LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-29-2015, 02:07 PM   #1
akiras rain
Member
 
Registered: Dec 2015
Location: philadelphia usa
Distribution: peppermint.lubuntu,puppy
Posts: 44

Rep: Reputation: Disabled
nmap scan on my linux dd wrt router finds a 512bit ssl key that is already public record.


ok so i did an nmap scan on my dd wrt router from inside the net work.


here is the results of nmap.
""""""
issuer: commonname-newmedia-NET Gmbh
stateorprovincename= saxson/countryname=DE

public key type: rsa
public key bits: 512
signature algotithm: sha1withRSAEncryption
MD5 = shows the hash value
sha-1 = shows the hash value

ssl-known-key: found in little black box 0.1 -
http://code.google.com/p/littleblackbox


"""""""


ok so that ssl known key at the end is that something i should be worried about? i am concerned this ssl known key is what my router uses when i sign in with my password to it.


also ports 53,80 and 443 are visible from inside my network.


PLEASE note i am doing this scan from the INSIDE not the outside of my network.




thoughts anyone?
 
Old 12-29-2015, 03:49 PM   #2
fjennings
LQ Newbie
 
Registered: Oct 2015
Location: Phoenix, AZ
Distribution: CentOS, Ubuntu, Debian, Oracle, Red Hat
Posts: 17

Rep: Reputation: 1
I wouldn't worry about. You are correct, you SSL key for your router is known, so is millions of others. Not a big deal so long as logging in to your router from the OUTSIDE is prevented. From the inside, keep it tight by blocking the 80 and keeping the 443. I personally use MikroTik routers, and the only way to actually connect is through a specific physical port.

This is why I also don't let my wireless hang-out just for anyone to connect to (20 character randomized password), place my wireless on a restricted subnet, and prevent router management access to anyone who is on the wireless.

Again, not a big worry. Do your own due-diligence, and carry on.
 
Old 12-30-2015, 05:01 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by akiras rain View Post
ok so that ssl known key at the end is that something i should be worried about? i am concerned this ssl known key is what my router uses when i sign in with my password to it.
First of all the fact the private key is in the littleblackbox repo of known private SSL keys is a Fact of Life where embedded devices are concerned. (Plus vendors can not be expected to be careful anyway but that's another discussion). Secondly obtaining the private key makes a MiTM possible but as long as you don't expose any remote management features that would confine this to your own LAN ( and device security like custom admin password, separate vlans and ACLs should be thought of as "basic" anyway in this day and age and regardless of providing services in a DMZ or not, and especially when using heterogeneous environments, enabling BYOD or allowing otherwise untrusted clients), and this certificate is used only to provide an encrypted connection to the admin web interface of your router, so using it for any other purpose (public-facing or not) should be corrected immediately. Most importantly though, third: once resolved (see this and this) there is no issue to "worry" about any more...


So well done for running the scan in the first place, now understand the potential risks and then fix things. That actually allays fears.

Last edited by unSpawn; 12-30-2015 at 05:03 AM.
 
Old 12-30-2015, 11:22 AM   #4
akiras rain
Member
 
Registered: Dec 2015
Location: philadelphia usa
Distribution: peppermint.lubuntu,puppy
Posts: 44

Original Poster
Rep: Reputation: Disabled
abbreviations just making sure i got them and other

acl = access control list?
byod = bring your own device??

i have remote administration all turned off.
i have access point isolation and all clients on the network are isolated from each other.

i really think it's time to just buy a newer router

and i do have a big password for the router 20+ characters

i tried to follow the dd wrt directions to separate the wireless LAN from the wired LAN via a VLAN setup but couldn't get it to take.

the router is the old standby wrtg54g 11 years old!






Quote:
Originally Posted by unSpawn View Post
First of all the fact the private key is in the littleblackbox repo of known private SSL keys is a Fact of Life where embedded devices are concerned. (Plus vendors can not be expected to be careful anyway but that's another discussion). Secondly obtaining the private key makes a MiTM possible but as long as you don't expose any remote management features that would confine this to your own LAN ( and device security like custom admin password, separate vlans and ACLs should be thought of as "basic" anyway in this day and age and regardless of providing services in a DMZ or not, and especially when using heterogeneous environments, enabling BYOD or allowing otherwise untrusted clients), and this certificate is used only to provide an encrypted connection to the admin web interface of your router, so using it for any other purpose (public-facing or not) should be corrected immediately. Most importantly though, third: once resolved (see this and this) there is no issue to "worry" about any more...


So well done for running the scan in the first place, now understand the potential risks and then fix things. That actually allays fears.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
record online Internet radio to file without a sound card on DD-WRT router totaluser Linux - Software 2 11-25-2011 01:07 PM
public ip scanned by nmap during private lan scan goober3 Linux - Security 2 09-14-2008 02:45 PM
Scan behind Router With nMap? arpanet1969 Linux - Security 1 01-28-2005 05:38 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:43 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration