Secure WiFi Router Design
Secure WiFi Goals
When building the SPR, we spent some time performing a simple threat model, to identify probable threat actor profiles, and the types of common threat vectors we see against WiFi networks.
Threat Actors
Remote Internet Attacker: Anyone on the internet that can send packets to the WAN/Uplink interface
Man In The Middle / Malicious ISP: An attacker with a man in the middle position on the uplink
Supply Chain Attacker: An attacker looking to insert code into the SPR project to compromise routers
Physical Proximity Attacker (Evil Neighbor): An attacker with physical proximity to WiFi
Inside Perimeter Attacker (Evil Guest): An attacker with physical access
Compromised Device Attacker (Implant): An attacker operating from a compromised device, authenticated on the network
Threat Vectors
Network Flaws
- Weak Passphrase / Password Reuse
- ARP Spoofing
- MAC Spoofing
- DHCP MAC Spoofing
- VLAN Hopping
- Insecure Private Subnet Requests from Web Browsers