Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Jay Ashworth
http://arstechnica.com/security/2014/03/hackers-hijack-30-plus-wireless-routers-make-malicious-changes/ Is there any valid reason not to black hole those /32s on the back bone? -- Sent from my Android phone with K-9 Mail. Please excuse my brevity.

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread fmm
On Tue, 04 Mar 2014 09:00:18 +0100, Jay Ashworth j...@baylink.com wrote: http://arstechnica.com/security/2014/03/hackers-hijack-30-plus-wireless-routers-make-malicious-changes/ Is there any valid reason not to black hole those /32s on the back bone? The telltale sign a router has been

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Andrew Latham
On Tue, Mar 4, 2014 at 5:46 AM, fmm vo...@fakmoymozg.ru wrote: On Tue, 04 Mar 2014 09:00:18 +0100, Jay Ashworth j...@baylink.com wrote: http://arstechnica.com/security/2014/03/hackers-hijack-30-plus-wireless-routers-make-malicious-changes/ Is there any valid reason not to black hole

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Davide Davini
Andrew Latham wrote: On Tue, Mar 4, 2014 at 5:46 AM, fmm vo...@fakmoymozg.ru wrote: On Tue, 04 Mar 2014 09:00:18 +0100, Jay Ashworth j...@baylink.com wrote: http://arstechnica.com/security/2014/03/hackers-hijack-30-plus-wireless-routers-make-malicious-changes/ Is there any valid reason

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread jim deleskie
Why want to swing such a big hammer. Even blocking those 2 IP's will isolate your users, and fill your support queue's. Set up a DNS server locally to reply to those IP's Your customers stay up and running and blissfully unaware. Log the IP's hitting your DNS servers on those IP and have your

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Andrew Latham
On Tue, Mar 4, 2014 at 7:27 AM, Davide Davini diotona...@gmail.com wrote: Andrew Latham wrote: On Tue, Mar 4, 2014 at 5:46 AM, fmm vo...@fakmoymozg.ru wrote: On Tue, 04 Mar 2014 09:00:18 +0100, Jay Ashworth j...@baylink.com wrote:

Re: ISP inbound failover without BGP

2014-03-04 Thread Sebastian Spies
Am 04.03.2014 05:19, schrieb William Herrin: Reasons why dynamic DNS fails to perform as expected include: * Web browser DNS pinning can result in a customer's web browser holding the old IP address indefinitely. * Host-level caching of looked up names which discards the TTL. Remember:

Re: ISP inbound failover without BGP

2014-03-04 Thread Vlade Ristevski
I've been doing the suggestion below for many years using the IP addresses that Cogent gives us. All I needed to do is get LOA from them and submit it to my backup ISP. I've never had an issue with my Cogent IP's *not* being advertised by my other ISP and I really don't think there is very

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Valdis . Kletnieks
On Tue, 04 Mar 2014 09:28:01 -0400, jim deleskie said: Why want to swing such a big hammer. Even blocking those 2 IP's will isolate your users, and fill your support queue's. Set up a DNS server locally to reply to those IP's Your customers stay up and running and blissfully unaware. Log

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Jay Ashworth
- Original Message - From: Andrew Latham lath...@gmail.com you wanted to say blackhole those 5.45.72.0/22 and 5.45.76.0/22, Jay is right, it is just the /32s at the moment... Dropping the /22s could cause other sites to be blocked. inetnum: 5.45.72.0 - 5.45.75.255 netname:

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Jay Ashworth
- Original Message - From: jim deleskie deles...@gmail.com Why swing such a big hammer. Even blocking those 2 IP's will isolate your users, and fill your support queue's. Set up a DNS server locally to reply to those IP's Your customers stay up and running and blissfully unaware.

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Octavio Alvarez
On 03/04/2014 05:28 AM, jim deleskie wrote: Why want to swing such a big hammer. Even blocking those 2 IP's will isolate your users, and fill your support queue's. When the malicious DNS services get shutdown you will still have your support queue's filled, anyway. Doing it now will let you

RE: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Ian McDonald
Until the average user's cpe is only permitted to use the resolvers one has provided as the provider (or otherwise decided are OK), this is going to be a game of whackamole. So long as there's an 'I have a clue' opt out, it appears to be the way forward to resolve this issue. Shutting down one

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Jimmy Hess
On Tue, Mar 4, 2014 at 12:33 PM, Ian McDonald i...@st-andrews.ac.uk wrote: Until the average user's cpe is only permitted to use the resolvers one has provided as the provider (or otherwise decided are OK), this is going to be a game of whackamole. No. That is still just treating symptoms,

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Merike Kaeo
On Mar 4, 2014, at 6:54 AM, valdis.kletni...@vt.edu wrote: On Tue, 04 Mar 2014 09:28:01 -0400, jim deleskie said: Why want to swing such a big hammer. Even blocking those 2 IP's will isolate your users, and fill your support queue's. Set up a DNS server locally to reply to those IP's

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Warren Bailey
I don¹t know that they have a lot of motivation to support ³legacy² access points. The home brew guys tend to magically ³find² ways to install software on these POS CPE AP/Router combos, which I don¹t think is a coincidence. The linksys types of the world want to sell more routers, not make

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Niels Bakker
On 3/4/14, 11:52 AM, Merike Kaeo k...@merike.com wrote: CPE devices are just a huge cesspool. Any device that already doesn't let you change username 'admin' is off to a bad start. We have to get these supposedly 'plug it in and never touch it' devices to be better at firmware upgrades. *

Re: Hackers hijack 300, 000-plus wireless routers, make malicious changes | Ars Technica

2014-03-04 Thread Octavio Alvarez
On 04/03/14 10:33, Ian McDonald wrote: Until the average user's cpe is only permitted to use the resolvers one has provided as the provider (or otherwise decided are OK), this is going to be a game of whackamole. So long as there's an 'I have a clue' opt out, it appears to be the way forward

Any CenturyLink IPv6 engineers/tech people around?

2014-03-04 Thread Brielle Bruns
Hello all, Don't suppose there's any CenturyLink engineers/tech people on this list that can look into a problem with their IPv6 6rd service? Got multiple customers on CenturyLink (including myself), with IPv6 through their 6rd service since native isn't available yet. IPv6 assignments

Fwd: [ PRIVACY Forum ] Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping

2014-03-04 Thread Jay Ashworth
Oh hell. Is this the *same* bug that just broke in Apple code last week? Cheers, -- jra - Forwarded Message - From: PRIVACY Forum mailing list priv...@vortex.com To: privacy-l...@vortex.com Sent: Tuesday, March 4, 2014 3:17:43 PM Subject: [ PRIVACY Forum ] Critical crypto bug leaves

DNS Resolving issues. So for related just to Cox. But could be larger.

2014-03-04 Thread Mark Keymer
Hi Everyone, So I have a client who moved a domain specifically periodforgood.com to a new VPS with our company. DNS has been updated and the TTL time is 4 hours so things should all be updated but something might still be wrong. Looking for help / confirmation that things look good. And

ATT uverse ipv6 engineer

2014-03-04 Thread Andrew D Kirch
Would an ATT engineer who deals with uverse IPv6 please contact me off list? I'm getting horrible throughput on your 6RD. Thanks! Andrew

Re: DNS Resolving issues. So for related just to Cox. But could be larger.

2014-03-04 Thread Paul S.
For all it's worth, it might be Cox ignoring TTLs and enforcing their own update times instead. Wait 24-48 hours, and it should probably fix it all up. I'm not seeing anything majorly broken with your system except the SOA EXPIRE being ridiculously large. On 3/5/2014 午後 01:40, Mark Keymer

Re: Fwd: [ PRIVACY Forum ] Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping

2014-03-04 Thread Matt Palmer
On Tue, Mar 04, 2014 at 10:07:56PM -0500, Jay Ashworth wrote: Oh hell. Is this the *same* bug that just broke in Apple code last week? I'd be surprised if Apple used GnuTLS, on licencing grounds... widely used cryptographic code library. The bug in the GnuTLS library On the other hand,