Welcome Guest ( Log In | Register )

Bump Topic Topic Closed RSS Feed

Outline · [ Standard ] · Linear+

Unifi WARNING TO ALL UNIFI USERS, Threat warning, read inside

views
     
ihsan
post Jun 1 2010, 07:29 PM

Regular
Group Icon
Elite
1,235 posts

Joined: Jan 2003
From: kuala lipis
i think the issue is not about running ssh daemon or not. most routers run ssh on internet-facing segment so no biggie. the real issue in my opinion is the fact that the remote management is enabled for 0/0 network which actually means anyone including my mother can access any resources in the router.

so if it's part of the t&c that tm can and must access the RG then they can do that. the incompetence part of this is opening it up for all the world to access. ideally the router should only be access from trusted/authorized segment which has to be explicitly specified in the remote management section.
ihsan
post Jun 2 2010, 05:20 PM

Regular
Group Icon
Elite
1,235 posts

Joined: Jan 2003
From: kuala lipis
QUOTE(rizvanrp @ Jun 2 2010, 01:16 PM)
@ihsan

Having the SSHd enabled alone allows them to turn every router into a proxy using SSH tunneling. It's not necessary to have SSH at all since the web interface provides all the necessary tools.. and there are TTL connectors on the DIR-615 board which allow for serial connections. Hiding the account made us crack our heads for months wondering what would be a good VLAN switch to use as a bridge when the DIR-615 could be used all along.. something they denied was possible. I'm sure newbies wont mind letting TM's support staff access their router to help them troubleshoot the situation but advanced users and corporations may not feel comfortable with that sort of thing. Even if this was the case, TM wouldn't be able to access the router remotely if the HSBB line was having connection issues.
if the access list only allows certain range to access the box, then only from that segment can someone tunnel over SSH. since I would think that the origin the router has to be a linux or something similar to that, i figure an sshd daemon is needed to do low-level diagnostics or configuration since you expose yourself to unnecessary risk if you open up low level access via web application. of course there's a way to mitigate the level of compromise i.e. webapp speak to system daemon via restricted socket etc, i doubt that current breeds of RGs have that level of sophistication.

back to the question whether or not it's appropriate to have low-level access from the perspective of remote RG management, i think it's more of a matter of policy. and of course having said that the password management could have done better.

good job for the expose. it takes just one exploit for them to feel the heat.

This post has been edited by ihsan: Jun 2 2010, 05:25 PM

Topic ClosedOptions
 

Change to:
| Lo-Fi Version
0.4014sec    0.33    7 queries    GZIP Disabled
Time is now: 30th November 2025 - 06:50 AM