From: Maciej Soltysiak <maciej@soltysiak.com>
To: Sebastian Moeller <moeller0@gmx.de>
Cc: cerowrt-devel@lists.bufferbloat.net
Subject: Re: [Cerowrt-devel] Fixing simple_qos.sh
Date: Wed, 30 Jan 2013 13:20:53 +0100 [thread overview]
Message-ID: <CAMZR1YDHVWrqn6gi8kCKF_U1f3f7uH9D=Hvp-563_isuP-cuxQ@mail.gmail.com> (raw)
In-Reply-To: <ACFC2E66-06A0-4E1F-A5DF-9E52C87FAE8F@gmx.de>
[-- Attachment #1: Type: text/plain, Size: 2342 bytes --]
On Tue, Jan 29, 2013 at 10:21 PM, Sebastian Moeller <moeller0@gmx.de> wrote:
> Any idea of how to determine link speed by a script?
I assumed Dave meant this to be as simple as fetching a file and
timing that. Basically a quite script form of http://speedtest.net/
> As I intend to disable upnp it would be great if the link speeds still be
> stored somewhere and/or manually overridden. I want a firewall since I do
> not trust a number of devices too much, like an iPod and a nexus7 and want
> to keep them under supervision, so allowing them to pierce the firewall
> makes me feel a bit uneasy. Then again, Skype and friends figured out how
> to do NAT traversal without upnp so disabling it will only buy me a little
> more control with a lot more hassle. Any expert on the security tradeoff
> involved with UPNP willing to give their opinion on this question.
Well, UPNP or not, with a 3rd party server outside your network and proper
client/server code Skype and friends can do hole punching.
If you don't trust ipad and nexus, you're on privacy territory, not network
security per se, so I think you're better off proxying and filtering (e.g.
privoxy), than only disabling upnp.
> In related news:
> https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play
> So maybe my uneasyness has some grounding in reality, Mind you, I have not
> yet tested whether cerowrt is affected (and I doubt that, since the linked
> exploit requires old ). Related question should cero's firewall drop tcp
> port 5000 and udp port 1900 connection requests on the wan interface to put
> in belt and suspenders for UPNP remote exploits? But how does the interact
> with using cerowrt as secondary router? (Being away from the router I can
> not easily check/change the firewall settings…)
Yeah, this old thing. One thing is cerowrt firewall ruleset is a default
ACCEPT with exceptions to block in zone_wan and that's one bad thing [tm]
and should be the other way round. Where is the file that contains the
default ruleset?
I'll try to confirm if blocking it breaks anything or not today.
Perhaps running metasploit against cero from outside and inside could be
beneficial? Or at least a through nmap scan.
Maciej
[-- Attachment #2: Type: text/html, Size: 3164 bytes --]
next prev parent reply other threads:[~2013-01-30 12:20 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-01-27 12:28 Dave Taht
2013-01-29 21:21 ` Sebastian Moeller
2013-01-30 12:20 ` Maciej Soltysiak [this message]
2013-01-30 12:50 ` Török Edwin
2013-01-30 19:07 ` Sebastian Moeller
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://lists.bufferbloat.net/postorius/lists/cerowrt-devel.lists.bufferbloat.net/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='CAMZR1YDHVWrqn6gi8kCKF_U1f3f7uH9D=Hvp-563_isuP-cuxQ@mail.gmail.com' \
--to=maciej@soltysiak.com \
--cc=cerowrt-devel@lists.bufferbloat.net \
--cc=moeller0@gmx.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox