-
-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[security] Kr00k #1812
Comments
Hard to find any useful information around. Some threads popped up at Pihole and raspberry pi forums but nothing really yet. |
Huh? That we've heard about this publicly just yesterday is due to their rather responsible vulnerability disclosure policy. But the issue is well documented and the fact that the stuff here is rather outdated means at least the BCM equipped boards suffer from insecure wireless operation that is known to everyone since yesterday. |
Take this for example: Igor get's some files most probably from @hipboi and throws it in a repo where the giant Broadcom fixed the stuff within the last months, they notified their 'customers' to provide this stuff as patches. So in an ideal world those vendors would now also fix their stuff (provide new firmware BLOBs) and push this out to users or 3rd parties like Armbian. But I guess the SBC world is not an ideal world... |
...and probably never will. I tried to find something even though I am not very deep into this topic. What I could find was The firmware-brcm80211 Debian package but this seem not to have received fixes yet. I also could not find (yet) any new upstream firmware blobs, maybe they are non-public? Would not make much sense though... Xulong seem to have updated some firmware blobs last October. Not no idea which version these files have and what has been fixed :( |
See also https://forum.armbian.com/topic/4949-security-broadpwn/ (Armbian and wireless security is essentially a non-issue since nobody gives a sh*t). Back then when I was really dumb and maintained some OMV ARM images I took care to replace the |
Sometimes you are on your own to make the world a bit better. This makes it not less valuable. In my eyes at least. |
The Broadcom blobs in either the Xulong repo and the Debian package seem to be quite outdated. |
Can we fully ditch our firmware packages for upstream?https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git ... Who will check that? |
This would not fix the security flaw since those blobs seem to be quite old as well. The commit log confirms my results from |
So this will again require to provide better services as corporation supported upstream https://www.linuxfoundation.org |
The Debian packages The first one sucks random stuff from the Internet:
And the 2nd does the same:
|
We already contacted Ampak for the new firmware. Will update here once we get the reply. |
Thank you Tom! Hope to hear from you soon. @igorpecovnik in my opinion this flaw could serve as some sort of a testimonial which board makers do care about security and which don't. IMO it should be mentioned on the download page in a way such as 'Wi-Fi vulnerable to BroadPwn and Kr00k' (maybe even in big red letters) vs. 'Common Wi-Fi vulnerabilities like BroadPwn and Kr00k fixed'. |
It's the board manufacturer's duty to get in contact with Ampak, pull a new firmware from them, test it with their devices and release it to the public. The fixes exist already and have been pushed to majority of vulnerable devices within the last months (talking about iOS/Android gadgets and the more popular 'smart home' crap). It's just that almost nobody in the SBC world seems to care about wireless (in)security and as such we're dealing with some smelly BLOBs from ages ago that whoever found on random places on the Internet and this gets bundled as If Armbian wants to improve on this situation now is the time to taunt board makers... |
Next week we will get the new updated/fixed firmware. |
There is some communication with Cypress going on I think: |
Firmware: wl0: Feb 11 2020 11:54:51 version 7.45.96.61 armbian/build#1812
What about the other board makers? Tom/Radxa delivered amazingly fast which is great. :) This Github issue makes it rather easy to point other board makers to and blame them if they don't react within n days time. Why not doing this? Mentioning them like @wuweidong0107 for example is rather easy. |
This is all legacy stuff - broadcom softmac/fullmac is beyond this with newer chipsets. Still blobs - just saying... some of this is going to be from Cypress, some from Broadcom. |
is the exploit code exposed in internet ?? |
Now there is... |
So to summarize 5 weeks later. Except of Radxa/RockPi and the RPi Trading guys the rest of the ARM world simply doesn't give a shit about broken wireless security. |
... but they waste resources to provide a bad version of what we do, but its their official, or do nothing but sale stuff. |
Ok bro ....I got it....I knew it ....its a big wifi vulnerability....and
when I search I saw your code....then I think how a big vulnerability is
realised soon .....
I commended because I saw this code and you give how to run that code....so
when i run its seems error....that's why I commended
…On Thu, 2 Apr 2020, 12:47 pm Igor Pečovnik, ***@***.***> wrote:
world simply doesn't give a shit about broken wireless security.
... but they waste resources to provide a bad version of what we do, but
its their official, or do nothing but sale stuff.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#1812 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AH5VZJAOMIBKK6MKK3D6ETTRKQ3ZNANCNFSM4K4QBKNA>
.
|
Since most if not all Armbian supported wireless capable boards use Broadcom/Cypress chipsets and the RPi 3 tested positive I guess all these devices are affected by Kr00k?
The text was updated successfully, but these errors were encountered: