Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Security Flaw – MAC address filtering

version 7.7.3

Hello,

I want to share with the community a security flaw with AirPort devices when using MAC address filtering (Timed Access Control). In a nutshell, enabling “time access control,” which is MAC address filtering with the option to set time limits, or removing devices enabled in timed access control does NOT take effect until you forcibly reboot all AirPort devices using the AirPort Utility (unplugging does not work) AirPort Utility > Base Station > Restart. In other words, do not trust the GUI when enabling MAC address filtering or removing allowed devices; you need to restart all AirPort devices using AirPort Utility.


Test it your self! If you’re currently using MAC address filtering just remove a device, and watch it able to join the network again. I do have a case open with Apple about this.

Posted on Apr 26, 2015 4:40 PM

Reply
6 replies

Apr 26, 2015 5:03 PM in response to John0001

If you’re currently using MAC address filtering just remove a device, and watch it able to join the network again. I do have a case open with Apple about this

This sounds as if you may not have changed the default connection rule in Timed Access from Unlimited Access to No Access.


When you change the default to No Access, the only way that a device can connect to the wireless network is if has a rule specifying that it can connect based on its MAC Address or AirPort ID. The actual times that the device can connect are optional according the schedule that you set up for each device.


User uploaded file

If you did not first set up a default rule of No Access for the wireless network, then any wireless device that has the password for the network can join the network.

IF....the default rule in Timed Access is set to Unlimited, then you can remove the "rule" for a device.....and it can still connect to the network at any time.....since it still has the password to connect....and the default for the network is unlimited access.

If you are saying that you did change the default rule in Timed Access to No Access.....and then you removed the connection rule for a client.....and that client was then able to connect to the network......I cannot duplicate that event.

Apr 27, 2015 3:57 AM in response to Bob Timmons

Thanks Bob,

Yes, i do have the default rule set to no access.

However, I forgot one critical detail where I believe the bug exists.

I use a different SSID for the 2.4 and 5Ghz channels. edit > Wireless > Wireless Options > 5Ghz network name. I do this so only 802.11ac devices are using the 5Ghz channel, and everything else on the 2.4.

When removing a device from timed access control, it will be unable to join the 5Ghz channel, so that's working as intended. However, that device is able to join the 2.4Ghz channel even though it has been removed from timed access control. A software reboot corrects the issue.

Apr 27, 2015 4:06 AM in response to John0001

John0001 wrote:

In a nutshell, enabling “time access control,” which is MAC address filtering with the option to set time limits, or removing devices enabled in timed access control does NOT take effect until you forcibly reboot all AirPort devices using the AirPort Utility (unplugging does not work) AirPort Utility > Base Station > Restart.

Yes. This is normal. You have to reboot the Airport in order to allow it to write the changes to its flash memory. Unplugging does not work because it retains all its settings while unplugged - you'd be very unhappy with it if it didn't since a mains drop-out would result in anything up to half an hour's work setting up everything from scratch. When you add or remove a Mac Access restriction you should get an automatic reboot anyway, preceded by a warning that the device will be unavailable for a time.

Apr 27, 2015 5:09 AM in response to Roger Wilmut1

Hello Roger, and thanks for the reply. I think we’re getting “reboot” confused, because as stated the behavior is only seen in the 2.4Ghz channel, the 5Ghz does not require this reboot. I’ll try like this.

  1. Remove a device from timed access control.
  2. Apply settings and update configuration, the system will blink amber and be inaccessible for a short period (I think that was what you were getting at)
  3. When the system is back (green light), attempt to join the removed device to the 5Ghz network; access denied (good)
  4. Attempt to join that same device to the 2.4Ghz network; I’m in! (the problem is here)
  5. Perform a manual software reset, AirPort Utility > Base Station > Restart, when the system comes back up, the removed device can no longer join the 2.4Ghz channel.


So if anyone has removed a device from their timed access control, you’re really not protected until you do a manual software reset (uncommon) or we get a patch 🙂

Apr 27, 2015 6:35 AM in response to John0001

Yes, i do have the default rule set to no access.

However, I forgot one critical detail where I believe the bug exists.

I use a different SSID for the 2.4 and 5Ghz channels. edit > Wireless > Wireless Options > 5Ghz network name. I do this so only 802.11ac devices are using the 5Ghz channel, and everything else on the 2.4.

When removing a device from timed access control, it will be unable to join the 5Ghz channel, so that's working as intended. However, that device is able to join the 2.4Ghz channel even though it has been removed from timed access control. A software reboot corrects the issue

Thanks for the additional information. I do not use separate 2.4 GHz and 5 GHz network names, but I'll try to set up a test soon to check things out.


The vast majority of users do not set the default rule to No Access, they just set up a device or two like Junior's iPad to keep it off the network at 2 AM.

Apr 27, 2015 8:07 AM in response to John0001

John0001 wrote:


Apply settings and update configuration, the system will blink amber and be inaccessible for a short period (I think that was what you were getting at)

Yes, that is a reboot and was what I would expect. However you are correct in saying that even if the two bands have different SSIDs the access is to the router, not the specific bands, so removing access should remove it from both.

Security Flaw – MAC address filtering

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.