I am also a big fan of installing cake (sqm-scripts) in front cable devices.
On Thu, Feb 9, 2023 at 5:59 AM Todd Stiers <todd.sti...@gmail.com> wrote: > > [OP here] > > Just some minor follow up: > > - The tech was able to swap out their RG with the modem-only one that I had > sent (after making a couple phone calls). It didn't seem like they could > provision a user-supplied modem remotely for some reason, but it also sounded > like maybe this wasn't something they normally do, if ever. > > - The outgoing RG was an Evolution Digital EVO3000GW. The screenshots that > dropped were meant to show me attempting an admin password change, and it not > letting me. > > - AFAIK, no WAN ports were open, but UPnP was on by default. I neglected to > do a port scan on the WAN port before the equipment swap, but that probably > would've been prudent. > > - Sorry for not being clear about this before, but I'm fairly remote (~5 > hour drive), so my mom was acting as remote [somewhat arthritic] hands in all > this. > > - Since I'm remote, I had previously sent a raspberry pi that is running > both pi-hole (to mitigate the possibility of her or her partner clicking on a > malicious ad or pop-up that may compel them to inadvertently connect with a > call center scammer again) and ZeroTier. I use ZT to log in to this device, > which double NAT breaks, which is why I brought that up. Totally > understandable that most average customers don't use this, and a double-NAT > situation is probably fine for my mom's demographic. That said, to be sure, > the much bigger issue is that they're provisioning CPE with an unchangeable > "password." > > - I understand that this forum may not be quite the right fit for a post > like this, and am looking for others that may be more appropriate. My hope is > that this eventually gets to someone at Yondoo, or parent Mid-Atlantic > Broadband (AS29914), since something like this probably falls outside of the > wheelhouse of their tier 1 support, which was all we could get a hold of. > > Thanks to everyone who's responded -- I value all of your input. > > Cheers, > Todd > > On Wed, Feb 8, 2023 at 5:09 PM Jason R. Rokeach via NANOG <nanog@nanog.org> > wrote: >> >> It’s been a while, but attacks that take advantage of this are (or at least >> in the past have been) real. >> >> https://blog.sucuri.net/2014/09/website-security-compromised-website-used-to-hack-home-routers.html >> >> https://www.digitaltrends.com/web/javascript-malware-mobile/ >> >> I recall when this stuff first started to come out, leaning on RG vendors to >> fix their firmware to make their default passwords unpredictable based on >> information readily available on the LAN. >> In this case we’re not even talking about taking action this sophisticated… >> It seems to me that, having a customer willing and ready to secure >> themselves, preventing them from doing so is wildly inappropriate. >> >> >> On Wed, Feb 8, 2023 at 7:57 PM, Eric Kuhnke <eric.kuh...@gmail.com> wrote: >> >> I agree, but if we start listing every massive security vulnerability that >> can be found on the intra-home LAN in consumer-grade routers and home >> electronics equipment, or things that people operate in their homes with the >> factory-default passwords, we'd be here all month in a thread with 300 >> emails. >> >> I'm sure this ISP will realize what a silly thing they did if and when some >> sort of worm or trojan tries a set of default logins/passwords on whatever >> is the default gateway of the infected PC, and does something like rewrite >> the IPs entered for DNS servers to send peoples' web browsing to advertising >> for porn/casinos/scams, male anatomy enlargement services or something. >> >> >> >> On Wed, Feb 8, 2023 at 3:28 PM William Herrin <b...@herrin.us> wrote: >>> >>> On Wed, Feb 8, 2023 at 2:36 PM Eric Kuhnke <eric.kuh...@gmail.com> wrote: >>> > I would hope that this router's admin "password" interface is only >>> > accessible from the LAN side. >>> > This is bad, yes, but not utterly catastrophic. >>> >>> It means that any compromised device on the LAN can access the router >>> with whatever permissions the password grants. While there are >>> certainly worse security vulnerabilities, I'm reluctant to describe >>> this one as less than catastrophic. Where there's one grossly ignorant >>> security vulnerability there are usually hundreds. >>> >>> Regards, >>> Bill Herrin >>> >>> >>> -- >>> For hire. https://bill.herrin.us/resume/ -- This song goes out to all the folk that thought Stadia would work: https://www.linkedin.com/posts/dtaht_the-mushroom-song-activity-6981366665607352320-FXtz Dave Täht CEO, TekLibre, LLC