PDA

View Full Version : Curious about something


vinh1000
26-11-2009, 20:24
2009-11-22 17:19:00 notice SNMP authentication-Failure: from 194.117.143.4 community:public
2009-11-22 17:18:59 notice SNMP authentication-Failure: from 194.117.143.4 community:public
2009-11-22 17:18:58 notice SNMP authentication-Failure: from 194.117.143.4 community:public
2009-11-22 17:18:57 notice SNMP authentication-Failure: from 194.117.143.4 community:public
2009-11-22 17:18:56 notice SNMP authentication-Failure: from 194.117.143.4 community:public
2009-11-22 17:18:55 notice SNMP authentication-Failure: from 194.117.143.4 community:public

This looks like a hacking attempt from my view - any thoughts :confused:

Ignitionnet
26-11-2009, 20:25
Security scan from on the VM network, nothing to worry about they are just making sure that your kit is secure.

vinh1000
26-11-2009, 20:26
thanks :)

Ignitionnet
26-11-2009, 20:28
Pleasure.

Peter_
26-11-2009, 23:14
2009-11-22 17:19:00 notice SNMP authentication-Failure: from 194.117.143.4 community:public
2009-11-22 17:18:59 notice SNMP authentication-Failure: from 194.117.143.4 community:public
2009-11-22 17:18:58 notice SNMP authentication-Failure: from 194.117.143.4 community:public
2009-11-22 17:18:57 notice SNMP authentication-Failure: from 194.117.143.4 community:public
2009-11-22 17:18:56 notice SNMP authentication-Failure: from 194.117.143.4 community:public
2009-11-22 17:18:55 notice SNMP authentication-Failure: from 194.117.143.4 community:public

This looks like a hacking attempt from my view - any thoughts :confused:
As BB says nothing to worry about just click the link for the identity.

http://tools.virginmedia.com/cgi-bin/ripewhois.pl?194.117.143.4

zing_deleted
26-11-2009, 23:19
incidentally what do they do if your kit isnt secure?

Ignitionnet
27-11-2009, 09:42
Get in touch for a chat.

zing_deleted
27-11-2009, 09:48
lol thats gonna be a funny call

AbyssUnderground
27-11-2009, 10:27
Hmm now there is a question. Is it even possible to use your own modem, with your assigned MAC assigned to the modem so the network allows access? That way you can have SNMP and the likes?

Or is that just not possible at all due to other security they have in place? Not thinking of trying it of course, I'm just curious. A simple yes or no is fine :)

Peter_
27-11-2009, 10:34
Hmm now there is a question. Is it even possible to use your own modem, with your assigned MAC assigned to the modem so the network allows access? That way you can have SNMP and the likes?

Or is that just not possible at all due to other security they have in place? Not thinking of trying it of course, I'm just curious. A simple yes or no is fine :)
As BB will tell you that has now been disabled and is a pet hate of his, watch this space.

Ignitionnet
27-11-2009, 12:37
Hmm now there is a question. Is it even possible to use your own modem, with your assigned MAC assigned to the modem so the network allows access? That way you can have SNMP and the likes?

Or is that just not possible at all due to other security they have in place? Not thinking of trying it of course, I'm just curious. A simple yes or no is fine :)

No - even if you did bring your own modem you'd need to hack the firmware on it. Even if you did bring your own modem with hacked firmware and messed with the MAC address to match your own modem you wouldn't be able to get online on 50Mbps service due to the certificates on the modem not matching the MAC address.

The only way to do this is to use a hacked firmware which ignores VM's blocking of SNMP access (which is done via the config file) and produce a 'perfect clone' where you take the certificates and keys from your legitimate modem and clone those onto the new modem along with the MAC address.

Even that isn't necessarily good enough as VM can employ other checks, such as running SNMP inspections of the modem, in order to verify its' integrity. These can be blocked, but then one runs the risk of VM automagically rebooting your modem if they can't reach it via SNMP. Using a hacked firmware to prevent the DocsDevResetNow from working brings with it other problems in that the CMTS would consider the device offline and cease providing it with unicast station maintenance opportunities causing T4 timeout and the modem to go offline.......

Bored yet?

Short answer - no :D

AbyssUnderground
27-11-2009, 12:44
Point made! :p:

Rik
27-11-2009, 17:16
No - even if you did bring your own modem you'd need to hack the firmware on it. Even if you did bring your own modem with hacked firmware and messed with the MAC address to match your own modem you wouldn't be able to get online on 50Mbps service due to the certificates on the modem not matching the MAC address.

The only way to do this is to use a hacked firmware which ignores VM's blocking of SNMP access (which is done via the config file) and produce a 'perfect clone' where you take the certificates and keys from your legitimate modem and clone those onto the new modem along with the MAC address.

Even that isn't necessarily good enough as VM can employ other checks, such as running SNMP inspections of the modem, in order to verify its' integrity. These can be blocked, but then one runs the risk of VM automagically rebooting your modem if they can't reach it via SNMP. Using a hacked firmware to prevent the DocsDevResetNow from working brings with it other problems in that the CMTS would consider the device offline and cease providing it with unicast station maintenance opportunities causing T4 timeout and the modem to go offline.......

Bored yet?

Short answer - no :D

I LOVE IT when you talk technical to us BB ;)