TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

FragAttacks: new security vulnerabilities that affect wi-fi devices

609 pointsby sylvainkalacheabout 4 years ago

21 comments

transputeabout 4 years ago
Future Wi-Fi devices will be able to see through your home and business walls, for activity monitoring and biometric identification, <a href="https:&#x2F;&#x2F;www.theregister.com&#x2F;2021&#x2F;03&#x2F;31&#x2F;wifi_devices_monitoring&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.theregister.com&#x2F;2021&#x2F;03&#x2F;31&#x2F;wifi_devices_monitori...</a><p><i>&gt; In three years or so, the Wi-Fi specification is scheduled to get an upgrade that will turn wireless devices into sensors capable of gathering data about the people and objects bathed in their signals... When 802.11bf will be finalized and introduced as an IEEE standard in September 2024, Wi-Fi will cease to be a communication-only standard and will legitimately become a full-fledged sensing paradigm... tracking can be done surreptitiously because Wi-Fi signals can penetrate walls, don&#x27;t require light, and don&#x27;t offer any visible indicator of their presence.</i><p>IEEE 802.11bf paper: <a href="https:&#x2F;&#x2F;arxiv.org&#x2F;abs&#x2F;2103.14918" rel="nofollow">https:&#x2F;&#x2F;arxiv.org&#x2F;abs&#x2F;2103.14918</a><p>Papers on device-free wireless sensing (DFWS): <a href="https:&#x2F;&#x2F;dhalperi.github.io&#x2F;linux-80211n-csitool&#x2F;" rel="nofollow">https:&#x2F;&#x2F;dhalperi.github.io&#x2F;linux-80211n-csitool&#x2F;</a><p>Remote sensing with low-cost ESP32 and 802.11n: <a href="https:&#x2F;&#x2F;academic.oup.com&#x2F;jcde&#x2F;article&#x2F;7&#x2F;5&#x2F;644&#x2F;5837600" rel="nofollow">https:&#x2F;&#x2F;academic.oup.com&#x2F;jcde&#x2F;article&#x2F;7&#x2F;5&#x2F;644&#x2F;5837600</a>
评论 #27124931 未加载
评论 #27124900 未加载
评论 #27123576 未加载
评论 #27123534 未加载
评论 #27125857 未加载
评论 #27124164 未加载
评论 #27125709 未加载
评论 #27125883 未加载
评论 #27125714 未加载
评论 #27133515 未加载
评论 #27127559 未加载
评论 #27127596 未加载
评论 #27128723 未加载
milesabout 4 years ago
From the industry response[1]:<p>&gt; &quot;It’s important to note that there is presently no evidence of the vulnerabilities being used against Wi-Fi users maliciously and these issues are mitigated through routine device updates once updated firmware becomes available.<p>&gt; &quot;Like many previous vulnerabilities, FragAttacks has been academically well-researched and responsibly reported in a manner allowing the industry to proactively prepare and begin to roll out updates that fully eliminate the vulnerabilities. This set of vulnerabilities requires a potential attacker to be physically within range of the Wi-Fi network (or user device) in order to exploit it. This significantly reduces the likelihood of actual exploitation or attack.&quot;<p>[1] <a href="https:&#x2F;&#x2F;www.commscope.com&#x2F;blog&#x2F;2021&#x2F;wi-fi-alliance-discloses-fragattacks&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.commscope.com&#x2F;blog&#x2F;2021&#x2F;wi-fi-alliance-discloses...</a>
评论 #27122846 未加载
评论 #27122534 未加载
评论 #27123052 未加载
评论 #27124367 未加载
评论 #27127458 未加载
pmlnrabout 4 years ago
&gt; By default devices don&#x27;t send fragmented frames. This means that the mixed key attack and the fragment cache attack, on their own, will be hard to exploit in practice, unless Wi-Fi 6 is used. When using Wi-Fi 6, which is based on the 802.11ax standard, a device may dynamically fragment frames to fill up available airtime.<p>Why does this feel like Spectre? We&#x27;re trying to speed things up in a way that eventually blows back into our face.
评论 #27122479 未加载
评论 #27122533 未加载
Reventlovabout 4 years ago
Mathy strikes again ! This has been fixed in Linux and certain firmware &#x2F; driver already: <a href="https:&#x2F;&#x2F;lore.kernel.org&#x2F;linux-wireless&#x2F;20210511180259.159598-1-johannes@sipsolutions.net&#x2F;" rel="nofollow">https:&#x2F;&#x2F;lore.kernel.org&#x2F;linux-wireless&#x2F;20210511180259.159598...</a>
评论 #27122932 未加载
评论 #27123471 未加载
riobardabout 4 years ago
By now it&#x27;s probably easier in mind to treat any Wi-Fi as Open Network and always use something like WireGuard&#x2F;Tailscale for secure communication between devices.
评论 #27127618 未加载
评论 #27124658 未加载
评论 #27124841 未加载
评论 #27122644 未加载
DanAtCabout 4 years ago
A 9 month embargo is disgusting. Linux users have been sitting ducks while others may or may not received silent updates.
评论 #27122876 未加载
评论 #27122954 未加载
评论 #27125153 未加载
tptacekabout 4 years ago
From the researcher that brought you KRACK:<p><a href="https:&#x2F;&#x2F;www.krackattacks.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.krackattacks.com&#x2F;</a>
评论 #27125756 未加载
评论 #27125601 未加载
SCHiMabout 4 years ago
&quot;&quot;&quot; How can the adversary construct unencrypted Wi-Fi frames so they are accepted by a vulnerable device? First, certain Wi-Fi devices accept any unencrypted frame even when connected to a protected Wi-Fi network. &quot;&quot;&quot;<p>This actually made me angry. How fucking long are we doing this already? This is so. basic. Why is this possible? This should incur liability, we know the IT environment is adversarial.<p>I understand one can make technical mistakes, or shoot oneself in the foot in low level languages that are difficult to handle correctly. But this is a conceptual mistake, involving crypto! How can you possibly have written this code for an issue like this to occur? What is the control flow that leads to this? I almost cannot imagine how someone could code this up by accident, this must be a backdoor. Just imagine:<p><pre><code> if decrypt(encrypted) == false { memcpy(plaintext, encrypted); &#x2F;&#x2F; lets try to use the encrypted data anyway, you never know! } handle_packet(plaintext);</code></pre>
评论 #27122580 未加载
评论 #27125575 未加载
评论 #27123348 未加载
johnklosabout 4 years ago
I think this will make for an excellent litmus test for companies that make wifi products. Is this a critical fix? No. Is it important, if not critical? Yes.<p>Some vendors aren&#x27;t going to care about this in the least and won&#x27;t offer any updates.<p>Some will only fix this in new and future devices.<p>And perhaps some will update all their devices going back several years.<p>Currently I buy used 802.11ac Airport Extremes for wireless for people because they&#x27;re simple, they stay out of the way, and the last time there was a major update, Apple updated every Airport model all the way back to the Airport Express from 2008.<p>But I want to be able to buy new wifi devices, and how vendors handle this will inform me about which ones I&#x27;ll buy going forward.
评论 #27125105 未加载
inetknghtabout 4 years ago
&gt; <i>certain devices accept plaintext aggregated frames that look like handshake messages. An adversary can exploit this by sending an aggregated frame whose starts resembles a handshake message and whose second subframe contains the packet that the adversary wants to inject.</i><p>That reminds me of a thread [0] that came up a month ago mentioning discussion of packets in packets [1]. That paper was from 2011!<p>[0]: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26778236" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=26778236</a><p>[1]: <a href="https:&#x2F;&#x2F;static.usenix.org&#x2F;events&#x2F;woot11&#x2F;tech&#x2F;final_files&#x2F;Goodspeed.pdf" rel="nofollow">https:&#x2F;&#x2F;static.usenix.org&#x2F;events&#x2F;woot11&#x2F;tech&#x2F;final_files&#x2F;Goo...</a>
lwhiabout 4 years ago
I just checked for an update for my TP Link Rouer, nothing yet.<p>How likely are large manufacturers likely to react to this?
评论 #27123328 未加载
评论 #27137919 未加载
评论 #27123420 未加载
评论 #27124008 未加载
评论 #27123560 未加载
SavantIdiotabout 4 years ago
Fragmentation is usually disabled in home APs. I&#x27;ve played with it on hostapd, but didn&#x27;t find a performance improvement, and investigating withe WireShark found even 64k packets were not being fragmented. Is the same true for enterprise AP?
评论 #27123545 未加载
jtchangabout 4 years ago
I wonder if hardcoding your DNS servers will help. I guess sometimes this is not possible because in corporate environments DNS servers are sent via DHCP.
评论 #27123368 未加载
billpgabout 4 years ago
Exactly how terrified should I be right now?
Pick-A-Hill2019about 4 years ago
The chained CVE&#x27;s made for interesting reading. Book-marked for future reference when I have my SDR to hand.
1vuio0pswjnm7about 4 years ago
Suprised there is nothing in the &quot;Q&amp;A&quot; that refers to wired devices. As if there is no choice.
colinbr96about 4 years ago
Would using a VPN prevent the malicious DNS packet?
评论 #27124142 未加载
throwitaway12about 4 years ago
I would really like to know, if someone could, the definitive answer to if using a VPN would prevent the malicious packet?<p>Do we even know at this point?
mdeck_about 4 years ago
“Frag” as a portmanteau of FRagmentation and AGgregation is hardly a non-ambiguous choice of terminology.
btachabout 4 years ago
So, will I need to go beyond the tinfoil hat? Maybe line the walls with tinfoil?
risedotmoeabout 4 years ago
I&#x27;ve always felt an always listening radio, especially the ones in televisions that try to connect to anything it can, in any device is a big gaping security hole. We&#x27;ve already seen how Bluetooth makes things vulnerable. If you&#x27;re truly worried about security, go with the cable.
评论 #27128209 未加载