@Rizvanrp:
is this why the DIR-615 feels so laggy when accessing it? =x
Unifi WARNING TO ALL UNIFI USERS, Threat warning, read inside
Unifi WARNING TO ALL UNIFI USERS, Threat warning, read inside
|
|
May 29 2010, 07:51 PM
|
![]() ![]() ![]() ![]() ![]()
Senior Member
810 posts Joined: Feb 2008 From: 127.0.0.1 |
@Rizvanrp:
is this why the DIR-615 feels so laggy when accessing it? =x |
|
|
|
|
|
May 29 2010, 08:25 PM
|
|
Elite
195 posts Joined: Sep 2006 |
QUOTE(night_wolf_in @ May 29 2010, 05:18 PM) im not sure if i should laugh or cry. Oh no, CCNP's and their logic ._.If you think they want to spy on YOU by creating a second management account. Then it is big fail for all you guys, pretending to know how internet works. Your Modem/router will be connected a layer two switch. or lets say connected to a port. they can use "SPAN" to see all the traffic you are sending and receiving. But again, doing that to every indivicual will be really tiring. Easier is, run "SPAN" to the uplink, that is connecting the layer two switch to the distribution switch. and bam, they can get all i/o traffic from the whole switch. WAIT. They can add high end firewalls at the uplinks to every area (logical or geographical) or just again SPAN the traffic to the firewalls. AND they practically SEE every traffic you sending. Conclusion is. dont cry a river for a second account your ISP put it. if they did, it is to make your experience better. but if you think you can out smart them. please do. How i know. I'm a CCNP and working under routing/ switching and security for some enterprise. Added on May 29, 2010, 5:19 pm No, they use packet shaping devices for that. Never once did I claim this was for TM to 'spy' on you, I said its a hole for outsiders to spy on you or mess with you. I stated that TM doesn't need to spy on you when they control the network. The problem is because there's this secondary account, other people can log into your router and enable the SSHd for busybox. As a CCNP, you should already be aware of the implications of SSHd running on your Internet gateway with full root access to the outside world? SSHd comes with a few functions, you have SCP/SFTP (which is disabled on this dropbear build) and most importantly.. it has the ability to do SOCKS forwarding. I've already tested this and it works -- in order words, I was able to turn every Unifi router into an open SOCKS proxy. Imagine what I could do, credit card fraud, ICMP based DDoS attacks.. etc., this doesn't concern you as a CCNP? The router also has about 10MB of free ram and a filesystem loaded to utilize it, what if I compile a special binary for busybox then pull it into the router using tftp or ftpget? This binary could be a traffic sniffer, dynamic IP notifier and so on, what then? The main router that's handling all your Unifi traffic has a traffic sniffer attached to it but you still feel your network is secure? Did you know every Unifibiz (with static PPPoE addressing) has this enabled by default? That anyone can access the router and do all this shit? So please, I get that you're a CCNP and you could build your own Internet if you wanted but you and I both know that leaving an embedded Linux based router with SSHd wide open to the internet while its routing all your Internet traffic is a bloody bad idea and its highly exploitable. I wouldn't write a thread like this unless I've already done the attacks and understood the implications. I'm glad you know how to setup networking hardware and advanced routing protocols but when it comes to security you seem to be completely 'blur'. QUOTE so if someone who is very smart, go play with the settings, then internet doesn't work. You really think that BusyBox can only 'play with the settings' and cut you off the net? Lol, you need to get off IOS and into embedded Linux. It's stupid assumptions like this which created this mess in the first place. You have a VLAN capable router here with a full embedded Linux distro running on it and you assume all it runs is a PPP daemon. Bloody laughable. ![]() There's no way such a cheap device could have a webserver with a PHP interpreter huh? Maybe you should work on that CEH soon This post has been edited by rizvanrp: May 29 2010, 08:40 PM |
|
|
May 29 2010, 08:33 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
6,381 posts Joined: Jun 2005 From: meow meow |
QUOTE(kons @ May 29 2010, 09:10 AM) It's normal for UniFi or normal DSL broadband. This, last time my company applied for streamyx, they also have remote management enabled. At first I was curious if my boss did enable remote management on the modem since he use remote desktop on one of the account computer..but no, he didn't even noticed.Those guys who installed the riger modems at my new house last time also enabled remote management and locked out the admin mgmt account. I have replaced them straight away. As long as it's RJ45/RJ11, I guess it's always possible to use our own equipment. So I just straight away disable the remote management on the modem, and changed the password to stronger password, password with symbols, caps, numeric and alpha. So it seems in unifi case...I'm suspecting tm try to monitor what kind of data/packet their user currently using most? And does involves companies as well? Thanks for the TS for the head-up. no matter how, this should be reported to mcmc/mycert already...since other groups/people might use this advantage and abuse existing unifi users...think what kind of damages they might causes? sigh, monopoly player... This post has been edited by GameSky: May 29 2010, 08:36 PM |
|
|
May 29 2010, 08:56 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,104 posts Joined: Oct 2006 |
QUOTE(rizvanrp @ May 29 2010, 08:25 PM) Oh no, CCNP's and their logic ._. ya...i also cannot tahan with the last line..when he put he is CCNP..lolzzSo please, I get that you're a CCNP and you could build your own Internet if you wanted but you and I both know that leaving an embedded Linux based router with SSHd wide open to the internet while its routing all your Internet traffic is a bloody bad idea and its highly exploitable. I wouldn't write a thread like this unless I've already done the attacks and understood the implications. I'm glad you know how to setup networking hardware and advanced routing protocols but when it comes to security you seem to be completely 'blur'. You really think that BusyBox can only 'play with the settings' and cut you off the net? Lol, you need to get off IOS and into embedded Linux. It's stupid assumptions like this which created this mess in the first place. You have a VLAN capable router here with a full embedded Linux distro running on it and you assume all it runs is a PPP daemon. Bloody laughable. There's no way such a cheap device could have a webserver with a PHP interpreter huh? Maybe you should work on that CEH soon This post has been edited by ciohbu: May 29 2010, 08:56 PM |
|
|
May 29 2010, 09:00 PM
|
![]() ![]() ![]() ![]()
Junior Member
512 posts Joined: Mar 2007 |
QUOTE(rizvanrp @ May 29 2010, 08:25 PM) so you want to tell me. that by disabling that other management account. and cause you know how to give a good password for your own user account. your modem/router is secured? the first thing in security, there is no security. Even if you unplug your system from the internet. there is possible of security attacks. Believe me. if someone wants to use that box you have for hacking. they would have done it long time ago. so when it comes to, should ISP make an account for them to access your box to assist you. or should they close it. They rather make an account. If later on they can't control the situation cause all the boxes turned into bots. then it is their issue to solve. Just know that by disabling that account, you are not safer than when it was open. cheers |
|
|
May 29 2010, 09:11 PM
|
|
Elite
195 posts Joined: Sep 2006 |
@night_wolf_in
Glad you've changed your stance from 'this is not significant' to 'this is not secure'. I guess you finally see what root access on this router allows an attacker to do so I'm happy for you I am fully aware that nothing is secure, the fix I gave is only to temporarily secure their routers from outside attacks on the WAN. The LAN can still access the SSH daemon by default, it cannot be turned off. Having this extra security will already prevent a multitude of attacks people can perform. The only way to completely remove this is to access that secondary account and change the password, set up iptables or disable that account completely @ the /etc/passwd level. QUOTE Believe me. if someone wants to use that box you have for hacking. they would have done it long time ago. Unfortunately, I was the first person to discover it so this doesn't really apply This shit has to stop now, they can't keep treating their users like morons. Its not a problem if the user ever forgets the password because these systems run on FLASH memory with the bootloader being in ROM. They can just hit a reset button and everything is fixed (including the NVRAM parameters). There's no reason not to trust the user with this account. In fact, giving them access to this account will allow them to use the DIR-615 as a VLAN - physical port bridge and completely remove this exploit. I went to a Unifibiz setup once and the company (a very large one) was forced to use the DIR-615 for routing because the latest ZyWall did not support PPPoE over VLAN interfaces. I'm pretty sure the sysadmin changed the 'admin' password and left remote management open because it lets him remotely diagnose problems with the router instead of having to stand in the server room all day. I don't think he's aware of this secondary account which bypasses that completely. So yeah This post has been edited by rizvanrp: May 29 2010, 09:13 PM |
|
|
|
|
|
May 29 2010, 09:11 PM
|
![]() ![]()
Junior Member
264 posts Joined: Nov 2004 From: 127.0.0.1 |
hey i just got unifi installed yesterday. was trying to fiddle with the router settings but i realised they didnt give me the password; so, i reset the damn thing haha. but i didnt know about the "global account" thing, whats the user/pass for that? care to PM me anyone?
|
|
|
May 29 2010, 09:20 PM
|
|
Elite
195 posts Joined: Sep 2006 |
Sorry I forgot to add this in, Unifi's main VLAN has no caps on it. Every user is capped at the account level only. This means if a 5mbps breaks into a 20mbps users router and takes his user/pass, he will get 20mbps at home. Nice job TM
Since you're going to be implementing an account cap, I can't imagine what people would do to get past it This post has been edited by rizvanrp: May 29 2010, 09:25 PM |
|
|
May 29 2010, 09:29 PM
|
![]() ![]() ![]() ![]()
Senior Member
603 posts Joined: Dec 2008 |
QUOTE(rizvanrp @ May 29 2010, 09:20 PM) Sorry I forgot to add this in, Unifi's main VLAN has no caps on it. Every user is capped at the account level only. This means if a 5mbps breaks into a 20mbps users router and takes his user/pass, he will get 20mbps at home. Nice job TM Unfortunately the Dlink DIR-615 doesn't have gigabit ethernet ports.Else this would mean havoc!Since you're going to be implementing an account cap, I can't imagine what people would do to get past it But you can still assign multiple 20M accounts to each port or maybe choose to watch IPTV channels in different rooms at home. Dedicated 20M for each computer You have 4 ports to play with |
|
|
May 29 2010, 09:41 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,104 posts Joined: Oct 2006 |
QUOTE(night_wolf_in @ May 29 2010, 09:00 PM) so you want to tell me. that by disabling that other management account. and cause you know how to give a good password for your own user account. your modem/router is secured? if u are really ccnp, u should know that nothing is 100% secured, u deal with enterprise a lot in ur work rite? i believe u do disable some unnecessary cisco router services such as bootp .. and giv ur router a AAA authentication .. ya.. it is not secured but at least its better than nothing.. same goes to this unifi router. the first thing in security, there is no security. Even if you unplug your system from the internet. there is possible of security attacks. Believe me. if someone wants to use that box you have for hacking. they would have done it long time ago. so when it comes to, should ISP make an account for them to access your box to assist you. or should they close it. They rather make an account. If later on they can't control the situation cause all the boxes turned into bots. then it is their issue to solve. Just know that by disabling that account, you are not safer than when it was open. cheers i notice that ur ideology is kinda funny.. that "if someone wants to use that box you have for hacking. they would have done it long time ago " .. This post has been edited by ciohbu: May 29 2010, 09:42 PM |
|
|
May 29 2010, 09:48 PM
|
![]() ![]() ![]()
Junior Member
358 posts Joined: Sep 2009 |
according to my belkin router, remote management means:
Remote Management Before you enable this function, MAKE SURE YOU HAVE SET THE ADMINISTRATOR PASSWORD. Remote management allows you to make changes to your Router's settings from anywhere on the Internet. There are two methods of remotely managing the router. The first method is to allow access to the router from anywhere on the Internet by selecting "Any IP address can remotely manage the router". By typing in your WAN IP address from any computer on the Internet, you will be presented with a login screen where you need to type in the password of your router. The Second method is to allow a specific IP address only to remotely manage the router. This is more secure, but less convenient. To use this method, enter the IP address you know you will be accessing the Router from in the space provided and select "Only this IP address can remotely" manage the Router. Before you enable this function, it is STRONGLY RECOMMENDED that you set your administrator password. Leaving the password empty will potentially open your router to intrusion. |
|
|
May 29 2010, 10:17 PM
|
![]() ![]() ![]() ![]()
Senior Member
608 posts Joined: Nov 2009 From: 127.0.0.1 |
QUOTE(azwan92 @ May 29 2010, 09:48 PM) according to my belkin router, remote management means: So, if they cud only change the router settings, they can't spy our porns? Remote Management Before you enable this function, MAKE SURE YOU HAVE SET THE ADMINISTRATOR PASSWORD. Remote management allows you to make changes to your Router's settings from anywhere on the Internet. There are two methods of remotely managing the router. The first method is to allow access to the router from anywhere on the Internet by selecting "Any IP address can remotely manage the router". By typing in your WAN IP address from any computer on the Internet, you will be presented with a login screen where you need to type in the password of your router. The Second method is to allow a specific IP address only to remotely manage the router. This is more secure, but less convenient. To use this method, enter the IP address you know you will be accessing the Router from in the space provided and select "Only this IP address can remotely" manage the Router. Before you enable this function, it is STRONGLY RECOMMENDED that you set your administrator password. Leaving the password empty will potentially open your router to intrusion. |
|
|
May 29 2010, 10:18 PM
|
![]() ![]()
Junior Member
264 posts Joined: Nov 2004 From: 127.0.0.1 |
does disabling Remote Management from the standard "admin" account disable it from the routers global access as well? or do we have to use the "hidden" account to disable it?
|
|
|
|
|
|
May 29 2010, 10:22 PM
|
|
Elite
195 posts Joined: Sep 2006 |
QUOTE(VengenZ @ May 29 2010, 10:17 PM) Its different from router-to-router. In this case, the remote management lets you enable the SSH server. The SSH server gives you full control over the router, more than whats in the web UI. And since there's a secondary account to access the remote management, there's really no security at all lol |
|
|
May 29 2010, 10:59 PM
|
|
VIP
12,925 posts Joined: Mar 2005 From: Kuala Lumpur |
QUOTE(rizvanrp @ May 29 2010, 10:22 PM) Its different from router-to-router. In this case, the remote management lets you enable the SSH server. The SSH server gives you full control over the router, more than whats in the web UI. And since there's a secondary account to access the remote management, there's really no security at all lol Thanks for putting it upReally bad people can do really mean thing , having SSH is like having candy , oh wait , did I say that it grants you root access. Oh goodie , someone could be stealing all your porn (maybe who knows you might have sharing enabled and I could exploit it , by silently installing OpenVPN , does it even fit , I hope it does and silently be part of your network). They should do something about it |
|
|
May 29 2010, 11:21 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
All Stars
14,039 posts Joined: Jan 2003 |
I believe that this is not the first Unifi "exploit", the first one was access to more channel of its IPTV ??? Until TM decided to scramble IPTV
|
|
|
May 29 2010, 11:39 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,456 posts Joined: Jan 2003 |
QUOTE(night_wolf_in @ May 29 2010, 05:18 PM) im not sure if i should laugh or cry. If i use VPN will that at least give me some privacy despite all the stuff you mentioned ??? That is all i want to know If you think they want to spy on YOU by creating a second management account. Then it is big fail for all you guys, pretending to know how internet works. Your Modem/router will be connected a layer two switch. or lets say connected to a port. they can use "SPAN" to see all the traffic you are sending and receiving. But again, doing that to every indivicual will be really tiring. Easier is, run "SPAN" to the uplink, that is connecting the layer two switch to the distribution switch. and bam, they can get all i/o traffic from the whole switch. WAIT. They can add high end firewalls at the uplinks to every area (logical or geographical) or just again SPAN the traffic to the firewalls. AND they practically SEE every traffic you sending. Conclusion is. dont cry a river for a second account your ISP put it. if they did, it is to make your experience better. but if you think you can out smart them. please do. How i know. I'm a CCNP and working under routing/ switching and security for some enterprise. Added on May 29, 2010, 5:19 pm No, they use packet shaping devices for that. Does anyone else think tmnut should hire Riv and give him a 6 figure salary ??? *raise hands This post has been edited by Moogle Stiltzkin: May 29 2010, 11:48 PM |
|
|
May 29 2010, 11:44 PM
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,568 posts Joined: Dec 2004 From: Malaysia Truly Asia |
Sometimes high speed are not good when exploit found, especially on router or modem, using fiber optics at high speed, your computer might be nightmare for your whole life if those "have full right over your router or modem" to perform the attacks.
|
|
|
May 30 2010, 12:18 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,169 posts Joined: Jan 2009 From: PJ | Seoul |
unifi currently is available at my area.. after readin all tis.. dunno whether shuld i upgrade to unifi or nt.. i'm nt a tech savvy.. might nt kno much.. neway.. those who haf unifi.. may i kno hw is the overall speed? heard tat they will capped their speed soon.. is tat true?
|
|
|
May 30 2010, 12:20 AM
|
![]() ![]() ![]() ![]()
Senior Member
608 posts Joined: Nov 2009 From: 127.0.0.1 |
QUOTE(rizvanrp @ May 29 2010, 10:22 PM) Its different from router-to-router. In this case, the remote management lets you enable the SSH server. The SSH server gives you full control over the router, more than whats in the web UI. And since there's a secondary account to access the remote management, there's really no security at all lol SSH Isn't that shell, can connect using PuTTy and linux |
|
Topic ClosedOptions
|
| Change to: | 0.0206sec
0.28
6 queries
GZIP Disabled
Time is now: 3rd December 2025 - 10:05 AM |