[plug] Safely using an untrusted router

Bill Kenworthy billk at iinet.net.au
Wed Oct 21 23:31:37 UTC 2015


my iinet mobile (GalaxyS5 with cyanogenmod) is using a 10.160 private
address - I have no problems running openvpn over it to a vm inside my
network (including security camera video over the vpn when I want to
take a peek).  I am using a Cisco 1841 with an alcatel speadstream
bridged with the router doing pppoe to iinet.  Stable but I need to work
on the QoS more.

BillK



On 22/10/15 07:12, Dean Bergin wrote:
> Hello Dirk,
> 
> This is probably not going to help solve your particular issue, but one
> thing I recently did, was install OpenWRT on a Rpi2 and set up PPPoE
> over one of two subinterfaces (VLAN) to a cheap netgear modem (with the
> help of a Cisco Catalyst switch). I also put the Rpi2 OpenWRT
> effectively into it's own routed subnet/DMZ (part of the design) so that
> even if there where to be some kind of funny business, things like uPNP
> theoretically should not work since my experience has taught me that
> most consumer-grade modems/routers do not route/NAT anything other than
> their resident subnet, therefore I believe that not only are uPNP
> implementations (and many other services on consumer-grade routers)
> usually bound to the subnet to which they are running on, but should be
> disabled in cases where the device is in pass-through mode.
> 
>>Does anyone know whether 4G modems (and smart phones, for that matter)
> are assigned a publicly-routable IP address or are they
> typically NAT'd behind a small number of IP addresses of the mobile
> service provider's servers?  I can't imagine billions(?) of mobile
> phones all having unique publicly-routable IP addresses (on top of all
> the servers and so on, around the world).
> 
> I had the opportunity to test this, as I was able to tether my phone to
> a Rpi2 running OpenWRT as part of the labs I did for my now current
> nework design, but I did not think to test this specific scenario.
> 
> Shouldn't be too difficult to create a lab to test this, if someone has
> a spare raspberry pi (mine is currently in 'prod' now)?
> 
> 
> On Wed, Oct 21, 2015 at 6:27 PM Dirk <justanothergreenguy at gmail.com
> <mailto:justanothergreenguy at gmail.com>> wrote:
> 
>     Thanks Andrew.  Will follow up on those ideas too, thanks.
> 
>     However, I have another idea, a bit left field, but it may just do
>     the trick...
> 
>     Does anyone know whether 4G modems (and smart phones, for that
>     matter) are assigned a publicly-routable IP address or are they
>     typically NAT'd behind a small number of IP addresses of the mobile
>     service provider's servers?  I can't imagine billions(?) of mobile
>     phones all having unique publicly-routable IP addresses (on top of
>     all the servers and so on, around the world).
> 
>     If they're NAT'd, then maybe a pre-paid 4G USB modem dongle would be
>     the way to go for low MB critical online work, eg. fetching package
>     lists, logging in to ASIC, ATO, webmail, our utilities, etc.  Should
>     block all scanners on the net that are looking for routers to
>     exploit, by virtue of sitting behind the Svc providers routers.
>      (...and then use an unsecured computer and ADSL router pair for
>     general web browsing, content streaming, etc).
> 
>     Does anyone know if this would work?
> 
>     (Of course, if a 4G dongle is not NAT'd then I don't really gain
>     anything).
> 
> 
> 
> 
>     On Wednesday, 21 October 2015, Andrew Cooks <acooks at gmail.com
>     <mailto:acooks at gmail.com>> wrote:
> 
>         On Wed, Oct 21, 2015 at 9:43 AM, Dirk
>         <justanothergreenguy at gmail.com> wrote:
> 
> 
>             Cheers for that Pavel.  And thanks again Brad for your
>             input.  You've both given me some ideas, although I was
>             hoping for an easy OpenVPN option  :)
> 
>             If anyone else has any thoughts or suggestions, please let
>             me know!
> 
>         My internet access is slow enough, so I'm not really excited
>         about pushing everything through a VPN.
> 
>         I trust my router. I have a TP-Link TD-8817 modem in bridge
>         mode, connected to a fit-pc
>         (http://www.fit-pc.com/web/solutions/multilan/) running IPFire
>         (http://www.ipfire.org/). IPFire tells me I can trust my DNS.
>         IPFire packages are kept up to date. The modem could conceivably
>         modify the PPPoE frames in transit, except that it's a dirt
>         cheap consumer product with little functionality that could be
>         exploitable and it's unlikely to have enough processing power to
>         do that kind of thing.
> 
>         There is nowhere safe, only acceptable risks.
> 
>         a.
> 
>     _______________________________________________
>     PLUG discussion list: plug at plug.org.au <mailto:plug at plug.org.au>
>     http://lists.plug.org.au/mailman/listinfo/plug
>     Committee e-mail: committee at plug.org.au <mailto:committee at plug.org.au>
>     PLUG Membership: http://www.plug.org.au/membership
> 
> -- 
> 
> Kind Regards,
> 
> /Dean Bergin/.
> 
> 
> 
> _______________________________________________
> PLUG discussion list: plug at plug.org.au
> http://lists.plug.org.au/mailman/listinfo/plug
> Committee e-mail: committee at plug.org.au
> PLUG Membership: http://www.plug.org.au/membership
> 



More information about the plug mailing list