Suppose I setup a wireless network and use authpf to restrict access
to some resource (e.g., Internet access) to registered users.  It
seems there's a fairly simple man-in-the-middle attack:

An attacker sets up a system with two wireless NICs: one associated to
my network and another configured as an access point pretending to be
an access point for my network.  He runs a DHCP server on the AP
interface and NATs traffic to my network.  (I can imagine a
sufficiently clever bridge setup that would be even harder to detect,
but I don't know for certain if it could work.)

A legitimate user (e.g., a university student) sits down somewhere in
range of the fake AP but outside of range of any legit APs (in a part
of campus not yet with wifi access, or where the signal is low, or
where the attacker has unplugged the APs), and connects his laptop to
my network via the attacker's fake network.  The user ssh's to
authpf.mydomain.com, but his connection is NAT'd via the attacker's
system, and so my gateway now assumes all traffic from the attacker's
IP belongs to the duped user.

Is there anything I'm forgetting that makes this attack infeasible?
If not, is there anything that can be done to prevent it?

Reply via email to