QUOTE(SlayerXT @ Jun 3 2010, 01:25 AM)
i mean "credit" ... hahaaa..Unifi WARNING TO ALL UNIFI USERS, Threat warning, read inside
Unifi WARNING TO ALL UNIFI USERS, Threat warning, read inside
|
|
Jun 3 2010, 07:53 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,104 posts Joined: Oct 2006 |
|
|
|
|
|
|
Jun 3 2010, 09:09 AM
|
![]() ![]()
Junior Member
257 posts Joined: Feb 2007 |
QUOTE(rizvanrp @ Jun 3 2010, 04:10 AM) Thx for sharing all this. Thanks for all the efford! |
|
|
Jun 3 2010, 09:28 AM
|
![]()
Junior Member
41 posts Joined: Mar 2007 |
this is posted on The Star also: http://techcentral.my/news/story.aspx?file...235&sec=it_news
|
|
|
Jun 3 2010, 10:26 AM
|
|
VIP
3,055 posts Joined: Jan 2003 |
@rizvanrp,
Thanks for all the research and sharing them. For those whose Remote Management is enabled, did TM even bother to ensure that it is configured to allow only their own technicians to access? E.g. Lock IP address, etc. That newspaper article did not address the main problem. QUOTE(schmeichel7 @ Jun 3 2010, 01:59 AM) It is a shame on how this was not planned properly.... Precisely. Remote management is not the main issue. It's the way they did it.And I'm not surprised that TM quickly released that statement to safeguard their business and potential future customers.. Who wants to subscribe to unifi if they feel insecure and worried due to the risks.. If only they planned things properly in the first place.. Remote support can be done in a proper way.. Not only did they not tell users, consumers and commercial, that there is a superior hidden root access account, but they also chose to use a generic password for all their routers. The way it's being done currently, it's just plain laziness. QUOTE(Moogle Stiltzkin @ Jun 3 2010, 03:57 AM) This if frakkin bullshit. All they said is Actually, if you read that carefully, they said they will change the passwords and then share that password with the customer. If they live up to their word, once they change it and inform you the new password, just change it back to another password.1. they are keeping remote access despite our complaints for the CHOICE of not having it (we don't want them poking around inside our stuff. And we don't want a backdoor for l33t hackers.) 2. Their only solution is to change the operator password so we cannot access....... so if we can't access, how do we bypass their shitty router and use our own using Riv's method of making the Dir-615 a vlan bridge (i refuse to use their 32 concurrent connections capable hardware for routing my p2p downloads), and connect it to our own router instead. Why is tmnut ignoring the other issue at hand??? They did not even mention any solution for letting us use our own routers. That is bullshit If TM needs access in future, let them call you and you can reset the password to a temp password, let them use it and then change the password again in future. This post has been edited by +Newbie+: Jun 3 2010, 10:31 AM |
|
|
Jun 3 2010, 10:36 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,458 posts Joined: Jan 2003 |
QUOTE(+Newbie+ @ Jun 3 2010, 10:26 AM) Actually, if you read that carefully, they said they will change the passwords and then share that password with the customer. If they live up to their word, once they change it and inform you the new password, just change it back to another password. Oh :/If TM needs access in future, let them call you and you can reset the password to a temp password, let them use it and then change the password again in future. Well if that is the case, we will just have to see then This post has been edited by Moogle Stiltzkin: Jun 3 2010, 10:37 AM |
|
|
Jun 3 2010, 10:51 AM
|
![]() ![]()
Junior Member
84 posts Joined: Feb 2005 |
|
|
|
|
|
|
Jun 3 2010, 11:15 AM
|
|
Elite
4,956 posts Joined: Jan 2003 |
Actually if they wanted to create a unique password, it would be easy cause they already have the customer information, and could do easy substitution to create a pretty strong password which tmnet can easily use to access cause they have your personal information which other people do not have.
This would have pretty much avoided the issue. Although I still do not like the idea of tmnet being able to remotely access my router. |
|
|
Jun 3 2010, 12:57 PM
|
![]()
Newbie
4 posts Joined: Jun 2007 |
Dear Riz,
Again, thanks for all that you're doing. M'sia is such a screwed up place, full of rhetorics like the bullshit 1MalangSial and now TM Nut is screwing us conned-sumers. Lucky for us, we have you to make this country a much better place. What you've suggested to me sounds complicated. I'll need to check with TM and get them to come over. Then, work with them on changing the accessibility and password. Have a great day ahead!!! |
|
|
Jun 3 2010, 01:14 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,104 posts Joined: Oct 2006 |
QUOTE(unker @ Jun 3 2010, 12:57 PM) Dear Riz, TMnut screw us since dial - up and streamyx era.. lolzzAgain, thanks for all that you're doing. M'sia is such a screwed up place, full of rhetorics like the bullshit 1MalangSial and now TM Nut is screwing us conned-sumers. Lucky for us, we have you to make this country a much better place. What you've suggested to me sounds complicated. I'll need to check with TM and get them to come over. Then, work with them on changing the accessibility and password. Have a great day ahead!!! |
|
|
Jun 3 2010, 01:28 PM
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,473 posts Joined: Oct 2006 From: Jupiter |
wah, the star posted this news somemore,
riz, you've done really well They said, hacker unlikely can success to hack a user because of don't know the target's IP address, ok la, Dynamic IP always change IP, but to check a user's current IP isn't hard, even we can do it, but only valid at the time that user still stay connected as the same ip, How about Unifi for business? static IP address, once the hacker knows the ip address, business unifi user always risky, as long the remote management still remain opened This post has been edited by squall0833: Jun 3 2010, 01:40 PM |
|
|
Jun 3 2010, 01:55 PM
|
|
Elite
195 posts Joined: Sep 2006 |
QUOTE(squall0833 @ Jun 3 2010, 01:28 PM) wah, the star posted this news somemore, Like I said earlier, the Star didn't do their research properly. Dynamic IP.. so what? Just use a port scanner? You're only doing this because you want a free Unifi account/proxy.. doesn't matter who you hit. Dynamic IPs are all allocated in the same IP block for the same service.riz, you've done really well They said, hacker unlikely can success to hack a user because of don't know the target's IP address, ok la, Dynamic IP always change IP, but to check a user's current IP isn't hard, even we can do it, but only valid at the time that user still stay connected as the same ip, How about Unifi for business? static IP address, once the hacker knows the ip address, business unifi user always risky, as long the remote management still remain opened This post has been edited by rizvanrp: Jun 3 2010, 01:56 PM |
|
|
Jun 3 2010, 02:30 PM
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,473 posts Joined: Oct 2006 From: Jupiter |
QUOTE(rizvanrp @ Jun 3 2010, 01:55 PM) Like I said earlier, the Star didn't do their research properly. Dynamic IP.. so what? Just use a port scanner? You're only doing this because you want a free Unifi account/proxy.. doesn't matter who you hit. Dynamic IPs are all allocated in the same IP block for the same service. yeah, so all unifi users who hasn't changed their configuration now, seriously unsecureThis post has been edited by squall0833: Jun 3 2010, 02:34 PM |
|
|
Jun 3 2010, 03:13 PM
|
![]() ![]() ![]()
Junior Member
318 posts Joined: Dec 2004 |
just installed unifi today..
how to access the true admin account? can anyone inform me? already disabled the remote access edited: opss.. okey.. just found it.. This post has been edited by rizfield: Jun 3 2010, 03:21 PM |
|
|
|
|
|
Jun 3 2010, 03:20 PM
|
|
Elite
195 posts Joined: Sep 2006 |
QUOTE(rizfield @ Jun 3 2010, 03:13 PM) just installed unifi today.. Guides at http://unifi.athena.my/how to access the true admin account? can anyone inform me? already disabled the remote access |
|
|
Jun 4 2010, 01:26 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,242 posts Joined: Aug 2006 From: Soviet Putrajaya |
damn, after 2 hours reading the whole posts. i somehow do learn something in the process. man, makes me wonder how vulnerable i am right now by not changing my default password. i took i lightly and caused me numerous problems before.
thanks to TS for bringing this thing up to public. glad to know that our fellow LYN care to share the most important info as TM users. |
|
|
Jun 4 2010, 10:17 AM
|
![]()
Newbie
0 posts Joined: Jun 2010 |
QUOTE(+Newbie+ @ Jun 3 2010, 10:26 AM) @rizvanrp, I dunno. I think it's ok if they change the password themselves, then tell the users. Maybe some users can configure router settings, but I doubt most people know how to do it.Thanks for all the research and sharing them. For those whose Remote Management is enabled, did TM even bother to ensure that it is configured to allow only their own technicians to access? E.g. Lock IP address, etc. That newspaper article did not address the main problem. Precisely. Remote management is not the main issue. It's the way they did it. Not only did they not tell users, consumers and commercial, that there is a superior hidden root access account, but they also chose to use a generic password for all their routers. The way it's being done currently, it's just plain laziness. Actually, if you read that carefully, they said they will change the passwords and then share that password with the customer. If they live up to their word, once they change it and inform you the new password, just change it back to another password. If TM needs access in future, let them call you and you can reset the password to a temp password, let them use it and then change the password again in future. |
|
|
Jun 4 2010, 03:13 PM
|
|
VIP
3,055 posts Joined: Jan 2003 |
QUOTE(jinguan78 @ Jun 4 2010, 10:17 AM) I dunno. I think it's ok if they change the password themselves, then tell the users. Maybe some users can configure router settings, but I doubt most people know how to do it. Yes. I think that's exactly what TM is going to do. They plan to change the passwords themselves, then share that new password with you. The other parts I mentioned are just optional steps an user can take if they decide not to trust the TM technicians. |
|
|
Jun 6 2010, 03:41 PM
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,807 posts Joined: Jan 2003 From: KL |
Not sure what's going on, seems TM put a temporary stop-gap measure in place by blocking connections on port 22(SSH) heading for 110.159.* IPs.
I had someone enable remote SSH on his DIR-615. Using the default port 22, I wasn't able to connect from my Streamyx to his Unifi. (connection closed at remote end) Then I asked him to change the SSH port to a random 5-digit number, and voila I managed to login to router using putty. Like rizvan said, I was able to use his connection as a SOCKS proxy (ssh dynamic forwarding). |
|
|
Jun 6 2010, 04:14 PM
|
![]() ![]()
Junior Member
159 posts Joined: Mar 2009 |
QUOTE(socratesman @ Jun 6 2010, 03:41 PM) Not sure what's going on, seems TM put a temporary stop-gap measure in place by blocking connections on port 22(SSH) heading for 110.159.* IPs. By blocking ports, won't really help much, tho it probably will cause some troubles for users who ssh alot to their servers. Who knows, some of the unifi users does host a personal web server?I had someone enable remote SSH on his DIR-615. Using the default port 22, I wasn't able to connect from my Streamyx to his Unifi. (connection closed at remote end) Then I asked him to change the SSH port to a random 5-digit number, and voila I managed to login to router using putty. Like rizvan said, I was able to use his connection as a SOCKS proxy (ssh dynamic forwarding). Thanks for the headup, riz, will keep that in mind =) |
|
|
Jun 6 2010, 04:42 PM
|
|
Elite
195 posts Joined: Sep 2006 |
QUOTE(socratesman @ Jun 6 2010, 03:41 PM) Not sure what's going on, seems TM put a temporary stop-gap measure in place by blocking connections on port 22(SSH) heading for 110.159.* IPs. At least the LYN people who read my posts will be safe by securing their DIR-615 or using their own routers. There's just no way TM can magically give everyone a special unique router password combination now, it has to be done by the user. This is what happens when you don't even set up basic security and try to 'hide' things from the users. I'm pretty certain more stuff is going to happen when Unifi's coverage area expands and people have access to the Fiberhome units.I had someone enable remote SSH on his DIR-615. Using the default port 22, I wasn't able to connect from my Streamyx to his Unifi. (connection closed at remote end) Then I asked him to change the SSH port to a random 5-digit number, and voila I managed to login to router using putty. Like rizvan said, I was able to use his connection as a SOCKS proxy (ssh dynamic forwarding). They should also be blocking port 8080, not just 22 This post has been edited by rizvanrp: Jun 7 2010, 09:08 AM |
|
Topic ClosedOptions
|
| Change to: | 0.0221sec
0.64
6 queries
GZIP Disabled
Time is now: 5th December 2025 - 09:43 PM |