[169585] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Hackers hijack 300, 000-plus wireless routers, make malicious

daemon@ATHENA.MIT.EDU (Jimmy Hess)
Tue Mar 4 14:11:02 2014

In-Reply-To: <DC5ED98B905D0B4D9DB6C73C0FF373DA5F0B4FB6@UOS-DUN-MBX2.st-andrews.ac.uk>
From: Jimmy Hess <mysidia@gmail.com>
Date: Tue, 4 Mar 2014 13:10:19 -0600
To: Ian McDonald <iam@st-andrews.ac.uk>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Tue, Mar 4, 2014 at 12:33 PM, Ian McDonald <iam@st-andrews.ac.uk> wrote:

> Until the average user's cpe is only permitted to use the resolvers one
> has provided as the provider (or otherwise decided are OK), this is going
> to be a game of whackamole.


No.   That is still just treating symptoms, and not the disease.
This also creates an unacceptable annoyance for the most slightly technical
user who needs to troubleshoot any DNS problems  with their domains.

When the ISP's nameservers are blocked,  the script kiddies will set up a
tunnel,  or configure the DNS client to use a different UDP port number for
DNS resolution,   or adjust the router firmware   to  run tcpdump and
upload  session data to/from interesting web destinations,   to a hostname
on port 80.

--
-JH

home help back first fref pref prev next nref lref last post