tomsk
Very Senior Member
It was -10C here today, too cold to wear t-shirts.
It was -10C here today, too cold to wear t-shirts.
Agree, baidu is not a good website, for some reason, my Chinese IP camera was connecting to baidu.com thousands of times a month, I'm considering to throw that thing away. But for now, I have baidu in blacklist. I should also put hao123.com too. I'm curious why you put kapook.com to blacklist? Are there many things for entertainments there? Is it dangerous or just annoying? Btw, I live in the same province as you.
I also doubt that RMerlin will be the cause of this. I also think that if I am running AsusWRT stock firmware, I wouldn't care whatsoever is in the changelog, or care if SSH setting has been changed, or even care opening WebUI.
I think it's a brute force attack...
Thanks. Will leave the hacked box now and update.380.64_1 was uploaded to Mediafire, and published on the update server. I backported Asus's security fixes from 4180 (now that I was able to fix the webui pages those fixes were breaking), as well as the additional fixes I mentioned previously in this thread. Note that I have no idea if all of these fixes will address the security issues reported here, since I have no information as to which security hole was exploited here.
Use the Check button on the FW update page to be taken directly to the download location.
Understandably, there's so much gone on in this thread that you've forgotten the answer!And to be sure we should restore to factory settings + format JFFS partition and then make the update ?
Kapok blacklist now makes sense to me. Baidu troubled me badly, its apps are, most of the time, not malware, but PUP, which can avoid detection by most antivirus. So now I have both McAfee(use it as it costs less than $20 a year for unlimited devices, and not too bad detection rate) and Malwarebytes to help when users do not know how to uncheck for extra apps when installing software. I haven't seen other Thai yet except you. At least this vulnerability allow me to know someone in Thailand is also running Merlin firmware, I tried to spread my experience, but many people don't have supported firmware as AC68U is too expensive here, and AC56U is not imported to Thailand.Hi @Wutikorn
The reason kapok.com is on the blacklist is the sites I support are a children's home for 30 orphans along with a grade school. It is the leadership team who asked me to blacklist it. I guess the kids were spending a lot of time on the site. They deemed the content not appropriate for them. Maybe it is because some of the girly pictures on the site show too much cleavage? 555
Regarding Baidu, even though it has been blacklisted for awhile now, it ranks as the top site being blacklisted on the OpenDNS stats page at the school. This tells me there may be malware on the clients that keep trying to talk to baidu. I have seen the teachers download freeware from the site. I cleaned up the school workstations but can't do anything about their personal clients. I am researching installing the Netflow plug-in from entware called "ipcad" to pull data. Then using something like Solarwinds Free Netflow Traffic Analyzer to see the offending clients, then work with them to remove any malicious software.
Glad to know you are in the same province. I see others in the forum from Land of Smiles as well. Maybe we need to have a snbforums gathering sometime soon?
I think it should be in the system log as well. However, that is different case than what we faced. What that case was showing is that the attacker was trying to use known default user/pass sets to login to the router, but that won't get him/her into my router as I don't use default username or password.how can I get these log in logs for HTTP/HTTPs? I can only see telnet and SSH on system log page.
And to be sure we should restore to factory settings + format JFFS partition and then make the update ?
This hack did get non-default login/passwords right, it seems. So that would also grant access to the UI of the router. But apparently that was not the intention of the hack.I think it should be in the system log as well. However, that is different case than what we faced. What that case was showing is that the attacker was trying to use known default user/pass sets to login to the router, but that won't get him/her into my router as I don't use default username or password.
As I previously stated, what @bmi saw is not the same attack we are discussing here.how can I get these log in logs for HTTP/HTTPs? I can only see telnet and SSH on system log page.
No need. By default the router drops all unsolicited incoming packets..Is something like this recommended if we have all external connections turned off? Does the built in firewall take care of this?
DNS Rebinding security flaw by now.
It's not the advanced system page... that's the target that they're aiming for, but to get there - they have to smash the webserver... (or find another way in...)
Do I get a t-shirt for this?
Related to this perhaps?
https://w00tsec.blogspot.nl/2014/07/hacking-asus-rt-ac66u-and-preparing-for.html
Quite a recent verdict: https://www.ftc.gov/news-events/pre...rges-insecure-home-routers-cloud-services-putGood post. One can learn a lot
Try the AiCloud for a change. An even bigger door.I took a look at RMerlin's current git repo - some good changes there that could help...
What I can say is that the http server itself is pretty brittle - I was able to break into an older non-RT-AC68 series one time - it was a one off, but during that session I was able to spelunk around inside the other nodes that were attached.
I've said this a couple of times earlier - and others have as well - do not expose the WebGUI to the WAN, folks are looking at it for other potential issues, but it's a big chunk of code that does a lot of different things, and it does it, by nature of configuring the device, with elevated privileges...
@RMerlin - saw your checkin here... I think this is a good change... but that's assuming 63 chari in ISO-Latin or UTF-8
Normally hostname is limited to 64 bytes for posix, the FQDN can be longer at 255 bytes - so dnsmasq should be able to handle it, but there's other items that might not...
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!