Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Johnny Cache Breaks Silence On Wi-Fi Exploit 288

Joe Barr writes, "Johnny Cache — aka Jon Ellch — is chafing under the cone of silence placed over him and co-presenter Dave Maynor about the Wi-Fi exploit they presented at Black Hat and DEFCON last month. So he has finally broken his silence on NewsForge in hopes of ending the personal attacks coming from what he implies is a smear campaign started by Apple." (Newsforge and Slashdot are both owned by OSTG.)

Johhny Cache writes, "If you're going to post a news story that is a rehash of my post to a mailing list, I would much prefer it if people actaully just read the post in its entirety."
This discussion has been archived. No new comments can be posted.

Johnny Cache Breaks Silence On Wi-Fi Exploit

Comments Filter:
  • So..? (Score:5, Interesting)

    by ericdano ( 113424 ) on Monday September 04, 2006 @02:12PM (#16038917) Homepage
    So, is he going to take Daringfireball's [daringfireball.net] challenge or not? I think his whole thing has tarnished him, and he won't recover.
  • by Shayde ( 189538 ) on Monday September 04, 2006 @02:18PM (#16038950) Homepage
    If that's just an 'implication', I'll eat my hat. It's pretty obvious that his going silent is the result of Apple putting the thumbscrews to him. He states that the ONLY reason he's saying something now is because he's talking about Intels drivers, not Apples. It's blatantly obvious that Apple's lawyers have come down on him like a ton of bricks, forcing him to be quiet until they get a patch out. This way no one can report about the 'insecurity' of the OSX platform - there are no exploits, see? As long as you're patched and up to date!
  • by Anonymous Coward on Monday September 04, 2006 @02:21PM (#16038967)
    So THAT's why Apple's oh-so-vicious lawyers let them GO AHEAD AND USE A MAC IN THE FUCKING DEMO.

    Riiiiiiighhht.

    Puleeeze.
  • by jpellino ( 202698 ) on Monday September 04, 2006 @02:31PM (#16039024)
    And insult the intelligence of Mac users.
    That's the way to prove your point.
    As someone said, show this on a "bog standard" Mac from and I'll pay attention.
  • Honestly weird (Score:2, Interesting)

    by jackjeff ( 955699 ) on Monday September 04, 2006 @02:37PM (#16039061)
    I watched that video. He says it's smth in the driver... and then shows a Mac also says it would work on a PC. Then, all Intel mac laptops have WIFI now, but he choses to use an external WIFI PC-Card, huh.. sorry Express Card. I know Apple are not angels, but I just can't help be suspicious about it:
    - how can a driver have the same bug on windows and macos x?
    - why use this stupid external card? what are the chances it did have the same chipset as the internal one?
    - and odds are the bug is a buffer overrun... does it take a SO LONG for apple to fix a stupid memory overrun?

    That story won't finish well foro someone. The smoke screen is too thick. Either:
    - This guy did overrate some minor problem in a misleading way for Apple laptops. Oh.. a third party driver with a bug. Or it's Apple driver with only a thirdparty card. In that case, he's discredited in the domain of security for the rest of his life.
    - Apple did really pressure him (as he tends to hint). They're then not only legal jackasses (we know that already) but also incompetent to fix a bug (and that suprises me). In that case the company he's discredited in the domain of security for a while, and they can quit the "virus ads.. mac is secure" for a while.

    Future will tell.
  • by Anonymous Coward on Monday September 04, 2006 @02:40PM (#16039069)
    <blockquote>So Apple is supposed to patch someone else's drivers for a wi-fi card that would never be used with a Mac?
    Apple probably looked at these guys and laughed. </blockquote>

    Silly rabbit! What the author is inplying, very transparently, is that they found an exploit in the Apple driver that is very similiar to the one in Intel's driver.

    Due to his NDA with his company he can't say what he might know about Apple's driver, but he can certainly point out a similar bug and exploit with a similar Intel driver and let you infer what you will... namely that a very similar bug exists in the Apple driver.

    Now, whether that's true or not... that's another story.
  • by Infonaut ( 96956 ) <infonaut@gmail.com> on Monday September 04, 2006 @02:46PM (#16039094) Homepage Journal

    before they only threw dirt to make him look unreliable

    Point me to the link where Apple threw dirt at him.

    There are plenty of bloggers who did the research on their own and asked the right kind of questions, but I've never seen anything from Apple attacking him. Maybe you're referring to Apple pointing out [macworld.com] that he used a third party USB device and didn't disclose any info to Apple about the exploit? I wouldn't exactly call that throwing dirt.

  • by bnenning ( 58349 ) on Monday September 04, 2006 @02:52PM (#16039127)
    It's blatantly obvious that Apple's lawyers have come down on him like a ton of bricks

    Perhaps to you. To others, it's "blatantly obvious" that he has some weird issue with Apple and enjoys spreading FUD. His "clarification" provides no support either way.

    He states that the ONLY reason he's saying something now is because he's talking about Intels drivers, not Apples

    Or maybe that's all he actually has an exploit for. I don't know, and neither do you.
  • Re:Really Now! (Score:1, Interesting)

    by Anonymous Coward on Monday September 04, 2006 @02:57PM (#16039149)
    Really now, can anybody come up with a good reason for him to fake something like this?

    Fame? Or as they said when they did the initial "hack" they didn't like the "Get a Mac" commercials from apple? He was hoping to get away with no one asking any hard questions and he lost the bet. Plain and simple.
  • by eggboard ( 315140 ) * on Monday September 04, 2006 @03:33PM (#16039316) Homepage
    Ellch misdirects attention very clearly. The "Mac bloggers," which include a lot of non-Mac bloggers, have generally said, look, if what Ellch and Maynor showed Brian Krebs is true, then just demonstrate the real Apple exploit without revealing details.

    The article above states, "He also went on to explain that while the debate was centered in the Mac blogger community, it made no sense to discuss it because most of them wouldn't understand the explanation if he gave it, adding, "Since this conversation has moved into a venue of people who can actually grasp the details of this, I'm ready to start saying something." "

    Thanks for the condescension! It's not necessary. I will note that no one sensible, including myself (over at wifinetnews.com) has asked for the code. Rather, we've asked for Maynor and Ellch to either state that they mislead Brian Krebs, that Apple lied when they stated the company wasn't presented with credible evidence, or that they have material that Krebs saw and Apple hadn't seen yet.

    John Gruber did a face-off, not asking for the code, but asking for a simple demonstration with a $1,099 plus sales tax prize.

    How does Gruber not understand the technical details when he isn't asking for them? He's asking for a black-box showdown.
  • Re:My question is... (Score:3, Interesting)

    by wootest ( 694923 ) on Monday September 04, 2006 @03:47PM (#16039376)
    Yes, they probably will.

    It's the thorough lack of details and crummy reporting mixed with derogatory comments that makes it hard to discern if there is an exploit to speak of at all. I know I'd have nothing to worry about if the guys would have presented their exploit neutrally (without shit-flinging Mac users for "being smug"), been detailed in exactly what the target of the attack is (they can do that without revealing details on the exact nature of the exploit) and told us that they're working with Apple to resolve it (because I don't believe for a second that Apple would tell them to put a sock in it rather than work to fix the issue). You know, the way these things are done professionally. But perhaps it's too easy to cast blame, especially since a number of reporters aside from Ellch and his collaborator have been reporting different facts.
  • Re:Macjihad (Score:5, Interesting)

    by OmnipotentEntity ( 702752 ) on Monday September 04, 2006 @04:10PM (#16039503) Homepage
    Umm... something having a bug isn't an incredible claim. Sure, it's not a good thing but it [microsoft.com] happens [apache.com] to [ibm.com] everyone. [apple.com] It's nothing to be ashamed about. Just get the bastard fixed and stop dicking about.

    This isn't about a perpetual motion machine or an entropy reducing device, or even P vs. NP or Riemann's Hypothesis. This is code. This isn't world changing. Bugs happen, then they get fixed. If they want to stay silent to dodge liability let them. If there is a bug it'll be patched, if there isn't they'll fade into obscurity.
  • by Cysgod ( 21531 ) on Monday September 04, 2006 @08:24PM (#16040730) Homepage
    When I published my OS X remote root (link-local remote root for the pedantic), a poorly chosen use for DHCP [carrel.org], Apple had advance notice of when I was going to release it, numerous avenues to attempt contact and I didn't hear one peep from Apple Legal. That this guy was suddenly chilled [chillingeffects.org] and can't produce evidence of it other than making vague insinuations just sounds hoakey to me.

    If he doesn't feel okay about releasing details until they've patched the driver that's one thing. But insinuating that the big bad lawyers have silenced you is quite another. The only circumstance I can think of where they could actually be legitimately silenced is: they are/were being paid to do pen testing for Apple, they submitted this bug, they blabbed about it at a conference when they were under a contractual NDA, they're now claiming they didn't say enough violate the NDA and are remaining mum until the rest of the details go public.

    Given the nature of this scenario (i.e. that they'd have to have violated an NDA to wind up where they are insinuating they are now), I'm not overwhelmed with trust for the researchers who are positing this security hole's existence. On the other hand, I was led on and on by Apple waiting for them to release a patch for my earlier security issue that had a similar attack vector and security impact to this posited new security hole. If these researchers are actually waiting, we may all have to sit around for a good long while before the proof is actually shown.

    This dilemma is more evidence of why full disclosure [wikipedia.org] is a good idea.
  • by mveloso ( 325617 ) on Monday September 04, 2006 @08:52PM (#16040880)
    The exploit is in the centrino driver. Everyone assumes that the Mac airport driver is based on Intel reference code, but it may not be. If it was, you would think that they would have talked about that more.

    Note that for this exploit to work, the network needs to be active (ie: both cards need to be joined to a base station). Why? Because you can't send UDP packets to something with no IP address...unless they're blasting WiFi cards directly, which seems unlikely.
  • Re:So..? (Score:2, Interesting)

    by gruber ( 114836 ) on Tuesday September 05, 2006 @12:22AM (#16041981)
    Did you read the relevant articles? The challenge didn't allow for more than one attempt, that I could see, whereas here's Johnny (heh) saying that it could take multiple attempts to exploit the race condition correctly [...]

    I updated the stipulations [daringfireball.net] to allow for an entire hour to delete the file on the desktop. If they want more time than that, I'd be willing to extend it.

Remember, UNIX spelled backwards is XINU. -- Mt.

Working...