Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
I wouldn't be relying on tidbits for security advice. They are good people, but there are far better sources of information when it comes to this kind of thing.

The researchers behind KRACK make it very clear both client and AP needs to be patched. They have published an FAQ that confirms it. It is the client that is most important to be patched and most vulnerable. I have not seen one shred of credible evidence that suggests this threat can be mitigated by patching only the AP.
I understand client needs to be protected. But Eero also confirmed that their latest patch will prevent KRACK on unpatched client devices.
 
When exactly do you want to turn off wifi and Bluetooth but not cellular? I am more inclined to turn off cellular and keep BT/wifi connected than the other way around.

I want Bluetooth off because I don't use it, and I want wifi off to prevent tracking.
 
Only iOS 11.1 beta so far. If you’re not going to update to iOS 11, you’re most likely going to remain vulnerable as it seems like Apple stops caring about older iOS versions the minute a newer version is released.

Well that's dumb. If Apple wasn't constantly releasing buggy updates, I'd probably be happily on iOS 11, but I'm not dealing with another year of waiting for Apple to fix everything only to turn around and break it all again.
 

The way I read that reply doesn't equate to it protecting client devices. The reply says, "your eero network should be protected against the KRACK security flaw". I think this means the network OF your Eero devices, mesh network devices are vulnerable against KRACK unless patched - this is what Eero's update does. The reply goes on to say that they recommend updating any connected devices, this means client devices such as iPhones, Android phones, etc.

So I read this as client devices could still be vulnerable even on a patched Eero network.
 
If we don't like both the software and the hardware, we're supposed to just pack our bags and go elsewhere? That's what's insane about being a Mac user. Wait until Apple makes decisions that affect you and you'll change your tune.

Instead you believe Apple should make every change to bend to your will and use case, ignoring the majority? Sounds brilliant.
 
  • Like
Reactions: Agent2015
iOS 11 doesn't help my iPad 2, iPod 3rd Gen, or my iPhone 4S. Apple as a ethical responsibility to provide patches to all of these devices.
Ethical responsibility? Imagine how the android crowd feels right about now.
[doublepost=1508364623][/doublepost]
I think if you re-read my post, you'll see that I'm quite clear that I do NOT expect security updates "forever." It's definitely a line-drawing problem. But what you are characterizing as "over 4 years old" I would say is more like 2 because that's when they STOPPED selling the iPhone 5c - in sept 2015.

So yes, I do expect them to offer basic security patches for products that were still being sold new in Apple stores 2 years ago, no matter when those products were first introduced.

Now, exactly how far back should they go? I'm sure reasonable minds could differ... We'd probably all agree it isn't reasonable to expect a patch for the handful of iPhone 2g units out there still acting as daily drivers on iOS 3, but it doesn't therefore follow that we cut off every OS prior to the current one. Millions of people still use A5 and A6 devices on a daily basis. I think it's not asking too much to ask Apple to patch back to iOS 9, but 10 at the absolute very least.

Remember, we're talking a little coding to patch a single vulnerability, not some custom built lite version of iOS 11 or anything like that. One bug fix. It's honestly just not that big of an ask.
Actually it is a big ask not just of Apple but of all other vendors affected by the vulnerability otherwise this issue would disappear almost immediately. But I think Apple will end up surprising most of the naysayers in short order. As far as other "smart" devices out there especially android based ones, good luck.
[doublepost=1508364807][/doublepost]
Seems time to abandon Apple!
Yes! Time to migrate to the green pastures of Android! (in case you can't tell, I was kidding...at least for me)
[doublepost=1508365192][/doublepost]
I've noticed they seem to be behind the ball on a lot of security issues, taking a few days to patch things. Not as pro-active as they should be if privacy and security are such a focus.
Behind the ball compared to whom? I think the whole industry is behind the ball with situations like this one. Apple is doing as good a job as can be expected considering the magnitude of the problem. Other current platforms will see horrendous delays or probably never be updated at all. I know a lot of android users out there in a world of hurt when they haven't seen a single update much less for KRACK and thats for relatively new hardware. Imagine how they feel.
[doublepost=1508365403][/doublepost]
This is sort of messed up for people who didn't want to update to Buggy iOS 11. They either choose to be unsecure or go to a buggy OS for security.;):D
[doublepost=1508217399][/doublepost]

Samsung has KNOX for extra security layers...some of the best software even for wifi security. Highest level mobile device security software in the world. Options such as browsing only in the secure folder, creating Knox security VPNs, and Enterprise level firewalls secures these devices.
If Knox is so good why are you here? And I don't think Knox is as secure as you would like to believe. Go do a search for Knox vulnerabilities. Law enforcement certainly prefers to crack Samsung/Android devices over iOS devices any day.
[doublepost=1508365875][/doublepost]
Microsoft updates appear to be available for end users now (unless I'm reading this wrong and the new links are still not posted - edit: no I'm informed that KB4042895 is indeed the patch for Window 10).
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080

Refer to the document above for download links for Windows 7, 8, 10 and Windows Server releases. Both 32 bit and 64 bit versions of the update are provided.

The Debian linux wpa package update is available for the latest stable release and also the two previous stable releases.
https://www.debian.org/security/2017/dsa-3999

Right now my Macbook Pro is the only desktop/notebook device in my house without a patch available.
What about Windows 95, 98 ,XP , Vista? Any OS capable of wifi?

I think we will learn much in terms of the Apple response in the next few days.
 
The way I read that reply doesn't equate to it protecting client devices. The reply says, "your eero network should be protected against the KRACK security flaw". I think this means the network OF your Eero devices, mesh network devices are vulnerable against KRACK unless patched - this is what Eero's update does. The reply goes on to say that they recommend updating any connected devices, this means client devices such as iPhones, Android phones, etc.

So I read this as client devices could still be vulnerable even on a patched Eero network.

Yes well Eero devices act as clients, that's how a mesh network works. So Eero's did need patching, as does any wireless extension devices. Most routers can also work in client mode so they need patching too.

I'll need to listen to Steve Gibson's excellent podcast because I know he discusses it this week. But I am absolutely sure patched routers won't do anything to protect you while still using an unpatched client system.
 
Which iOS version is patched? I'm not updating to iOS 11. I'm tired of letting Apple slow my devices down artificially.
This statement is patently false. I running iOS 11.0.3 (and iOS 11.1 Beta 3) in everything from a lowly iPhone 6 (16GB) through a iPhone 7 Plus with no issues whatsoever. Even so I prefer peace of mind of security patches.
 
Only if you have downloaded it before, and it is hidden, I spent three hours looking for it and Sierra on machines last week Thursday, if you did not download it before you cannot now.

I look at the purchases tab in the Mac App Store, and yes, I can download El Capitan. Even older versions of OSX.
 
Thanks for this.
An added step, what if the router acts as a repeater? Ie. In our office and we use airport expresses in corner hallways to extend the coverage to other areas of the office.

I understand it's early, but what do you suggest we do? We just made a switch from wired to wireless too on all our networking........

As long as you have a good Wi-Fi password, and your Wi-Fi is only used by trusted devices, then you are OK.

KRACK does NOT (and cannot) decrypt the password, so for a KRACK Attack to work, the attacker MUST be joined to your network already. Keep your password complex and you will be safe. Your only risk is if a staff member launches the attack from the inside. If you are really concerned, use programmable access points like Ubiquiti's Unifi, which already has firmware available to prevent the attack. While KRACK is launched from a client, it can be prevented with a good access point.
[doublepost=1508373809][/doublepost]



Apple has already patched serious vulnerabilities in the WPA2 Wi-Fi standard that protects many modern Wi-Fi networks, the company told iMore's Rene Ritchie this morning.

The exploits have been addressed in the iOS, tvOS, watchOS, and macOS betas that are currently available to developers and will be rolling out to consumers soon.

A KRACK attack proof-of-concept from security researcher Mathy Vanhoef

Disclosed just this morning by researcher Mathy Vanhoef, the WPA2 vulnerabilities affect millions of routers, smartphones, PCs, and other devices, including Apple's Macs, iPhones, and iPads.

Using a key reinstallation attack, or "KRACK," attackers can exploit weaknesses in the WPA2 protocol to decrypt network traffic to sniff out credit card numbers, usernames, passwords, photos, and other sensitive information. With certain network configurations, attackers can also inject data into the network, remotely installing malware and other malicious software.

Because these vulnerabilities affect all devices that use WPA2, this is a serious problem that device manufacturers need to address immediately. Apple is often quick to fix major security exploits, so it is not a surprise that the company has already addressed this particular issue.

Websites that use HTTPS offer an extra layer of security, but an improperly configured site can be exploited to drop HTTPS encryption, so Vanhoef warns that this is not a reliable protection.

Apple's iOS devices (and Windows machines) are not as vulnerable as Macs or devices running Linux or Android because the vulnerability relies on a flaw that allows what's supposed to be a single-use encryption key to be resent and reused more than once, something the iOS operating system does not allow, but there's still a partial vulnerability.

Once patched, devices running iOS, macOS, tvOS, and watchOS will not be able to be exploited using the KRACK method even when connected to a router or access point that is still vulnerable. Still, consumers should watch for firmware updates for all of their devices, including routers.

Ahead of the release of the update that addresses the vulnerabilities, customers who are concerned about attacks should avoid public Wi-Fi networks, use Ethernet where possible, and use a VPN.

Article Link: Apple Says 'KRACK' Wi-Fi Vulnerabilities Are Already Patched in iOS, macOS, watchOS, and tvOS Betas

Alas, you fail to mention a very important point - KRACK cannot decode the WPA2 password, so any attacker MUST be joined to the network (and therefore know the WPA2 password) before launching any attack. So the attack can only come from INSIDE the network. On a public Wi-Fi, this may be possible, but much more unlikely on a private network. Therefore, unless you have a really easy password for your Wi-Fi, or allow anyone and everyone onto your home/office network, you will be fine.
If you are really worried, WPA2 supports [ASCII] passwords up to 63 characters in length, so creating a really complex one is one way to protect yourself (and don't give it to people you don't trust!).
 
Yes well Eero devices act as clients, that's how a mesh network works. So Eero's did need patching, as does any wireless extension devices. Most routers can also work in client mode so they need patching too.

I'll need to listen to Steve Gibson's excellent podcast because I know he discusses it this week. But I am absolutely sure patched routers won't do anything to protect you while still using an unpatched client system.

We’re in agreement.
 
Most routers can also work in client mode so they need patching too.
Most routers are not in client mode, when bridged yes but Netgear for one states that their routers when in normal router mode are not vulnerable, only when acting as a bridge. So not all AP's need patching straight away but will be of course in the long run depending on their age mind you.

'Routers and gateways are only affected when in bridge mode (which is not enabled by default and not used by most customers). A WPA-2 handshake is initiated by a router in bridge mode only when connecting or reconnecting to a router.'

https://kb.netgear.com/000049498/Se...ies-PSV-2017-2826-PSV-2017-2836-PSV-2017-2837
 
This statement is patently false. I running iOS 11.0.3 (and iOS 11.1 Beta 3) in everything from a lowly iPhone 6 (16GB) through a iPhone 7 Plus with no issues whatsoever. Even so I prefer peace of mind of security patches.

I beg to differ. My friend updated to iOS 11 and he regrets doing it. He says he gets random freezes now and some things don't even load. He's got an iPhone 7 Plus just like me.

If it were possible to revert back to 10.3.3, I'd update to iOS 11 and try it myself, but without the ability to roll back, I can't take the chance in case I don't like it.
 
I want Bluetooth off because I don't use it, and I want wifi off to prevent tracking.

If you don't use BT then surely the toggle in the control centre is not used at all?

Who is tracking you via WiFi?
 
What about Windows 95, 98 ,XP , Vista? Any OS capable of wifi?

I think we will learn much in terms of the Apple response in the next few days.

Microsoft Windows Vista (unsupported) is 10 years old and Windows 7 is 8 years old, so I hope that Apple can match that and support those 8 years old laptops, desktops and OS releases.
 
  • Like
Reactions: bernuli
Yeah, well Wi-Fi has been around for over ten years now and this flaw has just now been discovered. There is literally NO WAY to “get this stuff right to begin with.” Like I have posted once before I worked for AT&T for 34 years in a telephone central office. Digital telephone switches began to be installed in the 1980s and thirty years later those switches are still being patched almost daily. Software development just doesn’t work the way you are expecting it too. There has never been a piece of software released that didn’t require updating or patching. And there never will be.

I wouldn’t say *never*. But, we certainly aren’t quite there yet ... :)

It’s called “formal verification”:

https://www.wired.com/2016/09/computer-scientists-close-perfect-hack-proof-code/
 
What else is it needed? I've had bluetooth off for 8 years and wifi off as necessary and never suffered.

I told two people this weekend about this stupid change and they were pissed that turning off bluetooth in iOS 11 doesnt really nor does it do wifi. They dont want the battery loss for bluetooth even if it is minimal. Why have it on if you have no use for it at all? They both immediately dug into settings to turn off bluetooth properly.

It's a stupid functional change. Off should be off, not some pseudo state. What's the big deal about displaying a message like it had for the last 10 years instructing user to turn on bluetooth or wifi when it needs it??

It's not "no use". It helps save battery in many situations, for instance, when an app requests your location, depending on how many Wi-Fi networks are available, it might not even need to use the GPS because the Wi-Fi location will be enough.
 
Security updates
https://support.apple.com/kb/HT201222

For macOS
WiFi: for macOS High Sierra 10.13, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: an attacker in Wi-Fi range may force nonce reuse in WPA clients (Key Reinstallation Attacks - KRACK)
https://support.apple.com/kb/HT208221

For watchOS 4.1
WiFi: for Apple Watch Series 1 and Apple Watch Series 2
Impact: an attacker in Wi-Fi range may force nonce reuse in WPA clients (Key Reinstallation Attacks - KRACK)
https://support.apple.com/kb/HT208220

For tvOS 11.1
WiFi: for Apple TV 4K
Impact: an attacker in Wi-Fi range may force nonce reuse in WPA clients (Key Reinstallation Attacks - KRACK)
https://support.apple.com/kb/HT208219

For iOS 11.1
WiFi: for iPhone 7 and later, and iPad Pro 9.7-inch (early 2016) and later
Impact: an attacker in Wi-Fi range may force nonce reuse in WPA clients (Key Reinstallation Attacks - KRACK)
https://support.apple.com/kb/HT208222

Not sure if there is anything for iPhone 6 or earlier.
 
Last edited:
  • Like
Reactions: steve123
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.