cross-posted from: https://lemmy.world/post/32265822

xkcd #3109: Dehumidifier

xkcd #3109: Dehumidifier

Title text:

It’s important for devices to have internet connectivity so the manufacturer can patch remote exploits.

Transcript:

[A store salesman, Hairy, is showing Cueball a dehumidifier, with a “SALE” label on it. Several other unidentified devices, possibly other dehumidifier models, are shown in the store as well.]

Salesman: This dehumidifier model features built-in WiFi for remote updates.
Cueball: Great! That will be really useful if they discover a new kind of water.

Source: https://xkcd.com/3109/

explainxkcd for #3109

  • flux@lemmy.ml
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    23 hours ago

    Depends on you hw. That seems rather poor implementation… I believe my TP switch might handle that, because it rejects traffic to its management interface from mac X from vlan 20 because it sees the same mac in vlan 10… (only vlan 20 is allowed for management)

    • tjoa@feddit.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 hours ago

      That’s a very cool feature actually but how does it stop a hacker if he has obtained a trusted MAC address from another device and connect to vlan 20 directly while the real device is offline?

      • flux@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        6 hours ago

        You configure vlans per physical port, so in a properly implemented system your attack won’t be possible. When the packet comes to the switch the vlan tag is added to it according to the configuration for the port it was received from.

        Or are you talking about mac-vlans?

        • tjoa@feddit.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 hours ago

          Ok maybe I don’t fully understand yet. Let’s say an access point has 3 SSIDs, lan, guest and iot each client on each SSID gets a vlan tag accordingly. So it’s only connected to a single physical port, i think that’s what confused me. But SSIDs are interfaces just like an physical port afaik so your analogy still stands. The security here is the WiFi password anything that connects to LAN gets a LAN vlan tag. but it’s not like anything that connects to any of the SSIDs can get the DHCP lease of some random device on any vlan cuz it got tagged before. Or am I missing something?