I know that very few of you are looking at the amprgw router statistics,
but for those who do care: the current statistics (packet/byte counts)
accumulate since router boot time. Would it be more helpful/meaningful
if the totals reset at midnight so that they reflect daily trends?
Also, some of the numbers are getting large enough that they're not
intuitively meaningful. There's no convenient way to insert thousands
separators. Would 'scientific notation' (eg, 1.56e9) be helpful? (This
is the 'g' format specifier in 'C'.) Or alternatively, notation such
as 1.5k, 2.4M, 8.1G, or 1.2T could possibly be generated.
- Brian
> Patches are often applied late because it's not rare to experience serious disruption.
> Anyway the software being patched is poorly made in the first place.
> The problems caused by patches are actually another sign of very poor software design.
And not the least: after 25 years of development on Windows the patching mechanism still
is in a sad state, requiring unreasonable time and resources to find and install required patches.
It is very clear that quality isn't a priority for Microsoft *at all*. They only care about
making money, what happens to their customers and how much time they waste on using and maintaining
their products does not matter to them as long as they keep buying.
Rob
> To help prevent this from affecting AMPRNet systems, I am now blocking
> inbound port 16992 at the amprgw gateway. I hope this won't cause you
> any difficulties.
Thanks for the hint. It is surprisingly difficult to get technical information
from the Intel documents. Do you block TCP only or also UDP? And what about
ports 16993 and 16994? (and maybe even 623 and 664?)
The nice thing about such new vulnerabilities is that they allow you to identify
the aforementioned scanners and put them on the permanent blacklist.
Aside from shodan.io (that were already on the blocklist) I also see
52.174.52.33 census01.project-magellan.com
Yet another annoying "research" project...
You could try to get 44.0.0.0/8 opted out via research(a)project-magellan.com
Rob
In the past there have been complaints of some RIP44 packets not
reaching their destination, enough so that routes sometimes
vanish from the RIP44 table on the receiver. Although there is
currently little I can do about packet loss on the network,
I have slowed down the rip sender by 100 microseconds per sent
packet to avoid saturating buffers on busy networking equipment
and thereby avoid causing possible congestion loss. This means
that it now takes a little over a second to send the complete set
of (currently) 26 RIP44 packets to each of (currently) 435 gateways.
I don't know if this was the cause nor whether this will help,
but it's a cheap fix and it may help. Slightly slower packet
delivery shouldn't negatively affect anyone.
RIP44 transmissions are still sent every five minutes.
- Brian
On May 1st, Intel released a security advisory regarding their Active
Management Technology. It's a nasty one, but luckily it doesn't seem
to affect home (non-datacenter) PC firmware.
> https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&lang…
Intel has released a mitigation guide:
> https://downloadcenter.intel.com/download/26754
Security researchers have since been able to uncover more details and
release proof-of-concept exploit code. There is now a free nmap .nse
plugin available to scan for this vulnerability:
> https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5689.html
To help prevent this from affecting AMPRNet systems, I am now blocking
inbound port 16992 at the amprgw gateway. I hope this won't cause you
any difficulties.
- Brian
> I've been curious how many of the 435 registered gateways were reachable,
> so I collected ICMP unreachable messages during a recent RIP transmission
> (which of course sends to every gateway) and got the following:
> 33 gateways aren't reachable or are rejecting inbound IPIP packets
I think it would be a good idea to somehow keep track of this information and remove
or at least mark inactive those gateways for which this condition persists
for some amount of time. Especially when protocol 4 is rejected.
Host unreachable could be because the internet is down or the power is out,
but an explicit protocol 4 rejected indicates nonexistent configuration, that
could temporarily exist because e.g. new system has just been installed that has
not been configured yet, but should not persist for longer than say 2 weeks.
The operator can alwayes re-enable or re-add the gateway when he has found the
opportunity to re-install it.
Rob
Hello everyone!
Does anyone have any experience setting up VyOS for use on the AMPR
network? I have the IPIP tunnel to UCSD set up, however, I don't know how
to proceed from there in terms of RIP.
This is what I did so far:
set interfaces tunnel tun0
set interfaces tunnel tun0 local-ip 'wanip'
set interfaces tunnel tun0 remote-ip 169.228.66.251
set interfaces tunnel tun0 encap ipip
set interfaces tunnel tun0 descr "Tunnel to AMPR Gateway"
set interfaces tunnel tun0 multicast enable
set protocols static table 1 interface-route 0.0.0.0/0 next-hop-interface
tun0
set policy route SOURCE_ROUTE rule 10 set table 1
set policy route SOURCE_ROUTE rule 10 source address 44.0.0.0/16
set interfaces ethernet eth1 vif 44 policy route SOURCE_ROUTE
set protocols rip interface eth1.44
set interfaces ethernet eth1 vif 44 ip rip authentication
plaintext-password [therippass]
--
Miguel Rodriguez
12th Grade Student
MIGUELR-DN42 / KM4VYU
miguemely101(a)gmail.com
Tel: *561-758-0631*
*Accredited District Since 2008; Re-certification - January 2013*
Home of Florida's first LEED Gold Certified School
*Disclaimer*: Under Florida law, e-mail addresses are *public records*. If
you do not want your e-mail address released in response to a public
records request, do not send electronic mail to this entity. Instead,
contact this office by phone or in writing.
All,
I need to ask if any of the following have been noticed or by anyone before.
As I try to test a few things today, I:
- cannot forward IPENCAP traffic to another LAN destination while
running ampr-ripd 1.16 on my router
- cannot block IPENCAP traffic whatsoever at my WAN while running
ampr-ripd 1.16 on my router
- cannot block receipt of RIP44 packets from AMPRGW running ampr-ripd
1.16 on my router
Procedure:
When setting up LEDE:
-I observed that I no longer had firewall hits for RIP44 from AMPRGW
- I removed the rule, and I still receive routes
Testing receipt of MACs on tunl0 today:
- I removed my rule allowing -p 4 from the IPSET of our GW IPs
- I made a port forward rule for -p 4 to a LAN machine I setup with a
tunl0 of 44.60.44.2
- I set up routes to use tunl0
- I pinged
- Using Wireshark I never received traffic
- My router saw no hits
- I connected to http://44.60.44.10 to perform a traceroute to 8.8.8.8
- It still worked, even though I have no firewall rule!
- the device is still in this configuration
- and I noticed one 'leaked' packet that never made it to my test tunl0
interface
- I notice that ampr-ripd 1.16 listens on protocol 4 instead of udp/520
as version 1.13 did
BUG:
It appears my firewall rules regarding IPENCAP/A.K.A. 'dev tunl0'
packets - after upgrading from 1.13 to 1.16 are infective.
Need to test:
- If I configure a valid 44 IP on my router's tunl0, I assume ALL
iptables rules for it COULD POSSIBLY be ineffective (since the RIP44
rule is)
- If I can send routes in this configuration
- If I can receive routes from someone else (with correct PW, of course)
- If I receive IPENCAP packets from a non GW (since I have no method of
it blocking, except if it exists ampr-ripd.c). Note - I'm not requesting
this feature
I will test later today.
- Lynwood
KB3VWG