Welcome Guest ( Log In | Register )

Bump Topic Topic Closed RSS Feed
19 Pages « < 8 9 10 11 12 > » Bottom

Outline · [ Standard ] · Linear+

Unifi WARNING TO ALL UNIFI USERS, Threat warning, read inside

views
     
ciohbu
post Jun 3 2010, 07:53 AM

Group: Senior Member
*******
Senior Member
2,104 posts

Joined: Oct 2006
QUOTE(SlayerXT @ Jun 3 2010, 01:25 AM)
Hey are u working for those TM ZTE companies? Dont simply spill the beans here okay  tongue.gif
*
i mean "credit" ... hahaaa..
flowerhorn
post Jun 3 2010, 09:09 AM

Getting Started
**
Junior Member
257 posts

Joined: Feb 2007
QUOTE(rizvanrp @ Jun 3 2010, 04:10 AM)
Updated the Router Security guide on http://unifi.athena.my to disable TR-069
*
Thx for sharing all this. Thanks for all the efford! notworthy.gif
KHS
post Jun 3 2010, 09:28 AM

New Member
*
Junior Member
41 posts

Joined: Mar 2007
this is posted on The Star also: http://techcentral.my/news/story.aspx?file...235&sec=it_news
+Newbie+
post Jun 3 2010, 10:26 AM

To be needed as The Sand's Kazekage
Group Icon
VIP
3,055 posts

Joined: Jan 2003
@rizvanrp,
Thanks for all the research and sharing them. For those whose Remote Management is enabled, did TM even bother to ensure that it is configured to allow only their own technicians to access? E.g. Lock IP address, etc.

That newspaper article did not address the main problem. shakehead.gif

QUOTE(schmeichel7 @ Jun 3 2010, 01:59 AM)
It is a shame on how this was not planned properly....

And I'm not surprised that TM quickly released that statement to safeguard their business and potential future customers.. Who wants to subscribe to unifi if they feel insecure and worried due to the risks..

If only they planned things properly in the first place.. Remote support can be done in a proper way..
*
Precisely. Remote management is not the main issue. It's the way they did it.
Not only did they not tell users, consumers and commercial, that there is a superior hidden root access account, but they also chose to use a generic password for all their routers. The way it's being done currently, it's just plain laziness.

QUOTE(Moogle Stiltzkin @ Jun 3 2010, 03:57 AM)
This if frakkin bullshit. All they said is

1. they are keeping remote access despite our complaints for the CHOICE of not having it (we don't want them poking around inside our stuff. And we don't want a backdoor for l33t hackers.)

2. Their only solution is to change the operator password so we cannot access....... so if we can't access, how do we bypass their shitty router and use our own using Riv's method of making the Dir-615 a vlan bridge (i refuse to use their 32 concurrent connections capable hardware for routing my p2p downloads), and connect it to our own router instead. Why is tmnut ignoring the other issue at hand??? They did not even mention any solution for letting us use our own routers. That is bullshit  vmad.gif
*
Actually, if you read that carefully, they said they will change the passwords and then share that password with the customer. If they live up to their word, once they change it and inform you the new password, just change it back to another password.
If TM needs access in future, let them call you and you can reset the password to a temp password, let them use it and then change the password again in future.

This post has been edited by +Newbie+: Jun 3 2010, 10:31 AM
Moogle Stiltzkin
post Jun 3 2010, 10:36 AM

Look at all my stars!!
*******
Senior Member
4,458 posts

Joined: Jan 2003
QUOTE(+Newbie+ @ Jun 3 2010, 10:26 AM)
Actually, if you read that carefully, they said they will change the passwords and then share that password with the customer. If they live up to their word, once they change it and inform you the new password, just change it back to another password.
If TM needs access in future, let them call you and you can reset the password to a temp password, let them use it and then change the password again in future.
*
Oh :/

Well if that is the case, we will just have to see then hmm.gif

This post has been edited by Moogle Stiltzkin: Jun 3 2010, 10:37 AM
palmjack
post Jun 3 2010, 10:51 AM

Getting Started
**
Junior Member
84 posts

Joined: Feb 2005
QUOTE(flowerhorn @ Jun 3 2010, 09:09 AM)
Thx for sharing all this. Thanks for all the efford! notworthy.gif
*
Appreciate it too Riz. Very helpful, thanks.
silverhawk
post Jun 3 2010, 11:15 AM

Eyes on Target
Group Icon
Elite
4,956 posts

Joined: Jan 2003


Actually if they wanted to create a unique password, it would be easy cause they already have the customer information, and could do easy substitution to create a pretty strong password which tmnet can easily use to access cause they have your personal information which other people do not have.

This would have pretty much avoided the issue. Although I still do not like the idea of tmnet being able to remotely access my router.




unker
post Jun 3 2010, 12:57 PM

New Member
*
Newbie
4 posts

Joined: Jun 2007
Dear Riz,
Again, thanks for all that you're doing. M'sia is such a screwed up place, full of rhetorics like the bullshit 1MalangSial and now TM Nut is screwing us conned-sumers. Lucky for us, we have you to make this country a much better place. notworthy.gif cheers.gif rclxms.gif

What you've suggested to me sounds complicated. I'll need to check with TM and get them to come over. Then, work with them on changing the accessibility and password.

Have a great day ahead!!!
ciohbu
post Jun 3 2010, 01:14 PM

Group: Senior Member
*******
Senior Member
2,104 posts

Joined: Oct 2006
QUOTE(unker @ Jun 3 2010, 12:57 PM)
Dear Riz,
Again, thanks for all that you're doing. M'sia is such a screwed up place, full of rhetorics like the bullshit 1MalangSial and now TM Nut is screwing us conned-sumers. Lucky for us, we have you to make this country a much better place.  notworthy.gif  cheers.gif  rclxms.gif

What you've suggested to me sounds complicated. I'll need to check with TM and get them to come over. Then, work with them on changing the accessibility and password.

Have a great day ahead!!!
*
TMnut screw us since dial - up and streamyx era.. lolzz
squall0833
post Jun 3 2010, 01:28 PM

Regular
******
Senior Member
1,473 posts

Joined: Oct 2006
From: Jupiter


wah, the star posted this news somemore,

riz, you've done really well biggrin.gif


They said, hacker unlikely can success to hack a user because of don't know the target's IP address,

ok la, Dynamic IP always change IP, but to check a user's current IP isn't hard, even we can do it, but only valid at the time that user still stay connected as the same ip,

How about Unifi for business? static IP address, once the hacker knows the ip address, business unifi user always risky, as long the remote management still remain opened hmm.gif

This post has been edited by squall0833: Jun 3 2010, 01:40 PM
TSrizvanrp
post Jun 3 2010, 01:55 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(squall0833 @ Jun 3 2010, 01:28 PM)
wah, the star posted this news somemore,

riz, you've done really well biggrin.gif
They said, hacker unlikely can success to hack a user because of don't know the target's IP address,

ok la, Dynamic IP always change IP, but to check a user's current IP isn't hard, even we can do it, but only valid at the time that user still stay connected as the same ip,

How about Unifi for business? static IP address,   once the hacker knows the ip address, business unifi user always risky, as long the remote management still remain opened  hmm.gif
*
Like I said earlier, the Star didn't do their research properly. Dynamic IP.. so what? Just use a port scanner? You're only doing this because you want a free Unifi account/proxy.. doesn't matter who you hit. Dynamic IPs are all allocated in the same IP block for the same service.

This post has been edited by rizvanrp: Jun 3 2010, 01:56 PM
squall0833
post Jun 3 2010, 02:30 PM

Regular
******
Senior Member
1,473 posts

Joined: Oct 2006
From: Jupiter


QUOTE(rizvanrp @ Jun 3 2010, 01:55 PM)
Like I said earlier, the Star didn't do their research properly. Dynamic IP.. so what? Just use a port scanner? You're only doing this because you want a free Unifi account/proxy.. doesn't matter who you hit. Dynamic IPs are all allocated in the same IP block for the same service.
*
yeah, so all unifi users who hasn't changed their configuration now, seriously unsecure


This post has been edited by squall0833: Jun 3 2010, 02:34 PM
rizfield
post Jun 3 2010, 03:13 PM

Casual
***
Junior Member
318 posts

Joined: Dec 2004


just installed unifi today..

how to access the true admin account? can anyone inform me?
already disabled the remote access

edited: opss.. okey.. just found it.. biggrin.gif

This post has been edited by rizfield: Jun 3 2010, 03:21 PM
TSrizvanrp
post Jun 3 2010, 03:20 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(rizfield @ Jun 3 2010, 03:13 PM)
just installed unifi today..

how to access the true admin account? can anyone inform me?
already disabled the remote access
*
Guides at http://unifi.athena.my/
shah_ho_nam2
post Jun 4 2010, 01:26 AM

らき☆すた
*******
Senior Member
4,242 posts

Joined: Aug 2006
From: Soviet Putrajaya
damn, after 2 hours reading the whole posts. i somehow do learn something in the process. man, makes me wonder how vulnerable i am right now by not changing my default password. i took i lightly and caused me numerous problems before.

thanks to TS for bringing this thing up to public. glad to know that our fellow LYN care to share the most important info as TM users.
jinguan78
post Jun 4 2010, 10:17 AM

New Member
*
Newbie
0 posts

Joined: Jun 2010
QUOTE(+Newbie+ @ Jun 3 2010, 10:26 AM)
@rizvanrp,
Thanks for all the research and sharing them. For those whose Remote Management is enabled, did TM even bother to ensure that it is configured to allow only their own technicians to access? E.g. Lock IP address, etc.

That newspaper article did not address the main problem. shakehead.gif
Precisely. Remote management is not the main issue. It's the way they did it.
Not only did they not tell users, consumers and commercial, that there is a superior hidden root access account, but they also chose to use a generic password for all their routers. The way it's being done currently, it's just plain laziness.
Actually, if you read that carefully, they said they will change the passwords and then share that password with the customer. If they live up to their word, once they change it and inform you the new password, just change it back to another password.
If TM needs access in future, let them call you and you can reset the password to a temp password, let them use it and then change the password again in future.
*
I dunno. I think it's ok if they change the password themselves, then tell the users. Maybe some users can configure router settings, but I doubt most people know how to do it.
+Newbie+
post Jun 4 2010, 03:13 PM

To be needed as The Sand's Kazekage
Group Icon
VIP
3,055 posts

Joined: Jan 2003
QUOTE(jinguan78 @ Jun 4 2010, 10:17 AM)
I dunno. I think it's ok if they change the password themselves, then tell the users. Maybe some users can configure router settings, but I doubt most people know how to do it.
*
Yes. I think that's exactly what TM is going to do. They plan to change the passwords themselves, then share that new password with you.

The other parts I mentioned are just optional steps an user can take if they decide not to trust the TM technicians.
socratesman
post Jun 6 2010, 03:41 PM

Regular
******
Senior Member
1,807 posts

Joined: Jan 2003
From: KL
Not sure what's going on, seems TM put a temporary stop-gap measure in place by blocking connections on port 22(SSH) heading for 110.159.* IPs.

I had someone enable remote SSH on his DIR-615.
Using the default port 22, I wasn't able to connect from my Streamyx to his Unifi. (connection closed at remote end)

Then I asked him to change the SSH port to a random 5-digit number, and voila I managed to login to router using putty.
Like rizvan said, I was able to use his connection as a SOCKS proxy (ssh dynamic forwarding).
Aneena
post Jun 6 2010, 04:14 PM

Getting Started
**
Junior Member
159 posts

Joined: Mar 2009
QUOTE(socratesman @ Jun 6 2010, 03:41 PM)
Not sure what's going on, seems TM put a temporary stop-gap measure in place by blocking connections on port 22(SSH) heading for 110.159.* IPs.

I had someone enable remote SSH on his DIR-615.
Using the default port 22, I wasn't able to connect from my Streamyx to his Unifi. (connection closed at remote end)

Then I asked him to change the SSH port to a random 5-digit number, and voila I managed to login to router using putty.
Like rizvan said, I was able to use his connection as a SOCKS proxy (ssh dynamic forwarding).
*
By blocking ports, won't really help much, tho it probably will cause some troubles for users who ssh alot to their servers. Who knows, some of the unifi users does host a personal web server?

Thanks for the headup, riz, will keep that in mind =)
TSrizvanrp
post Jun 6 2010, 04:42 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(socratesman @ Jun 6 2010, 03:41 PM)
Not sure what's going on, seems TM put a temporary stop-gap measure in place by blocking connections on port 22(SSH) heading for 110.159.* IPs.

I had someone enable remote SSH on his DIR-615.
Using the default port 22, I wasn't able to connect from my Streamyx to his Unifi. (connection closed at remote end)

Then I asked him to change the SSH port to a random 5-digit number, and voila I managed to login to router using putty.
Like rizvan said, I was able to use his connection as a SOCKS proxy (ssh dynamic forwarding).
*
At least the LYN people who read my posts will be safe by securing their DIR-615 or using their own routers. There's just no way TM can magically give everyone a special unique router password combination now, it has to be done by the user. This is what happens when you don't even set up basic security and try to 'hide' things from the users. I'm pretty certain more stuff is going to happen when Unifi's coverage area expands and people have access to the Fiberhome units.

They should also be blocking port 8080, not just 22 sleep.gif

This post has been edited by rizvanrp: Jun 7 2010, 09:08 AM

19 Pages « < 8 9 10 11 12 > » Top
Topic ClosedOptions
 

Change to:
| Lo-Fi Version
0.0221sec    0.64    6 queries    GZIP Disabled
Time is now: 5th December 2025 - 09:43 PM