the one we hooked up we just did a DMZ, told them the DMZ IP, and gave them a not my chair not my problem
On Wed, Oct 5, 2016 at 6:27 PM, <[email protected]> wrote: > Wonder how long ago that code was written... > > *From:* Eric Kuhnke > *Sent:* Wednesday, October 5, 2016 5:25 PM > *To:* [email protected] > *Subject:* Re: [AFMUG] grain dryer port forwards and IoT security > > It's dumb and the manufacturer should feel bad. But it's not really your > problem to secure their device, if it gets pwned you can cut it off from > the network per your TOS/AUP. > > Not much riskier to the ISP than being a colo provider and renting a small > section of rack space and selling a static /30 to a customer who doesn't > know how to secure their Linux server. > > On Wed, Oct 5, 2016 at 4:22 PM, Ken Hohhof <[email protected]> wrote: > >> We hooked up Internet to a new GSI tower dryer at a grain elevator, and >> assuming this is the correct manual, it wants ports 22, 23, and 80 >> forwarded to it. >> >> >> >> http://www.grainsystems.com/content/dam/Brands/GSI/Manuals/ >> English/Conditioning/pneg1720-062114-OS.pdf >> >> >> >> Without additional firewall rules, does this sound risky? They have a >> cellphone app, which apparently goes directly to the dryer, not through >> some intermediary like a Team Viewer server. So I don’t see what firewall >> rules we could put in. Doesn’t this let every hacker, script kiddie, and >> bot herder in the world try to break into it via SSH, telnet and HTTP? Do >> these guys move on if the default password has been changed? I would think >> they would run dictionary attacks against it. >> > > -- If you only see yourself as part of the team but you don't see your team as part of yourself you have already failed as part of the team.
