I guess it’s time for me to move out of the city too...I’ll be fine then. I live in the Countryside. If anyone comes within range the dogs will get them.
I guess it’s time for me to move out of the city too...I’ll be fine then. I live in the Countryside. If anyone comes within range the dogs will get them.
Actually I googled VSD and WIFI vulnerability, and discovered similar text. I think the only saving grace for BSD, is the fact that it is less popular than Linux. Obscurity isn’t security, but I am hoping both of the open source sides of these systems get quick patches!You probably read this already, but just in case...
They updated the original paper (May 2017) to clarify, "attacking macOS and OpenBSD is significantly easier than discussed in the paper."
"We have follow-up work making our attacks (against for example macOS and OpenBSD) significantly more general and easier to execute. So although we agree that some of the attack scenarios in the paper are rather impractical, do not let this fool you into believing key reinstallation attacks cannot be abused in practice."
Because they don’t care.Why is the response from manufacturers so slow on something this important?
Aren’t you vulnerable to the Raw Meat In the Middle AttackI’ll be fine then. I live in the Countryside. If anyone comes within range the dogs will get them.
You are correct. To provide some more detail, most manufacturers were informed in late August this year.That's exactly what happened. This was discovered in July, it's public now because vendors have had since then to prepare the patch and release it (sometime today or shortly after). The entire thing is orchestrated so the most number of users can be protected at the same time.
Best response so far. ThanksSo, everyone who can pick up my Wifi can know what I'm doing.. Thanks to Google every marketing company knows what I'm doing.. Thanks to the terrorist threat, every government seems to know what I'm doing..
I seem to be the only one who doesn't have any idea what I'm doing.
Not surprised! Get your cables on! Use HTTPS! No Banking on WiFi!
I am assuming this would affect ALL devices connected to any router using this protocol, correct?
Not according to every article I've read about the KRACK vulnerability. Every client needs to be updated and the WiFi router itself is one of those clients (anything that is involved in the handshake).I've been seeing a lot of misinformation about this. This vulnerability only affects CLIENTS. So unless your AP is bridging to another AP, updating the AP will do no good. The clients themselves must be updated.
HTTPS doesn't save you here.
[doublepost=1508167554][/doublepost]
Yes.
And thanks to Equifax, every criminal imposter can do everything for you.So, everyone who can pick up my Wifi can know what I'm doing.. Thanks to Google every marketing company knows what I'm doing.. Thanks to the terrorist threat, every government seems to know what I'm doing..
I seem to be the only one who doesn't have any idea what I'm doing.
It's all a conspiracy so Apple can increase ethernet dongle sales for Macbook Pros.Just an FYI from the Crackattacks.com (posted by the people who discovered the vulnerability):
Clear, but in a way "clear as mud" since it really doesn't explain when a router needs or doesn't need an update. Of course all clients need an update.
Hopefully Apple will issue a press release soon to given users guidance as to what has been done, what will be done, along with some sort of time line.
Not according to the articles I've read. Any client involved in the handshake is vulnerable and that includes the WiFi router/access point as it is a client.Yes. Way too many people are glossing over this. It is the clients, e.g., Macs, iPads, and iPhones that need to be updated. Not the routers. For example, Microsoft has already confirmed that this is patched in the latest update to Windows 10.
Frankly, this is a silver lining. I trust Apple to update iOS and macOS in a timely manner a whole lot more than I trust Netgear to update their firmware ever.
EDIT: I was being unfair to Netgear - they release security updates for my router, R7000, regularly and promptly.
You can solve that old well worn complaint with a hammer then go buy a $400 windows machine.I'll just connect my MacBook via Ethernet cable. Problem solved.
Wait. MacBooks don't have Ethernet ports because Apple thinks wireless is all we need.
Yay! Another dongle to buy and use with all my other dongles because only 1 USB-C port
Will Apple patch an a/c Airport Extreme? Or is it time to purchase a new router? Suggestions for seamless Mac use?![]()
I'll just connect my MacBook via Ethernet cable. Problem solved.
Wait. MacBooks don't have Ethernet ports because Apple thinks wireless is all we need.
Yay! Another dongle to buy and use with all my other dongles because only 1 USB-C port
This can't be overstated. How many hotels, Starbucks, etc. even know what "firmware" is or how to access their WiFi settings? And just think of all the cheap Chinese routers out there that will never see updates from the manufacturer.
If you're technically inclined, Ubiquiti is awesome. I have one of their GB routers and a PoE WAP.
https://www.ubnt.com
Unless you take your AirPort Extreme to public places and let it connect to WiFi networks there it is not your AP that's needs an update. It's your iPhone, iPad or MacBook that need an update.Time for AirPort Extreme firmware update...
Will Apple patch an a/c Airport Extreme? Or is it time to purchase a new router? Suggestions for seamless Mac use?![]()