[95080] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: broadband routers security issues

daemon@ATHENA.MIT.EDU (Jeff Shultz)
Mon Feb 26 18:02:22 2007

Date: Fri, 23 Feb 2007 10:25:43 -0800
From: Jeff Shultz <jeffshultz@wvi.com>
To: Gadi Evron <ge@linuxbox.org>, NANOG list <nanog@nanog.org>
In-Reply-To: <Pine.LNX.4.21.0702221329300.10895-100000@linuxbox.org>
Errors-To: owner-nanog@merit.edu


This is why we specify our DSL modems configured as transparent bridged 
(routing optional) and when they go out the door they're already set up 
as inaccessible from the outside, even if the customer enables routing 
(I've seen one case in 5 years where the customer has done this without 
calling us for help first).

Of course, I've discovered that we're also a bit unusual in that we use 
RFC 1483 Bridged mode and static IPs instead of PPPoE and DHCP for all 
our DSL connections.

We wouldn't accept this sort of default open accessability from Linksys, 
D-link, Netgear, etc... - why should we accept it on our DSL/cable modems?

Gadi Evron wrote:
> Hi guys. A guy named Sid recently wrote on securiteam (where I write
> as well) on an accidental discovery he made on the security of his home
> broadband router with its default settings.
> 
> Apparently, he started by discovering he had port 23 open (which was
> telnet for the router rather than for him - we have all been there
> before).


-- 
Jeff Shultz

home help back first fref pref prev next nref lref last post