Unifi Official TM UniFi High Speed Broadband Thread V42, READ 1ST PAGE FOR RELEVANT WIFI INFO!
Unifi Official TM UniFi High Speed Broadband Thread V42, READ 1ST PAGE FOR RELEVANT WIFI INFO!
|
|
Sep 7 2024, 03:34 PM
Return to original view | Post
#1
|
![]() ![]() ![]() ![]() ![]() ![]()
Validating
1,822 posts Joined: Jul 2010 From: Yesterday, 01:25 AM |
I wonder how well this blanket hijack on the generic port will turn out. We're the consumers still have the option to encrypt via doh, dot, dnscrypt, vpn, tor, proxy etc but problem is legacy hardware out there used by business. I bet theres still plenty of legacy server, modem, router, payment gateway chucked in a basement somewhere, can't use modern encryption protocol but rely on plaintext port 53 for simple curl api call etc. They aren't being decommissioned yet since its still works, monetary constraints, workforce constraints to maintain etc.. Those will be fcked hard if they suddenly fail at 11am on a busy day. And as usual typical bolehland gov, implement dulu dialog kemudian. This post has been edited by axxer: Sep 7 2024, 03:35 PM |
|
|
|
|
|
Sep 8 2024, 12:21 PM
Return to original view | Post
#2
|
![]() ![]() ![]() ![]() ![]() ![]()
Validating
1,822 posts Joined: Jul 2010 From: Yesterday, 01:25 AM |
Finally backed down. We can't fix stupidity, but at least we can talk some sense into the stupids. Or even if the sense never penetrate their thick skull, its still due to the sheere amount of backlash they backed down. Well done people. Moogle Stiltzkin, solarmystic, and 1 other liked this post
|
|
|
Sep 8 2024, 03:33 PM
Return to original view | Post
#3
|
![]() ![]() ![]() ![]() ![]() ![]()
Validating
1,822 posts Joined: Jul 2010 From: Yesterday, 01:25 AM |
QUOTE(l0k0 @ Sep 8 2024, 02:55 PM) Yeh, i guess if TM didn't go full on IP hijacking, there'd be less outrage about this transparent DNS stuff. Didn't even realize theres an ip hijack going on since its not obvious without going low level traceroute and whatnot. What got most people furious is the sni ssl mitm hijack and serving bogus cert. Tm did exactly that to both google and cloudflare doh endpoint. And its obvious to end users, browsers displayed a big red warning saying the cert is bogus. Suddenly people realize if they can do that to the dns endpoint, what stopping them from doing the same to gmail, outlook, riotgames, facebook, tiktok or whatever. Obviously the browsers, email client, games client etc won't accept bogus cert is this day and age, the lingering questions is "what if?". What if they further did X to Y, whats the borderline dangerous according to them if they can't see the danger of mitm ssl. Whole thing just wen't down just like that from single tm action lol Some isp in other countries already successfully hijacked dns cleartext port 53 for years and no one bat an eye. They do that with enough notice though, a year, a few months to get business prepared. Not here, announced a month before, implement in a rush and see all hell break lose with intermittent downtime, sluggishness and whatnot. |
|
|
Sep 8 2024, 07:18 PM
Return to original view | Post
#4
|
![]() ![]() ![]() ![]() ![]() ![]()
Validating
1,822 posts Joined: Jul 2010 From: Yesterday, 01:25 AM |
QUOTE(dev/numb @ Sep 8 2024, 06:15 PM) People saying “we won”. Topkek. Its the first win. How do they expect to blackhole the so called offending site in the first place? Dns is the easiest and cheapest solution, the first query to the internet.Battle just started. Wait till this shit get tabled in parliament next month; https://www.straitstimes.com/asia/se-asia/m...igital-security Granted they could still achieve blackhole without dns involvement, by mitm and redirect the actual connection itself not the initial dns query, but it'll be really expensive really quick. So far only the chinese gfw managed to do that whole countrywide but their network is already a separate countrywide lan in the first place. Tm tried with ssl mitm earlier and it failed miserably, browsers just showed red warning when the supplied cert isn't tally with the endpoint domain. Most site used https nowadays. Granted they could still ask/force individual device in this whole country to install a mitm root cert so their bogus cert would be accepted, but i doubt google, apple, microsoft, mozilla would agree to. Kazakhstan tried the forcing mitm root cert on its citizen hardware route, but mozilla and google reacted by insta blacklist the cert, cutting the idea short lived. Moogle Stiltzkin, solarmystic, and 2 others liked this post
|
|
|
Sep 8 2024, 07:52 PM
Return to original view | Post
#5
|
![]() ![]() ![]() ![]() ![]() ![]()
Validating
1,822 posts Joined: Jul 2010 From: Yesterday, 01:25 AM |
QUOTE(Anime4000 @ Sep 8 2024, 07:27 PM) What if TM buy Intermediate Certificate and do proxy like Cloudflare, TM can sign certificate to any Alt domain or IP Cf mitm cert are widely trusted by default via the root cert chain of trust. And they sign with domain owner explicit consent. Tm problem is to make their cert that signed whatever domain they want without explicit consent by domain owner, to be trusted by default globally. Browsers would just display red warning.Selfsign cert without chain of trust, without domain owner consent is already a thing for years. In fact i can already sign a cert for google.com, instruct my browser to trust the bogus cert, instruct my browser to explicitly use my local authoritative dns only, add a bogus zonefile for google.com on my authoritative dns myself, add dns record pointing google.com to an ip hosted to a server locally, visit google.com on the said browser and no red warning, green lock key and all in address bar. But its just that, only trusted by just my 1 browser. Tm problem is to do all that, selfsign, convince browser to trust the said cert etc, for the whole freakin country. It's unfeasable, see the kazakhstan example earlier. While their citizen maybe already yolo install the mitm root cert, along comes browser manufacturer insta blacklist it. PRSXFENG liked this post
|
|
|
Sep 8 2024, 09:58 PM
Return to original view | Post
#6
|
![]() ![]() ![]() ![]() ![]() ![]()
Validating
1,822 posts Joined: Jul 2010 From: Yesterday, 01:25 AM |
QUOTE(surrodox2001 @ Sep 8 2024, 08:13 PM) With all of this going on, gonna ask a quick question here... Starlink are still bound to local laws. They don't magically get a free pass for supposedly wireless direct to satellite internet. Hell they probably already got their own dc here to comply with pdpa and whatnot. If the directive really goes through eventually starlink need to comply too or just straight pull the plug exit malaysian market. We didn't hear about them in this whole shenanigan probably because they choose to wait and see.Will things like starlink mitigate interruptions like this? Or legislation will get over this? Epic_winner091 liked this post
|
|
|
|
|
|
Sep 11 2024, 03:46 PM
Return to original view | Post
#7
|
![]() ![]() ![]() ![]() ![]() ![]()
Validating
1,822 posts Joined: Jul 2010 From: Yesterday, 01:25 AM |
QUOTE(Oltromen Ripot @ Sep 11 2024, 03:41 PM) 1. i already read of those 2 as early as yesterday morning Only 2 dns provider will use doh when adding to the Private DNS setting on android, Google dns and cloudflare dns. Google hardcoded to only allow those 2 to use doh. If you want to force dot, use other than the 2. Quad9, opendns, adguard dns etc. Or use third party app that can be specific on using either doh or dot depends on your requirement.2. ... and somebody pointed it out to me again yesterday afternoon 3. ... which i mentioned again in today afternoon 4. ... which you again invariably mentioned again through another article. so lets laugh at google for such mediocre effort. -- those cloudflare and google addresses are capable of both DoT and DoH. so when we use them as Android's Secure DNS target; how can we be sure whether it's really using DoH? and not DoT? i know that my own DoH didn't even log any https request. BladeRider88 and BenYeeHua liked this post
|
|
|
Sep 11 2024, 09:07 PM
Return to original view | Post
#8
|
![]() ![]() ![]() ![]() ![]() ![]()
Validating
1,822 posts Joined: Jul 2010 From: Yesterday, 01:25 AM |
QUOTE(dev/numb @ Sep 11 2024, 04:14 PM) At this point, I think you can only depend on an app if you want device-wide DoH on Android using your preferred provider. If you insist on not using an app (understandable because many of these apps will use the VPN profile) then you can only mitigate it by relying on a browser that supports DoH to do most of your stuff while leaving the rest of the system/apps on DoT. I do this on my Android setup actually. One NextDNS profile for OS in DoT format, and a separate profile from Cromite in DoH. I do this mainly because it’s easier for me to check the logs if I need to narrow down something based on timestamps. Third party app arent that bad when you find something that can do more than just dns. The rethinkdns android app is 1 of them. Dns client+wireguard client+firewall. I freakin love it. Assuming vpn provider can generate wireguard config, can just add the config to rethink and enjoy vpn+encrypted dns via doh, doh, dnscrypt, oblivios doh and rethinkdns native server. Plus it can connect to 2+ wireguard server at the same time and can split connections. Basically can setup netflix, disney+ etc to use us server and enjoy us content while browser and other apps uses other server. No more need to manually change vpn server based on what app you're going to use, its split tunnel on the fly. Its superb. |
|
|
Sep 12 2024, 07:41 PM
Return to original view | Post
#9
|
![]() ![]() ![]() ![]() ![]() ![]()
Validating
1,822 posts Joined: Jul 2010 From: Yesterday, 01:25 AM |
QUOTE(issac99289928 @ Sep 12 2024, 02:45 PM) the DNS redirection may be a political decision in show of strength against tech giants .tit for tat What a stupid argument. Tech giant biased against palestine > we ssl mitm our country network. Whataboutism at its best. The "Think about the kids!" argument are also as old as any tyranism regime everywhere, and the sheeps that lack critical thinking just ate it as it is, " Yes we cared about our kids!". What a shitshow this country has gone into.https://thediplomat.com/2024/08/meta-apolog...-assassination/ Kuala Lumpur has accused tech giants of censoring pro-Palestinian opinion since the beginning of the Gaza war Moogle Stiltzkin, BladeRider88, and 4 others liked this post
|
|
|
Sep 12 2024, 08:05 PM
Return to original view | Post
#10
|
![]() ![]() ![]() ![]() ![]() ![]()
Validating
1,822 posts Joined: Jul 2010 From: Yesterday, 01:25 AM |
I'm still waiting for the killswitch proposal that should be tabled to the parliament in october. Its still vague what it actually is, either individual site killswitch or whole countrywide network blackout. Weird if its individual site killswitch since thats what they're been doing all these years, straight block with telco default dns. So should be countrywide blackout? Thats another shitshow waiting to happen if it passed and being implemented. I think only azalina alone has spoken about that one, no fahmi nor mcmc comment yet. And as cliche as usual, azalina has brought forward the "think about our kids!" argument. BladeRider88 and PRSXFENG liked this post
|
|
Topic ClosedOptions
|
| Change to: | 0.2642sec
1.00
7 queries
GZIP Disabled
Time is now: 18th December 2025 - 03:55 PM |