DD-WRT Vulnerabilities? New Botnet attack....

Post new topic   Reply to topic    DD-WRT Forum Forum Index -> General Questions
Author Message
Iceman_B
DD-WRT Novice


Joined: 17 Jan 2007
Posts: 19

PostPosted: Tue Mar 24, 2009 1:36    Post subject: DD-WRT Vulnerabilities? New Botnet attack.... Reply with quote
http://dronebl.org/blog/8

I'm not too big on security and it's 02:35 in the morning here.
Can anyone distill when your router is vulnerable to an attack and when it's not?

Does this requires a patch in the FW somehow?
Sponsor
butter14
DD-WRT Novice


Joined: 13 Jul 2008
Posts: 13

PostPosted: Tue Mar 24, 2009 2:06    Post subject: Reply with quote
Yes, I think the ddwrt firmware is vulnerable. In fact, I am fairly certain that my router has been infected. I have been locked out of my gui access. Not sure how to fix the problem or if a possible workaround exists. If anybody has any information about this please post.
drmartin
DD-WRT Novice


Joined: 24 Mar 2009
Posts: 1

PostPosted: Tue Mar 24, 2009 3:22    Post subject: Reply with quote
I am also having problems accessing my router thru the gui. I was able to access my router using telnet. Once I was in telnet as was able to change the gui password.

nvram set http_passwd = "admin"
*pressed enter*
nvram commit
*pressed enter*

The password doesn't have to be "admin".

Immediately after I did that I was able to access my router thru the gui, however after I made any changes that required a reboot of the router I was locked out again.
butter14
DD-WRT Novice


Joined: 13 Jul 2008
Posts: 13

PostPosted: Tue Mar 24, 2009 4:39    Post subject: Reply with quote
drmartin wrote:
I am also having problems accessing my router thru the gui. I was able to access my router using telnet. Once I was in telnet as was able to change the gui password.

nvram set http_passwd = "admin"
*pressed enter*
nvram commit
*pressed enter*

The password doesn't have to be "admin".

Immediately after I did that I was able to access my router thru the gui, however after I made any changes that required a reboot of the router I was locked out again.


I have some further information. Your router is vulnerable if you allow remote management on your box. Also, if you are able to telnet into the box you also are not infected. Also, if remote management is turned on make sure you have a good password, seems like the worm tries to brute force for access. check here for more details check the comments, they are helpful:
http://it.slashdot.org/article.pl?sid=09/03/23/2257252&from=rss
RobbieCrash
DD-WRT Novice


Joined: 28 Aug 2008
Posts: 33

PostPosted: Tue Mar 24, 2009 7:32    Post subject: Reply with quote
Update3 from DroneBL:
To disinfect, simply powercycle your device and take appropriate action to lock it down, including the latest firmware updates, and using a secure password.

Couldn't hurt to do a 30/30/30 and reconfig either.

If you're not using a long and complex password on a router that's publicly facing the internet, you're asking for problems though.
xyverz
DD-WRT Novice


Joined: 24 Mar 2009
Posts: 1

PostPosted: Tue Mar 24, 2009 8:39    Post subject: Reply with quote
RobbieCrash wrote:
Couldn't hurt to do a 30/30/30 and reconfig either.


What's a 30/30/30?
mutz
DD-WRT Novice


Joined: 05 Oct 2008
Posts: 39

PostPosted: Tue Mar 24, 2009 12:13    Post subject: Reply with quote
This should be made an announcement to all users
interconnect
DD-WRT User


Joined: 12 Jan 2007
Posts: 85

PostPosted: Tue Mar 24, 2009 21:09    Post subject: Reply with quote
Can someone say what the correct settings would be to prevent this? Currently on my router I have..

SSHd: disabled
telnet: enabled
Web GUI Management: disabled
SSH Management: disabled (grayed out)
Sash
DD-WRT Guru


Joined: 20 Sep 2006
Posts: 17627
Location: Hesse/Germany

PostPosted: Wed Mar 25, 2009 5:58    Post subject: Reply with quote
mutz wrote:
This should be made an announcement to all users


why?

RobbieCrash wrote:
... take appropriate action to lock it down, including the latest firmware updates, and using a secure password.

Couldn't hurt to do a 30/30/30 and reconfig either.

If you're not using a long and complex password on a router that's publicly facing the internet, you're asking for problems though.


that should be the standart securitiy behaviour of a user incl shutting downof unused sevices facing the wan.
if u follow this u will have no problems

_________________
Forum Guidelines...How to get help
&
Forum Rules
&
RTFM/STFW
&
Throw some buzzwords into the WIKI search Exclamation
_________________
I'm NOT rude, just offer pure facts!
_________________
Atheros (TP-Link & Clones, etc ) debrick service in EU
_________________
Guide on HowTo be Safe, Secure and Protect Your Online Anonymity!
Stettin
DD-WRT Novice


Joined: 16 Mar 2009
Posts: 15

PostPosted: Wed Mar 25, 2009 13:12    Post subject: Reply with quote
I just talked to a friend here at work that has remote admin enabled on his box, and can confirm that something was trying to brute force his SSH password. I don't have remote admin enabled on my router yet, but he recommended the guide in the wiki for preventing brute force attacks. You might have a strong password, but the attacks can still use up resources.

http://www.dd-wrt.com/wiki/index.php/Preventing_Brute_Force_Attacks

_________________
The Science Fiction Review
Books, TV, Movies, and Games
http://www.scifi-review.net
---------------------------------
Linksys WRT54G-TM on v24-sp2 13064
soulstace
DD-WRT Guru


Joined: 04 Aug 2007
Posts: 6427

PostPosted: Wed Mar 25, 2009 13:29    Post subject: Reply with quote
If your SSH port is on default 22, chances are like 99% that there will be brute force attempts on it. I would say change the port and use public key crypto (disable password login). Brute forcing a private key is like a zillion times more difficult than brute forcing the password. So difficult that I'm sure the worm doesn't even begin to try, and moves on..
davikovs
DD-WRT Novice


Joined: 22 Jun 2009
Posts: 5

PostPosted: Mon Jun 22, 2009 16:06    Post subject: Reply with quote
I would like to say that DD-WRT isn't cause of this vulnerability - router configuration is!
I am a kind of paranoic - I have left Remote Access disabled and I have also added this line to firewall script:
Code:
iptables -I INPUT 1 -i `nvram get wan_iface` -p tcp -j DROP

to be 100% sure that noone can manage my router from outside Smile
Actually I don't see many cases when remote administration from arbitary IP adresses is needed.
If it is another person's router I would suggest setting IP restriction on remote administration. To do this enable Remote Administration and add this line to your firewall script:
Code:
iptables -I INPUT 1 -i `nvram get wan_iface` -s ! 10.11.22.33 -p tcp -j DROP

replace 10.11.22.33 with IP address of computer from which you will administer the router.
Also I suggest using strong passwords (or preferably SSH private key authentication) and only encrypted protocols (e.g. SSH) over the internet, and never Telnet of HTTP over internet.
For people using SSH over internet for TCP over SSH tunneling I would suggest trying DD-WRT VPN build and OpenVPN if possible.
Display posts from previous:    Page 1 of 1
Post new topic   Reply to topic    DD-WRT Forum Forum Index -> General Questions All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum