abuse@rogers.com

Need Help?

That's what we're here for! The goal of the Rogers Community is to help you find answers on everything Rogers. Can't find what you're looking for? Just ask!
cancel
Showing results for 
Search instead for 
Did you mean: 
Reply
kuhnberg
I Plan to Stick Around
Posts: 27

abuse@rogers.com

I'm receiving emails from abuse@rogers.com saying, "We have received notification that your Rogers Public IP address has been identified as being vulnerable to SSDP (Simple Service Discovery Protocol) reflection attacks....................."

 

I'm using the CGN3ROG modem with a D-Link Dir 862L (AC1600 Dual Band Gigabyte) Router for wi-fi. 

 

In my router settings UPnP, WAN Ping, IPV4 and IVP6 Multicast Streams are all disabled.  D-Link says this newer router does not have SSDP vulnerabilty.  Firmware is up to date.

 

I have run the ShieldsUp UPnP Expore Test many times on both the PC and a laptop.  Both are good.  Both computers are also free of viruses and spyware.

 

So, why am I still getting abuse warnings?  Is there something else here I should be looking at?  Any help would be greatly appreciated.  I have not talked to Rogers yet.  I got the first email a few weeks ago, followed their suggestions, and all has been good until now.  Have received two more emails in the last couple days.

 

 

***edited labels***

Datalink
Resident Expert
Resident Expert
Posts: 7,368

Re: abuse@rogers.com

Have a look at the following threads:

 

http://www.dslreports.com/forum/r29622681-Internet-Rogers-e-mail-in-regards-to-SSDP-attacks#end

 

http://support.dlink.ca/FAQView.aspx?f=sY5vcvfAuAV6bXgi%2F8WoVw%3D%3D

 

http://www.tenable.com/blog/detecting-upnp-with-nessus-pvs

 

 

I would do a Factory reset on both the CGN3 and 862L and reset all parameters from scratch, including disabling UPNP, and possibly consider disabling SSDP discovery service on your pc and laptops.  I would also run scans looking for the Conflicker Worm.

 

 



kuhnberg
I Plan to Stick Around
Posts: 27

Re: abuse@rogers.com

OK, thanks.

 

I disabled SSDP Discovery on the desktop and laptop.

 

I tested both for Conficker with McAfee's conficker tool and the Conficker Eye Chart.   Didn't find anything.

 

Will do the resests and see what happens.

 

Nothing has changed here except for the new modem and router when I upgraded to Hybrid 60 a couple months ago.  Have been with Rogers for years with no issues so this is baffling.

Datalink
Resident Expert
Resident Expert
Posts: 7,368

Re: abuse@rogers.com

Was there a firmware update available for the DIR-862L?



kuhnberg
I Plan to Stick Around
Posts: 27

Re: abuse@rogers.com

I have the DIR-862L.  No firmware update available.

Gdkitty
Resident Expert
Resident Expert
Posts: 14,333

Re: abuse@rogers.com

Only other thing i could think of...

MAC cloning? If someone else had the same mac, appeared as yours.. and the vulnerability was there?

 

Though you likely would see increased usage  if that was the case.



kuhnberg
I Plan to Stick Around
Posts: 27

Re: abuse@rogers.com

Gdkitty.......I've been keeping an eye on our data usage and it looks fine.

sswilson
I Plan to Stick Around
Posts: 11

Re: abuse@rogers.com

I've run into the same issue with the same router. There is in fact a new firmware (1.01) but it doesn't come up when you use the router's "check for new firmware" function on their web interface. (It's available from the dlink website Dir-862L ).

 

I've run both the grc.com and rapid7 tests with both reporting zero responses to the exploit. UPNP has been turned off on the router, and the latest firmware update has been applied. After receiving my third call on the subject I specifically went around to each individual PC and ran the GRC and Rapid7 exploit tests on them on the off chance that something had slipped by my antivirus but again came up empty.

 

I've spoken to tier 2 twice on the subject with the first time being told that "the dude who can run those tests isn't in for the next few days but I'll get him to run some tests on your IP when he comes back and we'll contact you if we see something". I didn't hear back from them so assumed there was no issue. Received a third robo-call this morning and got the impression that the tier 2 tech I received this time was pretty much only offering lip service... imagine my surprise when after he'd put me on hold a couple of times to "check this out" I was informed by him that they didn't have the ability to test for this live and that it could only be done by the automated system. (At that point I didn't bother asking him what exactly he had been doing when he put me on hold to check it out).

 

He had no suggestions or possible explanations to my questions WRT my not being able to replicate the issue on my end using GRC or rapid7 testing and the only offered solution was for me to stop using the router.

 

The only thing I can think of is that maybe one of my entertainment appliances (networked receiver and blueray player) has an issue and was willing to troubleshoot that with the tech by turning them on/off and unplugging the network to them, but since they can't (or probably more likely won't) do live testing there was nothing left to do.

 

Bell is going to be here on the 28'th to install FibreOp.

Gdkitty
Resident Expert
Resident Expert
Posts: 14,333

Re: abuse@rogers.com

Thats wierd that you got continual calls on it..

My inlaws got the INITIAL thing for it.. that their is vulnerable..

Never actually ever updated it 😛

 

But they have never been bothered since thing.



sswilson
I Plan to Stick Around
Posts: 11

Re: abuse@rogers.com

Yeah, I'm not sure what's going on with it. I'd have been more than happy to do further testing if they had gotten back to me after the first time I spoke with tier 2 and the TSR said that they'd run tests on the IP and respond if they still saw a problem, but I never got a follow up.

 

The second talk to tier 2 (today) was much less productive with the TSR telling me that they don't have the ability to test for that real time. Basically telling me that my only option was to replace the router. Either the first TSR lied to me or the second one did, and I don't react very well to being lied to.

 

As it stands, I was already scheduled to switch over to Bell at the end of the month but I didn't have too many bad things to say about rogers other than the fact that their infrastructure is starting to get a bit dated in Atlantic Canada and that bell has stepped up their game substantially.

 

Their tech support (or more importantly lack of tech support) on this issue has soured my impression and if I hadn't already been booked, I probably would have been switching ISPs over this anywise.

 

One of the theories that's been bandied about is that rogers isn't actually testing for the SSDP/UPNP exploit, but instead only scanning for mac addys they can tie to D-Link routers that may have been vulnerable originally. I don't know if that's accurate, but unless there's something I'm missing I can't find any vulnerability on my network when I test it using external tools.