Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
I generally wait on system/iOS updates so they can get ironed out. Might be doing that on my devices though when I get home tonight.
 
You probably read this already, but just in case...

They updated the original paper (May 2017) to clarify, "attacking macOS and OpenBSD is significantly easier than discussed in the paper."

"We have follow-up work making our attacks (against for example macOS and OpenBSD) significantly more general and easier to execute. So although we agree that some of the attack scenarios in the paper are rather impractical, do not let this fool you into believing key reinstallation attacks cannot be abused in practice."​
Actually I googled VSD and WIFI vulnerability, and discovered similar text. I think the only saving grace for BSD, is the fact that it is less popular than Linux. Obscurity isn’t security, but I am hoping both of the open source sides of these systems get quick patches!
 
  • Like
Reactions: M.PaulCezanne
That's exactly what happened. This was discovered in July, it's public now because vendors have had since then to prepare the patch and release it (sometime today or shortly after). The entire thing is orchestrated so the most number of users can be protected at the same time.
You are correct. To provide some more detail, most manufacturers were informed in late August this year.

https://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4
 
  • Like
Reactions: GalileoSeven
So, everyone who can pick up my Wifi can know what I'm doing.. Thanks to Google every marketing company knows what I'm doing.. Thanks to the terrorist threat, every government seems to know what I'm doing..

I seem to be the only one who doesn't have any idea what I'm doing.
Best response so far. Thanks :)
 
I've been seeing a lot of misinformation about this. This vulnerability only affects CLIENTS. So unless your AP is bridging to another AP, updating the AP will do no good. The clients themselves must be updated.
Not according to every article I've read about the KRACK vulnerability. Every client needs to be updated and the WiFi router itself is one of those clients (anything that is involved in the handshake).
 
HTTPS doesn't save you here.
[doublepost=1508167554][/doublepost]

Yes.

It does seem HTTPS saves you here on 'properly configured websites' in the video their tool seems to remove the lock in the browser address bar on their android device, if you are trained to look for the lock and it is there, it seems you are good?

I'm not clear if ios devices are susceptible to this HTTPS avoidance
 
So, everyone who can pick up my Wifi can know what I'm doing.. Thanks to Google every marketing company knows what I'm doing.. Thanks to the terrorist threat, every government seems to know what I'm doing..

I seem to be the only one who doesn't have any idea what I'm doing.
And thanks to Equifax, every criminal imposter can do everything for you.
[doublepost=1508168269][/doublepost]
Just an FYI from the Crackattacks.com (posted by the people who discovered the vulnerability):



Clear, but in a way "clear as mud" since it really doesn't explain when a router needs or doesn't need an update. Of course all clients need an update.

Hopefully Apple will issue a press release soon to given users guidance as to what has been done, what will be done, along with some sort of time line.
It's all a conspiracy so Apple can increase ethernet dongle sales for Macbook Pros.
 
  • Like
Reactions: iapplelove
I'll just connect my MacBook via Ethernet cable. Problem solved.

Wait. MacBooks don't have Ethernet ports because Apple thinks wireless is all we need.

Yay! Another dongle to buy and use with all my other dongles because only 1 USB-C port
 
Yes. Way too many people are glossing over this. It is the clients, e.g., Macs, iPads, and iPhones that need to be updated. Not the routers. For example, Microsoft has already confirmed that this is patched in the latest update to Windows 10.

Frankly, this is a silver lining. I trust Apple to update iOS and macOS in a timely manner a whole lot more than I trust Netgear to update their firmware ever.

EDIT: I was being unfair to Netgear - they release security updates for my router, R7000, regularly and promptly.
Not according to the articles I've read. Any client involved in the handshake is vulnerable and that includes the WiFi router/access point as it is a client.
 
The attack surface here is huge. Every wifi capable device everybody owns is now a vector. Your smart door lock, IPcam, smart TV, printer, garage door opener, and smart light bulb. Of course iPhones, iPads, Macs, Apple Watches, and every other general purpose computer too.

Once an attacker has access to a device connection on your network, they can compromise that device, then reach out into the network. I repeat: the attack surface is massive. Many devices will not be updated, and this will probably be a security nightmare for years.

The attack is simple to execute also. It does not take a very skilled attacker to execute on this.
 
So somehow a credit card number is being sent without using TLS? Every https site is using it. And the AES key can't be found either without breaking into the client or server.
 
  • Like
Reactions: bearda
I'll just connect my MacBook via Ethernet cable. Problem solved.

Wait. MacBooks don't have Ethernet ports because Apple thinks wireless is all we need.

Yay! Another dongle to buy and use with all my other dongles because only 1 USB-C port
You can solve that old well worn complaint with a hammer then go buy a $400 windows machine.
 
I'll just connect my MacBook via Ethernet cable. Problem solved.

Wait. MacBooks don't have Ethernet ports because Apple thinks wireless is all we need.

Yay! Another dongle to buy and use with all my other dongles because only 1 USB-C port

Your sarcasm aside that plan only works if you live in a one room studio. For the rest of us who live in homes with multiple rooms, some on multiple floors, and no Cat-5 running in our walls Ethernet isn't really a solution, no matter if it's built-in or requires a dongle.
 
This can't be overstated. How many hotels, Starbucks, etc. even know what "firmware" is or how to access their WiFi settings? And just think of all the cheap Chinese routers out there that will never see updates from the manufacturer.

Fortunately, updating the firmware is not actually required. As long as the device OS has been patched, then the hack can't work regardless.
 
If you're technically inclined, Ubiquiti is awesome. I have one of their GB routers and a PoE WAP.

https://www.ubnt.com

Ubiquiti had a number of compatibility issues with Apple hardware in their AC Pro line that kind of swore me off them for a bit. I still have two of them in the closet but I kind of game up on them after months of beta firmware updates trying to resolve the issues. When it did work their throughput to individual clients also tended to be about half of my AirPort Extreme (they tend to be optimized for a bunch of simultaneous clients rather than a small number of high speed connections).

Not saying they make bad equipment, but there are some tradeoffs involved. I love their routers, but have never been impressed by their wireless gear.
 
Will Apple patch an a/c Airport Extreme? Or is it time to purchase a new router? Suggestions for seamless Mac use? :apple:

Having been burned by my Time Capsule after the latest MacOS update (I couldn't recover my files), I went out and bought a new router and NAS machine, both of which were NetGear. The router is their R9000 X10 - which is kind of cool as it provides for ethernet port aggregation between two NICs. And I got NetGear's ReadyNAS 212 storage - which coincidentally also is set up for port aggregation, which means the speed of throughput is double what it normally would be. It's a sweet setup. Bonus: it recognizes Apple products, and has a built in component to specifically allow for Time Machine backups.

It's early days yet (I just set everything up during the past week), but so far I'm pretty happy with both, expensive as they were.
 
Last edited:
  • Like
Reactions: Glideslope
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.