New DD-WRT vulnerability

Post new topic   Reply to topic    DD-WRT Forum Index -> General Questions
Goto page 1, 2, 3  Next
Author Message
got_milk
DD-WRT User


Joined: 05 Dec 2009
Posts: 377
Location: Toronto, Canada

PostPosted: Tue Dec 28, 2010 1:27    Post subject: New DD-WRT vulnerability Reply with quote
A vulnerability discovered in DD-WRT can allow an attacker to determine the MAC addresses of the wireless interface(s) of a DD-WRT router, which can then be fed into Google Location Services which could pump out fairly accurate GPS coordinates.

http://www.devttys0.com/2010/12/dd-wrt-i-know-where-you-live/

_________________
Peacock Thread | Wireless Drops/Slow? Got an Intel Card? Read this! | BrainSlayer Builds | Eko Builds

Netgear WNDR3700 - OpenWRT Kamikaze Bleeding Edge Trunk Builds
(retired) Linksys WRT310N v1 - DD-WRT v24-sp2 build 15693 std-nokaid-small NEWD2 K2.6
Sponsor
whoisrich
DD-WRT Novice


Joined: 16 Mar 2007
Posts: 4

PostPosted: Tue Dec 28, 2010 2:07    Post subject: Reply with quote
Just read about this myself and can verify that with site info disabled, you can still visit:

http://192.168.1.1/Info.live.htm
buddee
DD-WRT Guru


Joined: 06 Feb 2010
Posts: 7401
Location: Little Rock

PostPosted: Tue Dec 28, 2010 2:17    Post subject: Reply with quote
So run https?

Edit: yep, just tried with https, no return but a blank white page as i thought it would be.

_________________
Wireless N Config | Linking Routers | DD-WRT Wiki | DD-WRT Builds | Peacock - Broadcom FAQ

Having problems with port forwarding? Check out Port Forward Troubleshooting for more info.
GeeTek
DD-WRT Guru


Joined: 06 Jun 2006
Posts: 3763
Location: I'm the one on the plate.

PostPosted: Tue Dec 28, 2010 2:35    Post subject: Re: New DD-WRT vulnerability Reply with quote
got_milk wrote:
..the MAC addresses of the wireless interface(s) of a DD-WRT router, which can then be fed into Google Location Services which could pump out fairly accurate GPS coordinates.

Easy solution. Never register yer MAC address with Google Location Services and they will have no clue where the fuck you are at. Razz

_________________
http://69.175.13.131:8015 Streaming Week-End Disco. Station Ripper V 1.1 will do.
phuzi0n
DD-WRT Guru


Joined: 10 Oct 2006
Posts: 10141

PostPosted: Tue Dec 28, 2010 9:58    Post subject: Reply with quote
The rebinding exploit has been fixed in the default configuration for ~1/2 year. It appears that they were testing rebinding from within their own LAN (URL was http://rebind/) which is allowed to rebind.
_________________
Read the forum announcements thoroughly! Be cautious if you're inexperienced.
Available for paid consulting. (Don't PM about complicated setups otherwise)
Looking for bricks and spare routers to expand my collection. (not interested in G spec models)
SecurityFreak
DD-WRT User


Joined: 22 Jun 2010
Posts: 89

PostPosted: Tue Dec 28, 2010 20:09    Post subject: Reply with quote
I ll be damned ,i can see WAN adress ,WAN MAC ,router ip ,Wireless MAC ,clients name.It s interesting that clients mac are not fully visible.And the info site is off Smile
So theoretically someone that can control my browser has access to some nice info :)

LE:It doesnt matter if you use HTTPS you get the same leak.
whoisrich
DD-WRT Novice


Joined: 16 Mar 2007
Posts: 4

PostPosted: Tue Dec 28, 2010 23:38    Post subject: Re: New DD-WRT vulnerability Reply with quote
GeeTek wrote:
Easy solution. Never register yer MAC address with Google Location Services


Apologies if you are just being sarcastic, but the Google street view vans collect WiFi MAC addresses as they drive around.
GeeTek
DD-WRT Guru


Joined: 06 Jun 2006
Posts: 3763
Location: I'm the one on the plate.

PostPosted: Wed Dec 29, 2010 0:55    Post subject: Re: New DD-WRT vulnerability Reply with quote
whoisrich wrote:
Apologies if you are just being sarcastic, but the Google street view vans collect WiFi MAC addresses as they drive around.

I wasn't being sarcastic, and I did not realize that Google street view was mapping MAC addresses. Thanks for pointing it out. This issue is now a horse of a different color to my understanding.

_________________
http://69.175.13.131:8015 Streaming Week-End Disco. Station Ripper V 1.1 will do.
buddee
DD-WRT Guru


Joined: 06 Feb 2010
Posts: 7401
Location: Little Rock

PostPosted: Wed Dec 29, 2010 1:13    Post subject: Reply with quote
SecurityFreak wrote:


LE:It doesnt matter if you use HTTPS you get the same leak.


Then i guess its just me, cause i dont see anything on http or https, just blank white page.



hrmm.jpg
 Description:
nothing on http or https
 Filesize:  21.35 KB
 Viewed:  25395 Time(s)

hrmm.jpg



_________________
Wireless N Config | Linking Routers | DD-WRT Wiki | DD-WRT Builds | Peacock - Broadcom FAQ

Having problems with port forwarding? Check out Port Forward Troubleshooting for more info.
Chill
DD-WRT User


Joined: 28 Aug 2009
Posts: 159

PostPosted: Wed Dec 29, 2010 1:54    Post subject: Reply with quote
Read and reread the link and even tried the google location services http://samy.pl/mapxss/but turned no meaningful results. However, should I be concerned about this?

here is what i gathered from trying http://zzz.zzz.zzz.zzz/Info.live.htm

[phuzi0n] removed for breaking the forum and being useless info anyways

_________________
Aceex NR22 running DD-WRT v24-sp2 (03/19/12) std - build 18777 as WAP
Multiple BSSIDs

RT-N16 Tomato Firmware 1.28.0905 MIPSR2-065V K26 USB AIO as gateway
Samba
Media/DLNA Server
SNMP/odmon
phuzi0n
DD-WRT Guru


Joined: 10 Oct 2006
Posts: 10141

PostPosted: Wed Dec 29, 2010 3:37    Post subject: Reply with quote
Like I said rebinding has been blocked in the default configuration for many months, since r14838 07/19/2010 to be exact, and it appears that their demonstration of rebinding only worked because they were trying it from within their own LAN which is allowed to rebind. If you try to rebind from the WAN (upstream DNS server) using a recent build with default settings then it should fail.

Navigating to /Info.live.htm from within your LAN does not matter on its own, nor does rebinding from within your own LAN. It only matters if an external site can rebind which should not be possible with the current default configuration and the report does not give sufficient information whether this occurred.

If you enable HTTP or HTTPS remote access then you should configure the info page to require a password. IMO disabling the info page should be changed to require a password on /Info.live.htm or stop serving it altogether (unsure if other pages need it).

As always I recommend using SSH tunneling to access the router's GUI remotely instead of exposing the web server to the world.

_________________
Read the forum announcements thoroughly! Be cautious if you're inexperienced.
Available for paid consulting. (Don't PM about complicated setups otherwise)
Looking for bricks and spare routers to expand my collection. (not interested in G spec models)
NiHaoMike
DD-WRT Novice


Joined: 29 Dec 2010
Posts: 17
Location: Texas

PostPosted: Wed Dec 29, 2010 6:11    Post subject: Reply with quote
I use NoScript, so I highly doubt I would have that problem.

For the paranoid, maybe someone can write a script to randomize the MAC addresses at certain times?

_________________
I want my router to perform well and look attractive. My best friend Tiffany Yep is a model and a digital communications engineer. Inspiration from nature?
mikicz
DD-WRT User


Joined: 12 Apr 2009
Posts: 67

PostPosted: Wed Dec 29, 2010 8:25    Post subject: Reply with quote
SecurityFreak wrote:
I ll be damned ,i can see WAN adress ,WAN MAC ,router ip ,Wireless MAC ,clients name.It s interesting that clients mac are not fully visible.And the info site is off Smile
So theoretically someone that can control my browser has access to some nice info :)

LE:It doesnt matter if you use HTTPS you get the same leak.


same for me. I can see full mac addresses even with "info site mac masking: enabled" on dir-600. I think, there is some bug also. And for the http/https, it works too, when you use https://192.168.1.1/Info.live.htm
SecurityFreak
DD-WRT User


Joined: 22 Jun 2010
Posts: 89

PostPosted: Wed Dec 29, 2010 9:50    Post subject: Reply with quote
buddee wrote:
SecurityFreak wrote:


LE:It doesnt matter if you use HTTPS you get the same leak.


Then i guess its just me, cause i dont see anything on http or https, just blank white page.


If i set up HTTP for admin and use http live blabla i see the info ,if i set up https and use https blabla i see the info.I m using Opera browser and latest 15962.If asterixes that block LAN PC mac would appear blocking the other info it would be no problem.
It s a vulnerability even if the scenario of someone accesing that info depends on your overall settings.Maybe you re not using 192.168.1.1 for your router adress.
GeeTek
DD-WRT Guru


Joined: 06 Jun 2006
Posts: 3763
Location: I'm the one on the plate.

PostPosted: Wed Dec 29, 2010 10:51    Post subject: Reply with quote
If you are visiting a nefarious website and allowing it to run scripts in your browser, the hackers are going to install a rootkit on yer computer. They don't give a goddamn what the MAC address of your router is.
_________________
http://69.175.13.131:8015 Streaming Week-End Disco. Station Ripper V 1.1 will do.
Goto page 1, 2, 3  Next Display posts from previous:    Page 1 of 3
Post new topic   Reply to topic    DD-WRT Forum Index -> General Questions All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum