. I do have a wireless network for a couple of portable devices, but everything else has a plug and a VLAN.<p>It’s very difficult to have too much network security.
    • NetMageSCW16 hours ago
      Counterpoint: it is trivial to have too much network security - don’t provide power. It is difficult to have just enough network security.
  • aspenmayer19 hours ago
    I think this might be the repo?<p><a href="https:&#x2F;&#x2F;github.com&#x2F;zhouxinan&#x2F;airsnitch" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;zhouxinan&#x2F;airsnitch</a><p>Edit: it’s the same repo as linked in the paper, so it seems likely to be the correct repo, though I didn’t originally find it via the paper.
  • kittikitti15 hours ago
    Other members of my household frequently invite people to my own place that have malicious intent against me. They don&#x27;t like me for reasons like not being a fan of Trump, Drake, or N3on. Unfortunately, this is a risk that many people other than me have to face. This is an eye-opening article as I do provide my guest password to them.<p>I plan on disabling the guest network entirely and utilizing a completely different router for the guest network. As the paper states, an isolated guest network isn&#x27;t standardized. I plan on revisiting my network security once it is.
    • andsoitis11 hours ago
      &gt; Other members of my household frequently invite people to my own place that have malicious intent against me.<p>Are you being abused or something? This sounds ridiculous
  • cs70221 hours ago
    Original source (should replace the current link): <a href="https:&#x2F;&#x2F;www.ndss-symposium.org&#x2F;wp-content&#x2F;uploads&#x2F;2026-f1282-paper.pdf" rel="nofollow">https:&#x2F;&#x2F;www.ndss-symposium.org&#x2F;wp-content&#x2F;uploads&#x2F;2026-f1282...</a><p>Summary: <a href="https:&#x2F;&#x2F;www.ndss-symposium.org&#x2F;ndss-paper&#x2F;airsnitch-demystifying-and-breaking-client-isolation-in-wi-fi-networks&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.ndss-symposium.org&#x2F;ndss-paper&#x2F;airsnitch-demystif...</a> (hat tip: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=47167975">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=47167975</a>)
    • andrewstuart221 hours ago
      Yeah, this is a much clearer source and the abstract gets pretty directly to the point. The first paragraph tells you pretty much everything you need to know before you read more. The Ars article took 4 paragraphs to mention &quot;client isolation&quot; and even longer to get into the meat.
    • tomhow19 hours ago
      Updated, thanks!
    • JumpCrisscross20 hours ago
      @dang, can we get the link and title changed?
      • cwillu20 hours ago
        @dang doesn&#x27;t do anything; email hn@ycombinator.com and they&#x27;ll do something quite responsively.
  • fdefitte7 hours ago
    [dead]
  • genie3io5 hours ago
    [dead]
  • bell-cot21 hours ago
    On the one hand, a seems-solid article by an author I mostly trust.<p>OTOH... with the recent journalistic scandal at Ars Technica, perhaps Dan should have made sure that he spelled &quot;Ubiquity&quot; correctly? (5th para; it&#x27;s correct further down.)
    • John2383221 hours ago
      That&#x27;s an easy autocorrect issue. As someone who write Ubiquiti more often than most.<p>I don&#x27;t even think most editors would know the difference. That&#x27;s the problem with using corruptions of real words as your name.
      • bell-cot4 hours ago
        &gt; I don&#x27;t even think most editors would know the difference.<p>We&#x27;re talking about <i>Ars Technica</i>, not <i>USA Today</i>. Kinda like <i>MotorTrend</i> editors should know what a Z-rated tire is.<p>And I assume you&#x27;ve heard about the their AI fabrication scandal? - <a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;staff&#x2F;2026&#x2F;02&#x2F;editors-note-retraction-of-article-containing-fabricated-quotations&#x2F;" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;staff&#x2F;2026&#x2F;02&#x2F;editors-note-retractio...</a><p>Not a great look, if <i>Ars</i> either doesn&#x27;t know, or can&#x27;t control what they&#x27;re actually publishing.
      • bookofjoe21 hours ago
        I once suggested HN implement auto-correct because there are so many misspellings here. I was quickly downvoted.
    • pinkmuffinere21 hours ago
      IMO spelling mistakes have always been a relatively weak indicator of writing quality, let alone truthiness.
    • g-b-r20 hours ago
      I was indeed very surprised to see that it&#x27;s from Dan Goodin<p>I only read his articles occasionally, but they always impressed me favorably; this one instead... the paper is probably clearer even for less technical people.
  • stebalien21 hours ago
    The article is hot garbage, here&#x27;s the abstract from the paper (<a href="https:&#x2F;&#x2F;www.ndss-symposium.org&#x2F;ndss-paper&#x2F;airsnitch-demystifying-and-breaking-client-isolation-in-wi-fi-networks&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.ndss-symposium.org&#x2F;ndss-paper&#x2F;airsnitch-demystif...</a>):<p>To prevent malicious Wi-Fi clients from attacking other clients on the same network, vendors have introduced client isolation, a combination of mechanisms that block direct communication between clients. However, client isolation is not a standardized feature, making its security guarantees unclear. In this paper, we undertake a structured security analysis of Wi-Fi client isolation and uncover new classes of attacks that bypass this protection. We identify several root causes behind these weaknesses. First, Wi-Fi keys that protect broadcast frames are improperly managed and can be abused to bypass client isolation. Second, isolation is often only enforced at the MAC or IP layer, but not both. Third, weak synchronization of a client’s identity across the network stack allows one to bypass Wi-Fi client isolation at the network layer instead, enabling the interception of uplink and downlink traffic of other clients as well as internal backend devices. Every tested router and network was vulnerable to at least one attack. More broadly, the lack of standardization leads to inconsistent, ad hoc, and often incomplete implementations of isolation across vendors. Building on these insights, we design and evaluate end-toend attacks that enable full machine-in-the-middle capabilities in modern Wi-Fi networks. Although client isolation effectively mitigates legacy attacks like ARP spoofing, which has long been considered the only universal method for achieving machinein-the-middle positioning in local area networks, our attack introduces a general and practical alternative that restores this capability, even in the presence of client isolation.
    • strongpigeon21 hours ago
      A tad sensationalist perhaps, but &quot;hot garbage&quot; is a bit much.
      • stebalien20 hours ago
        Maybe I&#x27;ve just lost all patience for fluff, but I gave up trying to figure out what the attack was from the article pretty quickly where the abstract answered all my questions immediately.
        • bombcar18 hours ago
          They&#x27;ve updated the link to the paper, and the summary there is much clearer (but wouldn&#x27;t drive clicks, obviously).