http://arstechnica.com/security/2014/03/hackers-hijack-30-plus-wireless-routers-make-malicious-changes/
Is there any valid reason not to black hole those /32s on the back bone?
--
Sent from my Android phone with K-9 Mail. Please excuse my brevity.
On Tue, 04 Mar 2014 09:00:18 +0100, Jay Ashworth j...@baylink.com wrote:
http://arstechnica.com/security/2014/03/hackers-hijack-30-plus-wireless-routers-make-malicious-changes/
Is there any valid reason not to black hole those /32s on the back bone?
The telltale sign a router has been
On Tue, Mar 4, 2014 at 5:46 AM, fmm vo...@fakmoymozg.ru wrote:
On Tue, 04 Mar 2014 09:00:18 +0100, Jay Ashworth j...@baylink.com wrote:
http://arstechnica.com/security/2014/03/hackers-hijack-30-plus-wireless-routers-make-malicious-changes/
Is there any valid reason not to black hole
Andrew Latham wrote:
On Tue, Mar 4, 2014 at 5:46 AM, fmm vo...@fakmoymozg.ru wrote:
On Tue, 04 Mar 2014 09:00:18 +0100, Jay Ashworth j...@baylink.com wrote:
http://arstechnica.com/security/2014/03/hackers-hijack-30-plus-wireless-routers-make-malicious-changes/
Is there any valid reason
Why want to swing such a big hammer. Even blocking those 2 IP's will
isolate your users, and fill your support queue's.
Set up a DNS server locally to reply to those IP's Your customers stay up
and running and blissfully unaware.
Log the IP's hitting your DNS servers on those IP and have your
On Tue, Mar 4, 2014 at 7:27 AM, Davide Davini diotona...@gmail.com wrote:
Andrew Latham wrote:
On Tue, Mar 4, 2014 at 5:46 AM, fmm vo...@fakmoymozg.ru wrote:
On Tue, 04 Mar 2014 09:00:18 +0100, Jay Ashworth j...@baylink.com wrote:
Am 04.03.2014 05:19, schrieb William Herrin:
Reasons why dynamic DNS fails to perform as expected include:
* Web browser DNS pinning can result in a customer's web browser
holding the old IP address indefinitely.
* Host-level caching of looked up names which discards the TTL.
Remember:
I've been doing the suggestion below for many years using the IP
addresses that Cogent gives us. All I needed to do is get LOA from them
and submit it to my backup ISP. I've never had an issue with my Cogent
IP's *not* being advertised by my other ISP and I really don't think
there is very
On Tue, 04 Mar 2014 09:28:01 -0400, jim deleskie said:
Why want to swing such a big hammer. Even blocking those 2 IP's will
isolate your users, and fill your support queue's.
Set up a DNS server locally to reply to those IP's Your customers stay up
and running and blissfully unaware.
Log
- Original Message -
From: Andrew Latham lath...@gmail.com
you wanted to say blackhole those 5.45.72.0/22 and 5.45.76.0/22,
Jay is right, it is just the /32s at the moment... Dropping the /22s
could cause other sites to be blocked.
inetnum: 5.45.72.0 - 5.45.75.255
netname:
- Original Message -
From: jim deleskie deles...@gmail.com
Why swing such a big hammer. Even blocking those 2 IP's will
isolate your users, and fill your support queue's.
Set up a DNS server locally to reply to those IP's Your customers stay up
and running and blissfully unaware.
On 03/04/2014 05:28 AM, jim deleskie wrote:
Why want to swing such a big hammer. Even blocking those 2 IP's will
isolate your users, and fill your support queue's.
When the malicious DNS services get shutdown you will still have your
support queue's filled, anyway.
Doing it now will let you
Until the average user's cpe is only permitted to use the resolvers one has
provided as the provider (or otherwise decided are OK), this is going to be a
game of whackamole. So long as there's an 'I have a clue' opt out, it appears
to be the way forward to resolve this issue. Shutting down one
On Tue, Mar 4, 2014 at 12:33 PM, Ian McDonald i...@st-andrews.ac.uk wrote:
Until the average user's cpe is only permitted to use the resolvers one
has provided as the provider (or otherwise decided are OK), this is going
to be a game of whackamole.
No. That is still just treating symptoms,
On Mar 4, 2014, at 6:54 AM, valdis.kletni...@vt.edu wrote:
On Tue, 04 Mar 2014 09:28:01 -0400, jim deleskie said:
Why want to swing such a big hammer. Even blocking those 2 IP's will
isolate your users, and fill your support queue's.
Set up a DNS server locally to reply to those IP's
I don¹t know that they have a lot of motivation to support ³legacy² access
points. The home brew guys tend to magically ³find² ways to install
software on these POS CPE AP/Router combos, which I don¹t think is a
coincidence. The linksys types of the world want to sell more routers, not
make
On 3/4/14, 11:52 AM, Merike Kaeo k...@merike.com wrote:
CPE devices are just a huge cesspool. Any device that already
doesn't let you change username 'admin' is off to a bad start. We
have to get these supposedly 'plug it in and never touch it'
devices to be better at firmware upgrades.
*
On 04/03/14 10:33, Ian McDonald wrote:
Until the average user's cpe is only permitted to use the resolvers one
has provided as the provider (or otherwise decided are OK), this is
going to be a game of whackamole. So long as there's an 'I have a clue'
opt out, it appears to be the way forward
Hello all,
Don't suppose there's any CenturyLink engineers/tech people on this list
that can look into a problem with their IPv6 6rd service?
Got multiple customers on CenturyLink (including myself), with IPv6
through their 6rd service since native isn't available yet. IPv6
assignments
Oh hell.
Is this the *same* bug that just broke in Apple code last week?
Cheers,
-- jra
- Forwarded Message -
From: PRIVACY Forum mailing list priv...@vortex.com
To: privacy-l...@vortex.com
Sent: Tuesday, March 4, 2014 3:17:43 PM
Subject: [ PRIVACY Forum ] Critical crypto bug leaves
Hi Everyone,
So I have a client who moved a domain specifically periodforgood.com to
a new VPS with our company.
DNS has been updated and the TTL time is 4 hours so things should all be
updated but something might still be wrong. Looking for help /
confirmation that things look good. And
Would an ATT engineer who deals with uverse IPv6 please contact me off
list? I'm getting horrible throughput on your 6RD.
Thanks!
Andrew
For all it's worth, it might be Cox ignoring TTLs and enforcing their
own update times instead.
Wait 24-48 hours, and it should probably fix it all up.
I'm not seeing anything majorly broken with your system except the SOA
EXPIRE being ridiculously large.
On 3/5/2014 午後 01:40, Mark Keymer
On Tue, Mar 04, 2014 at 10:07:56PM -0500, Jay Ashworth wrote:
Oh hell.
Is this the *same* bug that just broke in Apple code last week?
I'd be surprised if Apple used GnuTLS, on licencing grounds...
widely used cryptographic code library. The bug in the GnuTLS library
On the other hand,
24 matches
Mail list logo