The odd thing is, he says port 80 and 22 are blocked at his routers. The
only time I've seen UBNT radios get infected was when I accidentally left
port 80 open on an IP block.

On Wed, May 4, 2016 at 9:00 PM, Josh Luthman <j...@imaginenetworksllc.com>
wrote:

> Public IP on Ubnt.  What else do you need to know?
>
> Josh Luthman
> Office: 937-552-2340
> Direct: 937-552-2343
> 1100 Wayne St
> Suite 1337
> Troy, OH 45373
> On May 4, 2016 9:59 PM, "Eric Kuhnke" <eric.kuh...@gmail.com> wrote:
>
>> The thread got this far and noone has wondered how the CPE was pwned in
>> the first place?
>>
>> On Wed, May 4, 2016 at 6:55 PM, Mathew Howard <mhoward...@gmail.com>
>> wrote:
>>
>>> Yeah, I looked at setting it up that way at one point, but something
>>> didn't look like it was going to work quite the way I wanted it to... but I
>>> probably spent all of five minutes on it, so it may very well be possible.
>>> The way ePMP does it is really nice though... and simple.
>>>
>>> On Wed, May 4, 2016 at 8:38 PM, Josh Luthman <
>>> j...@imaginenetworksllc.com> wrote:
>>>
>>>> People do it for sure.  I want to say there was an example on the
>>>> forums or some where...
>>>>
>>>> Josh Luthman
>>>> Office: 937-552-2340
>>>> Direct: 937-552-2343
>>>> 1100 Wayne St
>>>> Suite 1337
>>>> Troy, OH 45373
>>>> On May 4, 2016 9:35 PM, "Mathew Howard" <mhoward...@gmail.com> wrote:
>>>>
>>>>> I have our ePMP's setup to get their public IP via PPPoE, and the
>>>>> radio also gets a completely separate private management IP via DHCP, 
>>>>> which
>>>>> is the only way you can remotely access the radio, and it doesn't even 
>>>>> have
>>>>> to be in a separate vlan unless you want it to be... and it's one checkbox
>>>>> to configure it.
>>>>>
>>>>> I'm not sure if that can be duplicated on UBNT or not, since I haven't
>>>>> really tried yet, but at the very least it's a lot more complicated to
>>>>> configure.
>>>>>
>>>>>
>>>>>
>>>>> On Wed, May 4, 2016 at 7:04 PM, Josh Luthman <
>>>>> j...@imaginenetworksllc.com> wrote:
>>>>>
>>>>>> It does...you just need to set it up that way.
>>>>>>
>>>>>>
>>>>>> Josh Luthman
>>>>>> Office: 937-552-2340
>>>>>> Direct: 937-552-2343
>>>>>> 1100 Wayne St
>>>>>> Suite 1337
>>>>>> Troy, OH 45373
>>>>>>
>>>>>> On Wed, May 4, 2016 at 7:54 PM, Mathew Howard <mhoward...@gmail.com>
>>>>>> wrote:
>>>>>>
>>>>>>> I really wish Ubiquiti radios had a separate management vlan option
>>>>>>> (in router mode), like ePMP does...
>>>>>>>
>>>>>>> On Wed, May 4, 2016 at 6:10 PM, Josh Reynolds <j...@kyneticwifi.com>
>>>>>>> wrote:
>>>>>>>
>>>>>>>> I would encourage you to put your CPEs on a management vlan, in
>>>>>>>> RFC1918 space.
>>>>>>>>
>>>>>>>> On Wed, May 4, 2016 at 6:00 PM, SmarterBroadband
>>>>>>>> <li...@smarterbroadband.com> wrote:
>>>>>>>> > Hi Tushar
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > We run all radios in NAT mode.
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > Adam
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > From: Af [mailto:af-boun...@afmug.com] On Behalf Of Tushar Patel
>>>>>>>> > Sent: Wednesday, May 04, 2016 3:34 PM
>>>>>>>> > To: af@afmug.com
>>>>>>>> > Subject: Re: [AFMUG] UBNT CPE being used for Abusive actions?
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > Radios could be put on private ip so nobody from outside world
>>>>>>>> can access
>>>>>>>> > it. That is what we do.
>>>>>>>> >
>>>>>>>> > Tushar
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > On May 4, 2016, at 5:22 PM, SmarterBroadband <
>>>>>>>> li...@smarterbroadband.com>
>>>>>>>> > wrote:
>>>>>>>> >
>>>>>>>> > I have received a number of emails for ab...@light-gap.net
>>>>>>>> saying certain of
>>>>>>>> > our IP address are being used for attacks (see email text below).
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > All IP addresses are in UBNT radios.  We are unable to remote
>>>>>>>> access any of
>>>>>>>> > the these radios now.  We see that the radio we are unable to
>>>>>>>> access
>>>>>>>> > rebooted a couple of days ago.  A number of other radios show
>>>>>>>> they rebooted
>>>>>>>> > around the same time (in sequence) on the AP.  We are unable to
>>>>>>>> remote
>>>>>>>> > access any of those either. Other radios with longer uptime on
>>>>>>>> the AP’s are
>>>>>>>> > fine.
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > We have a tech on route to one of the customer sites.
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > We think the radios are being made into bots.  Anyone seen this
>>>>>>>> or anything
>>>>>>>> > like this?  Do the hackers need a username and password to hack a
>>>>>>>> radio?
>>>>>>>> > I.E.  Would a change of the password stop the changes being made
>>>>>>>> to the
>>>>>>>> > radios?  Any other thoughts, suggestions or ideas?
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > Thanks
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > Adam
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > Email Text below:
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > “This is a semi-automated e-mail from the LG-Mailproxy
>>>>>>>> authentication
>>>>>>>> > system, all requests have been approved manually by the
>>>>>>>> > system-administrators or are obviously unwanted (eg. requests to
>>>>>>>> our
>>>>>>>> > spamtraps).
>>>>>>>> >
>>>>>>>> > For further questions or if additional information is needed
>>>>>>>> please reply to
>>>>>>>> > this email.
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > The IP xxx.xxx.xxx.xxx has been banned for 48 hours due to
>>>>>>>> suspicious
>>>>>>>> > behaviour on our system.
>>>>>>>> >
>>>>>>>> > This happened already 1 times.
>>>>>>>> >
>>>>>>>> > It might be be part of a botnet, infected by a trojan/virus or
>>>>>>>> running
>>>>>>>> > brute-force attacks.
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > Our affected destination servers: smtp.light-gap.net,
>>>>>>>> imap.light-gap.net
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > Currently 7 failed/unauthorized logins attempts via SMTP/IMAP
>>>>>>>> with 6
>>>>>>>> > different usernames and wrong password:
>>>>>>>> >
>>>>>>>> > 2016-05-04T23:48:40+02:00 with username "
>>>>>>>> downloads.openscience.or.at"
>>>>>>>> > (spamtrap account)
>>>>>>>> >
>>>>>>>> > 2016-05-04T22:47:19+02:00 with username "sp_woq" (spamtrap
>>>>>>>> account)
>>>>>>>> >
>>>>>>>> > 2016-05-04T14:55:11+02:00 with username "info" (spamtrap account)
>>>>>>>> >
>>>>>>>> > 2016-05-03T21:24:22+02:00 with username "fips" (spamtrap account)
>>>>>>>> >
>>>>>>>> > 2016-05-03T20:57:19+02:00 with username "
>>>>>>>> downloads.openscience.or.at"
>>>>>>>> > (spamtrap account)
>>>>>>>> >
>>>>>>>> > 2016-05-03T10:13:59+02:00 with username "d10hw49WpH" (spamtrap
>>>>>>>> account)
>>>>>>>> >
>>>>>>>> > 2016-05-03T05:34:43+02:00 with username "12345678" (spamtrap
>>>>>>>> account)
>>>>>>>> > Ongoing failed/unauthorized logins attempts will be logged and
>>>>>>>> sent to you
>>>>>>>> > every 24h until the IP will be permanently banned from our
>>>>>>>> systems after 72
>>>>>>>> > hours.
>>>>>>>> >
>>>>>>>> >
>>>>>>>> >
>>>>>>>> > The Light-Gap.net Abuse Team.”
>>>>>>>> >
>>>>>>>> >
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>
>>>>>
>>>
>>

Reply via email to