Apple Denies Wi-Fi Flaw, Researchers Confirm 267
Glenn Fleishman writes "Apple tells Macworld.com that the Wi-Fi exploit demonstrated at Black Hat 2006 in a video doesn't show a flaw in their hardware or software. A third-party USB adapter with different chips and drivers was used, and Apple says the two researchers haven't provided Apple with code or a demonstration showing a working exploit on Apple equipment. The researchers added a note at their Web site confirming that only an unnamed third-party adapter was used. This doesn't mean the researchers have no flaw to show, but rather that their nose-thumbing at Apple users who were too secure in their security was misplaced, at least at present. The researcher's claim that they were providing information to Apple now seems off-base, too."
What a relief. (Score:5, Funny)
No, Cower in Fear (TM) (Score:2)
Re:What a relief. (Score:5, Insightful)
Re: (Score:3, Interesting)
Re: (Score:2, Funny)
Only if you continue to smell your own farts [wikipedia.org].
Re: (Score:3)
What a couple of dicks (Score:5, Insightful)
Re:What a couple of dicks (Score:5, Insightful)
The thing that's more concerning to me is that the tech news and media start sounding like CNN. It seems like anybody can step up and make a loud claim about something controversial, and the news sites just spread it around. Most other tech security claims are held accountable for documenting details and specifics, and being up-front about things like, "well, this only happens while using a random 3rd party wireless card, which would admitedly happen almost never on a Mac since most have built-in wireless...".
Re:Well let me join karma suicide (Score:4, Insightful)
I think there should be an automatic moderation to -2 levels for any post that predicts "I will be moderated down because some zealots don't like my opinion".
Re: (Score:2)
And in any case, I don't see how the grandparent was flaimbait - I didn't see anything incendiary in the post.
Re: (Score:2)
I am sure there are some exploits out there not posted to web just because people (and companies) got very sick and tired of zealot response they get.
As a Mac owner I have really big questions about the genera
Re:Well let me join karma suicide (Score:5, Insightful)
As for Apple zealots turning into "Intel Zealots" at WWDC05, well, you have to admit the new Intel Core is quite a step-up from their previous CPUs. And the Core 2 is (again) a big step-up too.
Just because something was good/bad in the past doesn't mean it's gonna be good/bad in the future (i.e. Mac OS 9 sucked but OS X is really good, Apple used to suck with their proprietary hardware and software (ADC, Apple-specific PICT screenshots that won't even load correctly in regular programs, etc) but now they're supporting standards (DVI, USB2, Wi-Fi, Bluetooth, PDF, PNG, etc).
Re: (Score:2)
Re:Well let me join karma suicide (Score:5, Insightful)
I'm convinced slashot is filled with people who just enjoy not being willing to understand the simplest of things.
The PowerPC G5 processor is an absolutely superior design to anything Intel was putting out in the 90s. I don't know of any hardware geek who disagrees, although they may disagree on real-world performance with available complete systems.
That Intel is putting out well-designed power-efficient processors today does nothing to change the past. That IBM is uninterested in desktop computer processors NOW and is allowing the G5 to languish does nothing to diminish the fundamental superiority of the processor design, or the performance advantage it had years ago during active development.
You may as well complain that car buyers today are just fanbois, because beack in the 60s everyone knew Japanese imports were lousy, cheap machines that barely stood up to American cars. Yet now people say Japanese cars are great and reliable -- I mean, gosh, make up your minds, guys, flip-flop much? Once something is bad or good, it has to stay that way FOREVER, Mister Whirly said so!
Re: (Score:2)
It's entirely possible for your "100% open source driver" to have a security hole in it... hell, it could be based on the same exact codebase that was used in the OS/X driver exploit. You shouldn't get too complacent just because you're running open source software.
So was this just a lie? (Score:5, Informative)
During the course of our interview, it came out that Apple had leaned on Maynor and Ellch pretty hard not to make this an issue about the Mac drivers -- mainly because Apple had not fixed the problem yet. Maynor acknowledged that he used a third-party wireless card in the demo so as not to draw attention to the flaw resident in Macbook drivers. But he also admitted that the same flaws were resident in the default Macbook wireless device drivers, and that those drivers were identically exploitable. And that is what I reported.
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
Re: (Score:3, Informative)
So some "facts" were just made up... (Score:5, Interesting)
Shame on everyone who reported it without checking the facts.
Careful now... (Score:2, Insightful)
I have done enough debugging work to know that there is always a chance somebody screws up and screws up badly... That goes for Apple just like anybody else (I'm one of their customers by the way). Just because these hackers
Re: (Score:3, Funny)
Nah, they're just on to the next unchecked story. This is old "news"
Pretty much the only story that's ever been "corrected" successfully was George W. Bush's being AWOL from the National Guard. He was AWOL,
Re: (Score:3)
Re:So some "facts" were just made up... (Score:5, Insightful)
Re: (Score:2)
And yet they had to add the statement on their website. Obviously they weren't being quite as clear as they could have been. Given their cigarette-stabbing-in-face bias, I wouldn't be surprised if they were deliberately trying to mislead people.
Re: (Score:2)
Something I'd like to know (Score:4, Interesting)
The presenter did mention it (Score:3, Insightful)
Y'all are a bunch of suckers (Score:2, Insightful)
75% of people on Slashdot all tout the party line, "Don't believe everything you read in the mainstream media." It doesn't matter whether the discussion involves Iraq, Microsoft, SCO, Linux, IBM, the U.S. government, or CmdrTaco. If it's on CNN, don't believe it.
Well, here I am, to tell you, be skeptical of regular Joes, as well.
In this discussion [slashdot.org], the only people not agreeing with the article said things like, "it was a 3rd party card." The thing is, I don't understand why you would believe AN
Too bad I don't have mod points (Score:2, Interesting)
Big surprise. (Score:5, Funny)
My God - what if the computer security folks are often just full of shit?
Confusing Headline (Score:2, Funny)
ahhhh, not so confusing....the headline drew me in to read it for clarification...verrrry clever.
Re: (Score:2)
No Surprise (Score:5, Insightful)
Frankly, the disclosure here was pretty amateurish. Surely they would have known that demoing the vulnerability on Apple hardware would have implicated Apple. In fact based on the "aura of smugness on security" comment it looks like they deliberately *chose* Apple hardware to be falsely implicated.
Do these guys have *any* credibility left?
Re: (Score:3, Insightful)
Remember that when the "researchers" were confronted with this very reasonable argument, they claimed that they didn't demonstrate their "exploit" with the standard hardware because (as they claimed) "Apple had leaned on them". At that time I though
Re: (Score:2)
Special spl0itz! (Score:5, Funny)
Gad Zukes!
This is almost as good as the Debian exploit I found last year. I found that if you built a specially crafted PC, and then installed a specially crafted version of Debian, it would prompt you to set the root password during the install, leaving the system open to compramise by the person installing the OS.
Next year's Black Hat conference, here I come!
In other news... (Score:2, Offtopic)
In other news, Cisco can't reproduce the security flaw from last month's Black Hat conference. [csoonline.com.au]
...and now we've got some guy claiming to be Jon Benet's murderer when there are big holes in his story (claimed he took her home from school, but it was Christmas vacation, and there is little evidence that he was even in Boulder at the time)
What we seem to have here is an epidemic of Attention-Whore-Itis.
Here are the unpublished details on this hack (Score:5, Funny)
2. Log in to the MacBook with your username and password
3. Turn on "Remote Login" in the "Sharing" system preferences pane if it isn't already on
4. Select your wireless network from the menu in the menubar and enter the password
5. Write down the IP address that you see in the TCP/IP tab of the airport settings on the MacBook. You'll need it later.
6. Take a different computer of yours and connect to the same wireless network and enter the password
7. Bring up a terminal and type in ssh://
8. At the login prompt enter your username and password
9. You're in baby, have a fuckin' field day!!!
Re: (Score:2, Funny)
2. Log in to the MacBook with your username and password
3. Turn on "Remote Login" in the "Sharing" system preferences pane if it isn't already on
4. Select your wireless network from the menu in the menubar and enter the password
5. Write down the IP address that you see in the TCP/IP tab of the airport settings on the MacBook. You'll need it later.
6. Take a different computer of yours and connect to the same wireless network and enter the password
7. Bring up a te
Tar and feather RESPONSIBLY (Score:5, Insightful)
This is true in any industry.
If these guys had made it CLEAR that they were using a NON-APPLE network device from the get-go we wouldn't be having this discussion today.
What they should have said:
"We found a wireless exploit in a major-brand wireless network device. We will be releasing the name and model number of the device after responsible notification to the vendors involved. The videotape you are watching shows this device connected to an Apple Macintosh. We have also tested a device containing the same chipset connected to a Windows-based PC and found similar problems."
Which is sadder? (Score:4, Insightful)
2. The willingness of everyone to jump on an actual vulnerability in MacOS X (schadenfreude) ?
3. People who believe that the only reason software is vulnerable is its market share?
4. People who think that a company should be able to warrant/guarantee an OS regardless of what you do to the machine it's running on?
Does
dave
p.s. my Mini, that runs continuously 24 hours/day including web server, iTunes broadcast, etc, had a kernel panic yesterday. First time, too! I think it was because I was in the middle of LDAP client configuration and left the machine in an inconsistent state, i.e. -operator error-. No, OS X isn't perfect, but it's a damn site better than -any other OS- I've used on personal hardware. The only things I've used in almost 30 years in the business that have been more reliable are VAX/VMS, Ultrix and SunOS 4.0.3...
Re: (Score:2)
I run all my machines 24/7, they share resources on networks, and my mini isn't any more robust than my XP systems. It locks up periodically just like everything else. What is interesting is how frequently it goes unresponsive for long periods of time. The color wheel is one of it's most familiar mouse pointers to me. Perhaps it's a dying harddrive, but, considering that it's on its second motherboard and second harddrive, I'd say my m
Re: (Score:3, Interesting)
I get a kernel panic on my MacBook Pro [hylobatidae.org] around once a month or so - usually caused by very different things. I tried enabling wireless on a train once, just to see how many networks were zooming past - and then tried connecting to a network to see what happened
Not exactly surprising (Score:5, Insightful)
With the statements from Apple, the questionable reasons given by the researchers and their ire about the Mac community in general, I think the most probable conclusion is that these guys are full of shit. What I can't understand is why they'd risk their reputations on something seemingly so petty.
Re: (Score:2, Insightful)
Apple made no statement denying the claims. All the said was that a 3rd party adapter was used and that no flaw in their product had been demonstrated to them. Both could be telling the truth and both could be lying. Nothing new here.
"in general, I think the most probable conclusion is that these guys are full of shit."
What stake do you, or anyone here, have in Apple being shown innocent here?
"...their ire about the Mac community in gene
Re: (Score:2, Funny)
;)
Re: (Score:2)
Headline misleading (Score:5, Insightful)
I have been wondering (Score:5, Insightful)
Bad PR for SecureWorks (Score:2)
To bad
Well, Duh (Score:5, Funny)
This is a very real exploit... just not one that the Mac is vulnerable to unless you're using 3rd party wireless hardware. And how many Mac users do you know that use 3rd party wireless hardware? Yeah, me either.
I'm not sure all publicity is good publicity (Score:2)
They certainly accomplished that, and probably raised the visibility of their security company as a result. Good for them, I guess.
Given how this has all panned out, would you trust these guys?
Corked (Score:2)
Ummm... (Score:2)
SecureWorks Alerted Apple About FreeBSD Flaw (Score:4, Informative)
"A number of news outlets and blogs have picked up on these various statements and clarifications, but nowhere have I seen this tidbit: Apple's Fox said that prior to the Black Hat demo, SecureWorks did contact Apple about a wireless flaw in FreeBSD, the open-source code upon which Apple's OS X operating system is based. In January, FreeBSD released a patch to fix the problem, which according to the accompanying advisory, related to a flaw in the way FreeBSD systems scanned for wireless networks that could be exploited to allow attackers to take complete control over the targeted machine.
I looked through the last eight months of patches from Apple and could not find any evidence that it also shipped an update to correct this flaw. Fox said she would check with Apple and get back to me. Fox also said Apple staff were already aware of the flaw when SecureWorks contacted them about it prior to their Black Hat presentation, and that Apple had already determined that the wireless flaw addressed in the FreeBSD patch was not exploitable on any of the Mac products.
"SecureWorks has not be able to exploit this for us," Fox said. "No one has been able to show us a way to exploit our internal [wireless] device drviers with that flaw."
Re:Uh... the "game's" rules are too strict (Score:5, Insightful)
It's much like OpenBSD (Score:2)
Reality (Score:5, Insightful)
But in reality every laptop sold by Apple today ships with an Airport card, and most of the ones sold previously had one as well. What message are you really sending when you trumpet a flaw that affects 1/10 of 1% of Mac users?
The message that Mac users should be aware of possible security vulnerabilites is an excellent one but hyping a vulnerability that would simply not happen in reality was a poor vehicle to convey this message, and basically comes off as self-aggrandizing; that is to say they were far more interested in promoting themselves than warn Mac users about security flaws.
Re: (Score:3, Insightful)
So, in essence, this research only "proves" that if you take something that is secure out of the box and make alterations, it's possible to break that security.
Re:Uh... the "game's" rules are too strict (Score:4, Insightful)
Re: (Score:3, Insightful)
Re: (Score:3, Informative)
Re:Uh... the "game's" rules are too strict (Score:5, Informative)
Re: (Score:2)
Re:Uh... the "game's" rules are too strict (Score:5, Informative)
This applies any ANY OS that allows code to be loaded into the kernel... in other words, allows kernel mode drivers.
In other news... (Score:5, Funny)
Update later that day: As a side note to this story, the owner of the vehicle replaced the OEM airbag with one from Orval Reddenbacker, so she could eat popcorn in case she was in an accident. We originally decided we would overlook this aspect, because we have an axe to grind with this manufacturer and to create buzz generating free advertising for our company.
Re: (Score:3, Insightful)
Except that drivers either run in the kernel's address space (in which case security is impossible) or they don't (in which case performance is diminished). The only way to protect an OS from driver malfunctions is use a microkernel, so the question is whether you want slow and secure or fast and ever so slightly less secure....
Re: (Score:2)
Re: (Score:3, Insightful)
Who modded parent to +5? (Score:4, Insightful)
Maybe he hasn't Hurd of one... (Score:2)
So the monolithic kernel OS's are immune to this? Can you name one non-toy OS that isn't vulnerable to security flaws in a badly written driver?
Re:Uh... the "game's" rules are too strict (Score:4, Insightful)
What the hackers are actually claiming is: "I can take over any Mac. All I need to do is add this 3rd party hardware, install 3rd party drivers, disable the built-in version, and sneak away without you noticing several inches of antenna sticking out the side."
Re: (Score:2)
Actually, that seems very reasonable to me. Regardless of the OS, if I introduce bug ridden code at the driver level, you are introducing problems.
Analogy Time: If I replaced the built in firewall of OS X with something I code myself, should I get upset with App
Re: (Score:2)
The problem lies in the fact that they used a third party wireless adapter. People buy Macs for a number of reasons, one of which being integration(the "Everything just works" argument). No one buys a wireless adapter for a Mac laptop, because they all come with one. If the Airport Extreme card stops working, almost all Mac users will either send it to Apple or take it to an Apple Store/Authorized Apple Service Center to be replaced.
Is OS X 100% secure? If you use a undocumented hack
Re: (Score:2)
Re: (Score:2)
The problem with this argument is that we have no idea what the "exploit" actually was (if there was any; I mean these guys have been caught lying, so why would you believe anything? )
My suspicion is that the WiFi card + driver can be convinced to set up a wirele
Re: (Score:2)
It seems pretty ridiculous to say "We guarantee our OS is secure [unless you use hardware that wasn't made by us]." Well, then the OS isn't secure. If 3rd-party drivers can break your security, it wasn't really there to begin with, now was it?
That's a pretty weak argument. That implies that the OS would even have to protect against a 3rd-party driver that intentionally opens a root shell on a random TCP port.
A flaw in a 3rd-party driver is the fault of the driver vendor, not the OS vendor. Or we could
Re: (Score:2)
Re: (Score:2, Insightful)
Right. Because trying to play a music cd on your computer and installing third party hardware and drivers are, like, exactly the same.
[sarcasm: off]
(How did the parent get modded insightful?)
Re:...or alternatively... (Score:5, Insightful)
Re: (Score:2, Informative)
http://www.ioxperts.com/devices/devices_80211b.ht
You were saying?
Re: (Score:2)
But yeah, the fact that the "security researchers" refuse to reveal information about the vulnerabilities really does make one question their motives, or whether the demonstration was even valid and not simply a rigged demo to help them win some 3133+ p1551ng |v|4t(h or something.
Re:...or alternatively... (Score:5, Insightful)
I've had XP crash just browsing around in the Explorer, I'd consider that "normal" use.
Anyway, my original point was, don't say "no Apple users ever use third party hardware / drivers" but few do. And in this specific case very few would as wifi is 99% of the time already in your laptop so there is no need for a 3rd party wifi card/driver. In addition 3rd party wifi cards and drivers are damn rare for Macs. Well, you can pick up any USB wifi adapter, but try to find vendor supplied/supported drivers for the mac (there are plenty of open-source drivers trying out there).
Let's face it, the security team wanted to get noticed and bashing Apple's security was an easy way to do it. They got their 15 minutes of fame. Now people are looking at what they said and did and finding the flaws in what they did. If someone had looked at what they were doing beforehand the whole thing would have been laughed off..
Re:...or alternatively... (Score:5, Interesting)
who are we to question? (Score:5, Insightful)
Although we'll see nothing but speculation in this article and its comments, eventually the truth will be known, and we'll have an exploit which is documented and proven to work, or not. If Apple have a flaw, and won't admit it, that would light a fire under them wouldn't it?
Given the hackers comments :
Although an Apple MacBook was used as the demo platform, it was exploited through a third-party wireless device driver - not the original wireless device driver that ships with the MacBook.
It sounds like they were bullshitting to try to make a splash, which they did. Till I see proof, I'm not inclined to trust either side.
Re: (Score:3, Insightful)
Two faces of trust (Score:5, Insightful)
Myself, I trust the people who actually have the code to look at. In this case that would be Apple. They have done little that would lead me to think this statement was misleading.
If you blindly mistrust any company just because it is a company, you are just as badly off as if you blindy accept anythign any company says. You need to use common sense in evaluation statements from anyone.
Re: (Score:2)
Re: (Score:3, Insightful)
Hell I would not even hold Microsoft, the king of security flaws, accountable for what some unknown guy did using a third party driver he will not produce to prove his claim. And if I would be scepticle about a security flaw in windows, which
"Reasearchers"? (Score:2)
Go back and read the whole story this thing is about.
Use Occams Razor and the truth may come to you.
Apples hold (Score:3, Insightful)
Come on, Apple's rep is not
Numbers (Score:5, Insightful)
That's a poor way to look at it, and masks the situation you have with the Mac market today.
Any of those 92% of computers may vary wildly in terms of OS loaded or software used.
With the Mac you have tens of millions of computers (fourteen million registered OS X users). Lots of them are running the same software, the same browser, at the same OS rev.
Looking at the cost of renting botnets on the grey market those millions of computers represent millions of dollars of revenue, even if you crack just a percentage of them. So the question is why would someone leave that money on the table?
The answer is obvious - because it's a lot harder to hack a Mac to use in such a way. So it's not really numbers that are preventing the serious development of attacks today so much as a stronger security model. This would potentially be true even beyond the 80% marketshare point.
Basically the reason the Mac is safer today and will continue to be so even as market share climbs is the same philosophy behind avoiding being eaten by a bear - you just have to be able to run faster than the guy next to you. Windows is puffing something fierce.
Re: (Score:2)
So Mac doesn't make an interesting target because of their number.
Their security model is much better than Windows, that's true, so it helps but an interesting question is: what is the percentage of the users getting security updates
That is a key point (Score:2)
Actually the patching percentage on the Mac is much better, because by default a Mac is configured to check once a week and install updates. I have seen many Windows users turn off updates for a variety of reasons, but mostly because th
Re: (Score:3, Insightful)
Like another poster said, not all security models are built equal. Add up all the BSD, Linux and Mac marketshares, and there is still no exploits. The *nix crowd has a higher server marketshare than desktop, which makes them even more attractive for people to crack.
And btw, not all of 'em do it for money.
Re: (Score:2)
You are correct, but don't expect aknowledgement in these parts - heck, you are lucky you weren't modded troll or flamebait. Now, you never said OS security or architecture was not a factor, only that it isn't the biggest factor. I agree with you. I think the main reasons Windows is such a target are the following:
1. the sheer number of Windows boxes [providing monetary motivation as you pointed out]
2. operated by non-technical peo
Re: (Score:3, Funny)
Now THERE'S a security problem Apple would like to have...
WWBS? (What Would Bruce Say?) (Score:2)
This is not mere grandstanding it is also an interesting twist on the ever-raging debate on full disclosure of security vulnerabilities. Eschewed were the two classic positions usually assumed by professionals in the field:
Rather than adopt a classic p
Already had the spin (Score:2)
We already had the spin - it was from the hackers who tried to claim they couldn't use a stock Macbook because Apple "leaned on them".
Come on, use Occams Razor. What hold would Apple have to lean on these guys? Isn't th