IMO, that customer is an idiot.

That said, he may have been an idiot but you also didn't get his monies :(

On Thu, May 5, 2016 at 2:33 PM, Ken Hohhof <af...@kwisp.com> wrote:
> I understand the issue because it was part of my learning experience when
> the company I worked for in the 80's was acquired by Rockwell International.
>
> Sales dragged me along on a sales call to try and sell some digital carrier
> product to a Bell company.  The customer said I will look at your product
> when you fix the <fill in the blank> I bought from you.  We protested that
> was from a totally unrelated division of Rockwell, like maybe the M13 mux
> people in Texas, or the Collins Radio people in Iowa, I forget.
>
> Customer pointed to the logo on our product, the logo on the lemon he had
> bought, and the logo on our business cards.  They all said Rockwell.  He
> didn't care what division we were from.  He had a problem with our company,
> and he was holding us responsible.
>
>
>
> -----Original Message----- From: Josh Reynolds
> Sent: Thursday, May 05, 2016 1:37 PM
>
> To: af@afmug.com
> Subject: Re: [AFMUG] UBNT CPE being used for Abusive actions?
>
> Wow, let's not be objective or anything.
>
> Cisco makes some shit products. They make some good ones too.
> Juniper makes some shit products. They make some good ones too.
> Crayola makes some shit products. They make some good ones too.
> GE makes some shit products. They make some good ones too.
> $vendorOfChoice makes some shit products. They make some good ones too.
>
> (continue)
>
> On Thu, May 5, 2016 at 1:26 PM, Josh Baird <joshba...@gmail.com> wrote:
>>
>> Um, well, airFiber IS a Ubiquiti product, so it's not that stupid.  They
>> may
>> run different operating systems, be designed by different teams and have
>> different feature sets, but it still says Ubiquiti on it.
>>
>> On Thu, May 5, 2016 at 11:17 AM, Chuck Macenski <ch...@macenski.com>
>> wrote:
>>>
>>>
>>> I hate it when people lump airFiber into these things. I know of no
>>> security holes in airFiber that don't require you to already be logged
>>> into
>>> the unit (where you can change the configuration until your heart's
>>> content). AirFiber also supports a very simple to configure management
>>> VLAN
>>> (I don't know how it could be simpler) to keep inband managment traffic
>>> away
>>> from the IP of the unit. If that isn't enough, you can simply disable
>>> inband
>>> management and use the out-of-band management port; no one can then
>>> access
>>> the management traffic from the user traffic flows.
>>>
>>> Good morning :)
>>>
>>> Chuck
>>>
>>> On Wed, May 4, 2016 at 11:39 PM, Mathew Howard <mhoward...@gmail.com>
>>> wrote:
>>>>
>>>>
>>>> 5.6.2, I think, fixed one of them more serious security flaws, and that
>>>> was released less than a year ago... and it looks like 5.6.3 and 5.6.4
>>>> (which was released very recently) also had security fixes. I believe
>>>> most
>>>> of those vulnerabilities applied to the AC and airFiber firmware as
>>>> well.
>>>>
>>>> Ubiquiti has been good about releasing fixes quickly when they find
>>>> vulnerabilities, but that doesn't help if nobody bothers to update
>>>> anything.
>>>>
>>>> On Wed, May 4, 2016 at 9:12 PM, Eric Kuhnke <eric.kuh...@gmail.com>
>>>> wrote:
>>>>>
>>>>>
>>>>> I know about the very old firmware version for M series stuff that is
>>>>> vulnerable to a known worm.
>>>>>
>>>>> But let's assume you do have ubnt devices with public IPs (which is a
>>>>> bad idea). What's the attack surface? http, https, ssh, snmp
>>>>>
>>>>> Provided you have chosen a reasonably complex admin login and password
>>>>> there are no current, known remote root exploits for current (or within
>>>>> the
>>>>> past 2 years) ubnt firmware on M or AC devices, right?
>>>>>
>>>>>
>>>>> On Wed, May 4, 2016 at 7:00 PM, Josh Luthman
>>>>> <j...@imaginenetworksllc.com> wrote:
>>>>>>
>>>>>>
>>>>>> Public IP on Ubnt.  What else do you need to know?
>>>>>>
>>>>>> Josh Luthman
>>>>>> Office: 937-552-2340
>>>>>> Direct: 937-552-2343
>>>>>> 1100 Wayne St
>>>>>> Suite 1337
>>>>>> Troy, OH 45373
>>>>>>
>>>>>> On May 4, 2016 9:59 PM, "Eric Kuhnke" <eric.kuh...@gmail.com> wrote:
>>>>>>>
>>>>>>>
>>>>>>> The thread got this far and noone has wondered how the CPE was pwned
>>>>>>> in the first place?
>>>>>>>
>>>>>>> On Wed, May 4, 2016 at 6:55 PM, Mathew Howard <mhoward...@gmail.com>
>>>>>>> wrote:
>>>>>>>>
>>>>>>>>
>>>>>>>> Yeah, I looked at setting it up that way at one point, but something
>>>>>>>> didn't look like it was going to work quite the way I wanted it
>>>>>>>> to... but I
>>>>>>>> probably spent all of five minutes on it, so it may very well be
>>>>>>>> possible.
>>>>>>>> The way ePMP does it is really nice though... and simple.
>>>>>>>>
>>>>>>>> On Wed, May 4, 2016 at 8:38 PM, Josh Luthman
>>>>>>>> <j...@imaginenetworksllc.com> wrote:
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> People do it for sure.  I want to say there was an example on the
>>>>>>>>> forums or some where...
>>>>>>>>>
>>>>>>>>> Josh Luthman
>>>>>>>>> Office: 937-552-2340
>>>>>>>>> Direct: 937-552-2343
>>>>>>>>> 1100 Wayne St
>>>>>>>>> Suite 1337
>>>>>>>>> Troy, OH 45373
>>>>>>>>>
>>>>>>>>> On May 4, 2016 9:35 PM, "Mathew Howard" <mhoward...@gmail.com>
>>>>>>>>> wrote:
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> I have our ePMP's setup to get their public IP via PPPoE, and the
>>>>>>>>>> radio also gets a completely separate private management IP via
>>>>>>>>>> DHCP, which
>>>>>>>>>> is the only way you can remotely access the radio, and it doesn't
>>>>>>>>>> even have
>>>>>>>>>> to be in a separate vlan unless you want it to be... and it's one
>>>>>>>>>> checkbox
>>>>>>>>>> to configure it.
>>>>>>>>>>
>>>>>>>>>> I'm not sure if that can be duplicated on UBNT or not, since I
>>>>>>>>>> haven't really tried yet, but at the very least it's a lot more
>>>>>>>>>> complicated
>>>>>>>>>> to configure.
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> On Wed, May 4, 2016 at 7:04 PM, Josh Luthman
>>>>>>>>>> <j...@imaginenetworksllc.com> wrote:
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> It does...you just need to set it up that way.
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> Josh Luthman
>>>>>>>>>>> Office: 937-552-2340
>>>>>>>>>>> Direct: 937-552-2343
>>>>>>>>>>> 1100 Wayne St
>>>>>>>>>>> Suite 1337
>>>>>>>>>>> Troy, OH 45373
>>>>>>>>>>>
>>>>>>>>>>> On Wed, May 4, 2016 at 7:54 PM, Mathew Howard
>>>>>>>>>>> <mhoward...@gmail.com> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> I really wish Ubiquiti radios had a separate management vlan
>>>>>>>>>>>> option (in router mode), like ePMP does...
>>>>>>>>>>>>
>>>>>>>>>>>> On Wed, May 4, 2016 at 6:10 PM, Josh Reynolds
>>>>>>>>>>>> <j...@kyneticwifi.com> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> I would encourage you to put your CPEs on a management vlan, in
>>>>>>>>>>>>> RFC1918 space.
>>>>>>>>>>>>>
>>>>>>>>>>>>> On Wed, May 4, 2016 at 6:00 PM, SmarterBroadband
>>>>>>>>>>>>> <li...@smarterbroadband.com> wrote:
>>>>>>>>>>>>> > Hi Tushar
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > We run all radios in NAT mode.
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > Adam
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > From: Af [mailto:af-boun...@afmug.com] On Behalf Of Tushar
>>>>>>>>>>>>> > Patel
>>>>>>>>>>>>> > Sent: Wednesday, May 04, 2016 3:34 PM
>>>>>>>>>>>>> > To: af@afmug.com
>>>>>>>>>>>>> > Subject: Re: [AFMUG] UBNT CPE being used for Abusive actions?
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > Radios could be put on private ip so nobody from outside >
>>>>>>>>>>>>> > world
>>>>>>>>>>>>> > can access
>>>>>>>>>>>>> > it. That is what we do.
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > Tushar
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > On May 4, 2016, at 5:22 PM, SmarterBroadband
>>>>>>>>>>>>> > <li...@smarterbroadband.com>
>>>>>>>>>>>>> > wrote:
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > I have received a number of emails for ab...@light-gap.net
>>>>>>>>>>>>> > saying certain of
>>>>>>>>>>>>> > our IP address are being used for attacks (see email text
>>>>>>>>>>>>> > below).
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > All IP addresses are in UBNT radios.  We are unable to remote
>>>>>>>>>>>>> > access any of
>>>>>>>>>>>>> > the these radios now.  We see that the radio we are unable to
>>>>>>>>>>>>> > access
>>>>>>>>>>>>> > rebooted a couple of days ago.  A number of other radios show
>>>>>>>>>>>>> > they rebooted
>>>>>>>>>>>>> > around the same time (in sequence) on the AP.  We are unable
>>>>>>>>>>>>> > to remote
>>>>>>>>>>>>> > access any of those either. Other radios with longer uptime >
>>>>>>>>>>>>> > on
>>>>>>>>>>>>> > the AP’s are
>>>>>>>>>>>>> > fine.
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > We have a tech on route to one of the customer sites.
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > We think the radios are being made into bots.  Anyone seen
>>>>>>>>>>>>> > this or anything
>>>>>>>>>>>>> > like this?  Do the hackers need a username and password to
>>>>>>>>>>>>> > hack a radio?
>>>>>>>>>>>>> > I.E.  Would a change of the password stop the changes being
>>>>>>>>>>>>> > made to the
>>>>>>>>>>>>> > radios?  Any other thoughts, suggestions or ideas?
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > Thanks
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > Adam
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > Email Text below:
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > “This is a semi-automated e-mail from the LG-Mailproxy
>>>>>>>>>>>>> > authentication
>>>>>>>>>>>>> > system, all requests have been approved manually by the
>>>>>>>>>>>>> > system-administrators or are obviously unwanted (eg. requests
>>>>>>>>>>>>> > to our
>>>>>>>>>>>>> > spamtraps).
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > For further questions or if additional information is needed
>>>>>>>>>>>>> > please reply to
>>>>>>>>>>>>> > this email.
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > The IP xxx.xxx.xxx.xxx has been banned for 48 hours due to
>>>>>>>>>>>>> > suspicious
>>>>>>>>>>>>> > behaviour on our system.
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > This happened already 1 times.
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > It might be be part of a botnet, infected by a trojan/virus >
>>>>>>>>>>>>> > or
>>>>>>>>>>>>> > running
>>>>>>>>>>>>> > brute-force attacks.
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > Our affected destination servers: smtp.light-gap.net,
>>>>>>>>>>>>> > imap.light-gap.net
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > Currently 7 failed/unauthorized logins attempts via SMTP/IMAP
>>>>>>>>>>>>> > with 6
>>>>>>>>>>>>> > different usernames and wrong password:
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > 2016-05-04T23:48:40+02:00 with username
>>>>>>>>>>>>> > "downloads.openscience.or.at"
>>>>>>>>>>>>> > (spamtrap account)
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > 2016-05-04T22:47:19+02:00 with username "sp_woq" (spamtrap
>>>>>>>>>>>>> > account)
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > 2016-05-04T14:55:11+02:00 with username "info" (spamtrap
>>>>>>>>>>>>> > account)
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > 2016-05-03T21:24:22+02:00 with username "fips" (spamtrap
>>>>>>>>>>>>> > account)
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > 2016-05-03T20:57:19+02:00 with username
>>>>>>>>>>>>> > "downloads.openscience.or.at"
>>>>>>>>>>>>> > (spamtrap account)
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > 2016-05-03T10:13:59+02:00 with username "d10hw49WpH" >
>>>>>>>>>>>>> > (spamtrap
>>>>>>>>>>>>> > account)
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > 2016-05-03T05:34:43+02:00 with username "12345678" (spamtrap
>>>>>>>>>>>>> > account)
>>>>>>>>>>>>> > Ongoing failed/unauthorized logins attempts will be logged >
>>>>>>>>>>>>> > and
>>>>>>>>>>>>> > sent to you
>>>>>>>>>>>>> > every 24h until the IP will be permanently banned from our
>>>>>>>>>>>>> > systems after 72
>>>>>>>>>>>>> > hours.
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > The Light-Gap.net Abuse Team.”
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>
>>>>
>>>
>>
>
>

Reply via email to