Kevin Chadwick [ma1l1i...@yahoo.co.uk] wrote:
> > > Every firewall/router product that I have purchased has been
> > > compromised so far.  
> > 
> > I don't believe this at all.  Not one bit.
> 
> I could believe it but that doesn't mean that I do. 90% of the routers
> on my street will be insecure and even using old sps, upnp or wep. 

Common, mass attacks are becoming more sophisticated every day.

All of them. The cat-and-mouse game is continually tilting against the
vast majority who only take the most basic security measures. So it's
typically a big problem when new major vulnerabilities are found in
consumer grade equipment.

Here's a simple example from the past week:

Someone just pointed out that most of the Linux UPNP routers out there
listen to UPNP port forwarding requests FROM EXTERNAL SOURCES! 

So now everyone is releasing patches, and that's only IF the code on
the router is still even maintained. And this new (and pretty fucking
obvious) hole was just pointed out to the general public.

To see that router vendors are mass producing junk that listens to
a UPNP port forwarding request from the fucking INTERNET shows that
anyone who doubts the security of their XYZ router is probably on
to something.

Yeah, you can parade the idea that "you should have disabled UPNP",
and that is a smart choice. But very few UPNP routers will come with
UPNP disabled. And the UPNP insecurity that is well known is at least
supposed to have a basis in an already-compromised INSIDE host,
not take port forwarding requests from the INTERNET.

So if vast numbers of routers are listening to admin commands from
0.0.0.0/0, and you don't believe "at all" that "every router"
this apparent troll has bought has been compromised, then you need
to think more creatively. And this guy needs to disable UPnP, and
maybe change his router admin password while he's at it. (And
reflash the firmware, and reformat his computer, re-flash
his DVD ROM, GPU, and so on.)

Reply via email to