Dear Anne,
On Wed, Apr 24, 2019 at 11:07:51PM -0600, Anne P. Mitchell, Esq. wrote:
> How can this not be a violation of the ToS of just about every major
> provider?
Can you perhaps cite ToS excerpts from one or more major providers to
support your assertion?
> Anne P. Mitchell,
> Attorney at
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 4/24/2019 10:07 PM, Anne P. Mitchell, Esq. wrote:
> Just ran into packetstream.io:
>
> "Sell Your Unused Bandwidth
>
> Earn passive income while you sleep
>
What could possibly go wrong? :-)
- - ferg
- --
Paul Ferguson
Principal, Threat I
Just ran into packetstream.io:
"Sell Your Unused Bandwidth
Earn passive income while you sleep
PacketStream is the first of its kind peer-to-peer proxy network. Packeters are
compensated for sharing bandwidth on the PacketStream network and allowing
users all over the world have access to cont
On Wed, Apr 24, 2019 at 8:33 PM Mike Bolitho wrote:
> "than the relatively low risk of a database compromise leading to a
>> miscreant getting ahold of their wireless password and using their access
>> point as free wifi."
>>
>
> And this is the thing, not only does someone have to 'hack' the dat
>
> "than the relatively low risk of a database compromise leading to a
> miscreant getting ahold of their wireless password and using their access
> point as free wifi."
>
And this is the thing, not only does someone have to 'hack' the database,
they also need to drive up to your house and sit in
On Wed, 24 Apr 2019 17:04:22 -0700, William Herrin said:
> I take no position on what risk the comcast wifi passwords issue carries.
> I'm posting only to point out that an absolutist model which says, "stuff
> of type X must always be encrypted," is probably not well tuned to the
> customer's act
On Wed, Apr 24, 2019 at 9:10 AM Benjamin Sisco
wrote:
> There’s ZERO reason to store or transmit any credentials (login,
service, keys, etc.),
> in any location, in an unencrypted fashion regardless of their perceived
value or
> purpose. Unless you like risk.
Risk is threat times vulnerabilit
On 25/04/2019 3:13 AM, Benjamin Sisco wrote:
I think we all understand the value of using one’s own equipment and keeping
the firmware up to date if one is in any way concerned about security. We all
should also understand that in a managed environment such as an ISP there
should be no reas
On Wed, Apr 24, 2019 at 03:13:33PM +, Benjamin Sisco wrote:
> The bigger concern should be the cleartext portion of the subject.
Yes, and the availability of all this to anyone who hacks Comcast
customer support.
---rsk
But maybe 6.2 or 6.3 would be cool, too ;)
On 24 Apr 2019, at 23:00, Jörg Kost wrote:
Hi,
you need to upgrade to a more recent version, at least 5.8.00f.
(config-tnif-99)#vrf forwarding myself
Error - Please configure tunnel source before configuring tunnel vrf
But maybe
J.
On 24 Apr 2019
Hi,
you need to upgrade to a more recent version, at least 5.8.00f.
(config-tnif-99)#vrf forwarding myself
Error - Please configure tunnel source before configuring tunnel vrf
But maybe
J.
On 24 Apr 2019, at 22:36, Fawcett, Nick via NANOG wrote:
I have an MLX8e on ver 5.6.0. I am trying to
I have an MLX8e on ver 5.6.0. I am trying to establish a GRE tunnel, but I'm
having an issue because the source is not in the default VRF. Any Brocade
gurus out there?
(config-tnif-10)#tunnel source ve 410
Error - Tunnel source interface v410 is not part of default-vrf
If I try using the IP I
On 4/24/19 8:13 AM, Benjamin Sisco wrote:
The bigger concern should be the cleartext portion of the subject. There’s
ZERO reason to store or transmit any credentials (login, service, keys, etc.),
in any location, in an unencrypted fashion regardless of their perceived value
or purpose. Unles
On Wed, Apr 24, 2019 at 9:05 AM Brandon Jackson via NANOG
wrote:
> I'm not saying they are doing anything nefarious or packet capping the
> local network or anything of that nature that is a little on the tin foil
> hat side for me personally, but you should always consider that any
> information
I think we all understand the value of using one’s own equipment and keeping
the firmware up to date if one is in any way concerned about security. We all
should also understand that in a managed environment such as an ISP there
should be no reasonable expectation of privacy regarding the confi
On 4/23/19 8:35 PM, Peter Beckman wrote:
Get your own router if you're worried about your Wifi Password being
known
by Comcast. Or change to WPA2 Enterprise, but I'm guessing that isn't
supported on the router...
Original post seems to be someone that bought a used modem/router
combo. Since
This has been a thing for quite a while with Comcast. It is also available
to a customer service rep. It is retrieved from the Gateway via SNMP if I'm
not mistaken. Customer service reps can also reset your wireless
password either to a default or a specific one of yours or their choosing
if necess
On 4/24/19 7:24 AM, Tom Beecher wrote:
> This is why, in my opinion, people should avoid modem/router combo units
> whenever possible. Any information/configuration entered into such a device
> could be accessible to the MSO (intentionally or otherwise) , as is
> happening here. I'm sure they would
> you've seen TR-069 right?
that was 2004, security had not been invented yet. oh wait.
The Stackexchange post does NOT say that they got their own AP. It says
they got their own DOCSIS Modem / Router / Wifi combo device. That's an
important distinction.
When I worked at Adelphia many years ago, the only distinction between
customer owned CPE and company owned CPE was billing. All mo
On 4/18/19 2:36 PM, Anne P. Mitchell, Esq. wrote:
> I not only got it, my best friend in junior high's father was president of
> SDS.
I know one of the authors of the Port Huron Statement. The original Port Huron
Statement, not the compromised second draft.
--
Bryan Fields
727-409-1194 - Voice
On Wed, Apr 24, 2019 at 3:27 PM Matt Hoppes
wrote:
> If you’re really running something that requires that kind
> of security you may want to get your own wireless access point.
Like I said: the OP claims that's what s/he did.
--
Töma
Matt,
I believe the thought process is that if I'm not renting the device from the
MSO, why would they log said info. As Scott said, there can be many reasons as
to why they would grab it and add to the users account.
Same as making sure modems, whether that's MSO owned or customer owned are on
I don’t really see the issue here. What was the concern of the O. P. ?
That a Comcast tech will know your Wifi password? If you’re really running
something that requires that kind of security you may want to get your own
wireless access point.
Otherwise, that’s just how it works for a multitu
While it's correct that it's stored in the vendor proprietary MIB this
information is commonly retrieved from the CableLabs standard MIB and via
TR-181 in DSL and FTTH gear.
I wrote up an answer on the security forum originally refereneced, but for
convenience here is the same text.
The PSK pass
Hello,
I've an interessting problem I've never saw before.
We have two Routers (19xx and 4451) with the same configuration design:
Dialer 1 and 1 LAN Interface in global table with default route over the LAN
Dialer 2 and 1 LAN Interface in vrf internet, default via dialer 2 towards the
core.
The
26 matches
Mail list logo