Technology Get the latest on technology, electronics and software…

The Official Internet/Computer Security News Discussion Thread

Old 10-10-2017, 05:05 PM
  #481  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,326
Received 2,043 Likes on 1,132 Posts
I bet he will turn around and sue them.
Old 10-10-2017, 10:02 PM
  #482  
Race Director
 
nfnsquared's Avatar
 
Join Date: Dec 2003
Location: MAGA country
Posts: 12,474
Received 1,793 Likes on 1,346 Posts
Meh, don't think he'll get too far. PureVPN's TOS includes an extended blurb about not using their service for illicit/illegal activities...
Old 10-16-2017, 01:00 AM
  #483  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,344
Received 10,112 Likes on 6,104 Posts

Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping

KRACK attack allows other nasties, including connection hijacking and malicious injection.

An air of unease set into the security circles on Sunday as they prepared for the disclosure of high-severe vulnerabilities in the Wi-Fi Protected Access II protocol that make it possible for attackers to eavesdrop Wi-Fi traffic passing between computers and access points.

The proof-of-concept exploit is called KRACK, short for Key Reinstallation Attacks. The research has been a closely guarded secret for weeks ahead of a coordinated disclosure that's scheduled for 8 a.m. Monday, east coast time. An advisory the US CERT recently distributed to about 100 organizations described the research this way:

US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.
According to a researcher who has been briefed on the vulnerability, it works by exploiting a four-way handshake that's used to establish a key for encrypting traffic. During the third step, the key can be resent multiple times. When it's resent in certain ways, a cryptographic nonce can be reused in a way that completely undermines the encryption.

A Github page belonging to one of the researchers and a separate placeholder website for the vulnerability used the following tags:
  • WPA2
  • KRACK
  • key reinstallation
  • security protocols
  • network security, attacks
  • nonce reuse
  • handshake
  • packet number
  • initialization vector
Researchers briefed on the vulnerabilities
as: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088. One researcher told Ars that Aruba and Ubiquiti, which sell wireless access points to large corporations and government organizations, already have updates available to patch or mitigate the vulnerabilities.

The vulnerabilities are scheduled to be formally presented in a talk titled Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 scheduled for November 1 at the ACM Conference on Computer and Communications Security in Dallas. It's believed that Monday's disclosure will be made through the site krackattacks.com. The researchers presenting the talk are Mathy Vanhoef and Frank Piessens of KU Leuven and imec-DistriNet, Maliheh Shirvanian and Nitesh Saxena of the University of Alabama at Birmingham, Yong Li of Huawei Technologies in Düsseldorf, Germany, and Sven Schäge of Ruhr-Universität Bochum in Germany. The researchers presented this related research in August at the Black Hat Security Conference in Las Vegas.

The vast majority of existing access points aren't likely to be patched quickly, and some may not be patched at all. If initial reports are accurate that encryption bypass exploits are easy and reliable in the WPA2 protocol, it's likely attackers will be able to eavesdrop on nearby Wi-Fi traffic as it passes between computers and access points. It might also mean it's possible to forge Dynamic Host Configuration Protocol settings, opening the door to hacks involving users' domain name service.

It wasn't possible to confirm the details reported in the CERT advisory or to assess the severity at the time this post was going live. If eavesdropping or hijacking scenarios turn out to be easy to pull off, people should avoid using Wi-Fi whenever possible until a patch or mitigation is in place. When Wi-Fi is the only connection option, people should use HTTPS, STARTTLS, Secure Shell and other reliable protocols to encrypt Web and e-mail traffic as it passes between computers and access points. As a fall-back users should consider using a virtual private network as an added safety measure, but users are reminded to choose their VPN providers carefully, since many services can't be trusted to make users more secure. This post will be updated as more information becomes available.
Old 10-16-2017, 11:19 AM
  #484  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,344
Received 10,112 Likes on 6,104 Posts
Old 10-16-2017, 11:20 AM
  #485  
Senior Moderator
 
thoiboi's Avatar
 
Join Date: Apr 2010
Location: SoCal, CA
Posts: 46,857
Received 8,568 Likes on 6,621 Posts
well shit...
Old 10-16-2017, 11:33 AM
  #486  
_
 
AZuser's Avatar
 
Join Date: Nov 2006
Posts: 18,692
Received 3,097 Likes on 1,867 Posts
And people thought I was wasting my time by running Ethernet cable through the house.
Old 10-16-2017, 03:15 PM
  #487  
Race Director
 
nfnsquared's Avatar
 
Join Date: Dec 2003
Location: MAGA country
Posts: 12,474
Received 1,793 Likes on 1,346 Posts
Originally Posted by AZuser
And people thought I was wasting my time by running Ethernet cable through the house.
Meh, someone would really want to have to to crack a residential wap/router....
Old 10-16-2017, 03:26 PM
  #488  
Race Director
 
nfnsquared's Avatar
 
Join Date: Dec 2003
Location: MAGA country
Posts: 12,474
Received 1,793 Likes on 1,346 Posts
Patch updates for KRACK:

https://www.bleepingcomputer.com/new...vulnerability/

Win10 computers are protected by the Oct 10 update...

Last edited by nfnsquared; 10-16-2017 at 03:37 PM.
Old 10-17-2017, 02:01 PM
  #489  
_
 
AZuser's Avatar
 
Join Date: Nov 2006
Posts: 18,692
Received 3,097 Likes on 1,867 Posts
Nice.

https://landing.google.com/advancedprotection/
Old 01-02-2018, 09:05 PM
  #490  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,326
Received 2,043 Likes on 1,132 Posts
https://www.theregister.co.uk/2018/0...u_design_flaw/'Kernel memory leaking' Intel processor design flaw forces Linux, Windows redesign

Other OSes will need an update, performance hits loom

It is understood the bug is present in modern Intel processors produced in the past decade. It allows normal user programs – from database applications to JavaScript in web browsers – to discern to some extent the layout or contents of protected kernel memory areas.

The fix is to separate the kernel's memory completely from user processes using what's called Kernel Page Table Isolation, or KPTI. At one point, Forcefully Unmap Complete Kernel With Interrupt Trampolines, aka FUCKWIT, was mulled by the Linux kernel team, giving you an idea of how annoying this has been for the developers.

Last edited by doopstr; 01-02-2018 at 09:09 PM.
Old 01-02-2018, 10:46 PM
  #491  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,344
Received 10,112 Likes on 6,104 Posts


Crucially, these updates to both Linux and Windows will incur a performance hit on Intel products. The effects are still being benchmarked, however we're looking at a ballpark figure of five to 30 per cent slow down, depending on the task and the processor model. More recent Intel chips have features – such as PCID – to reduce the performance hit. Your mileage may vary.
Old 01-04-2018, 08:35 AM
  #492  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,344
Received 10,112 Likes on 6,104 Posts
https://meltdownattack.com/
Old 01-04-2018, 11:47 AM
  #493  
Race Director
 
nfnsquared's Avatar
 
Join Date: Dec 2003
Location: MAGA country
Posts: 12,474
Received 1,793 Likes on 1,346 Posts
Intel denies it's a bug, claims hack affects other chip makers as well:

Intel Says Range of Chips Vulnerable to Hack, Denies `Bug' | IT Pro
Old 01-04-2018, 12:59 PM
  #494  
_
 
AZuser's Avatar
 
Join Date: Nov 2006
Posts: 18,692
Received 3,097 Likes on 1,867 Posts
https://newsroom.intel.com/news-rele...rity-exploits/

Intel Issues Updates to Protect Systems from Security Exploits

Intel and Its Partners have Made Significant Progress in Deploying Updates as Software Patches and Firmware Updates

SANTA CLARA, Calif., Jan. 4, 2018 — Intel has developed and is rapidly issuing updates for all types of Intel-based computer systems — including personal computers and servers — that render those systems immune from both exploits (referred to as “Spectre” and “Meltdown”) reported by Google Project Zero. Intel and its partners have made significant progress in deploying updates as both software patches and firmware updates.

Intel has already issued updates for the majority of processor products introduced within the past five years. By the end of next week, Intel expects to have issued updates for more than 90 percent of processor products introduced within the past five years. In addition, many operating system vendors, public cloud service providers, device manufacturers and others have indicated that they have already updated their products and services.

Intel continues to believe that the performance impact of these updates is highly workload-dependent and, for the average computer user, should not be significant and will be mitigated over time. While on some discrete workloads the performance impact from the software updates may initially be higher, additional post-deployment identification, testing and improvement of the software updates should mitigate that impact.

System updates are made available by system manufacturers, operating system providers and others.

Intel will continue to work with its partners and others to address these issues, and Intel appreciates their support and assistance. Intel encourages computer users worldwide to utilize the automatic update functions of their operating systems and other computer software to ensure their systems are up-to-date.
Old 01-16-2018, 05:22 PM
  #495  
Race Director
 
nfnsquared's Avatar
 
Join Date: Dec 2003
Location: MAGA country
Posts: 12,474
Received 1,793 Likes on 1,346 Posts
Google Method Patches Spectre Vulnerability without Performance Loss | IT Pro
Old 01-23-2018, 11:00 AM
  #496  
Race Director
 
nfnsquared's Avatar
 
Join Date: Dec 2003
Location: MAGA country
Posts: 12,474
Received 1,793 Likes on 1,346 Posts
How a 22-Year-Old Discovered the Worst Chip Flaws in History | IT Pro
Old 01-29-2018, 10:29 AM
  #497  
_
 
AZuser's Avatar
 
Join Date: Nov 2006
Posts: 18,692
Received 3,097 Likes on 1,867 Posts


https://www.wsj.com/articles/intel-w...ent-1517157430

Intel Warned Chinese Companies of Chip Flaws Before U.S. Government

Decision to disclose issue to select few customers, including Lenovo and Alibaba, has ripple effects through security and tech industries

Jan. 28, 2018

In initial disclosures about critical security flaws discovered in its processors, Intel Corp. notified a small group of customers, including Chinese technology companies, but left out the U.S. government, according to people familiar with the matter and some of the companies involved.

The decision raises concerns, security researchers said, as it potentially could have allowed information about the chip flaws, dubbed Spectre and Meltdown, to fall into the hands of the Chinese government before being publicly divulged. There is no evidence any information was misused, the researchers said.

Weeks after word of the flaws first surfaced, Intel’s choices about who would receive advance warning continue to ripple through the security and tech industries.The flaws were first identified in June by a member of Google’s Project Zero security team. Intel had planned to make the discovery public on Jan. 9—people working to protect systems from hacks often hold off on announcements while fixes are devised—but sped up its timetable when the news became widely known on Jan. 3, a day after U.K. website the Register wrote about the flaws.

Because the flaws can be leveraged to sneak sensitive data out of the cloud, information about them would be of great interest to any intelligence-gathering agency, said Jake Williams, president of the security company Rendition Infosec LLC and a former National Security Agency employee. In the past, Chinese state-linked hackers have exploited software vulnerabilities to get leverage on their targets or expand surveillance.

It is a “near certainty” Beijing was aware of the conversations between Intel and its Chinese tech partners, because authorities there routinely monitor all such communications, Mr. Williams said.

Representatives from China’s ministry in charge of information technology didn’t respond to requests for comment. The country’s foreign ministry has in the past said it is “resolutely opposed” to cyberhacking in any form.

An Intel spokesman declined to identify the companies it briefed before the scheduled Jan. 9 announcement. The company wasn’t able to tell everyone it had planned to, including the U.S. government, because the news was made public earlier than expected, he said.

In the months before the flaws were publicly disclosed, Intel worked on fixes with Alphabet Inc.’s Google unit as well as “key” computer makers and cloud-computing companies, Intel said in an emailed statement to The Wall Street Journal.

An official at the Department of Homeland Security said staffers learned of the chip flaws from the Jan. 3 news reports. The department is often informed of bug discoveries in advance of the public, and it acts as an authoritative source for information on how to address them.

“We certainly would have liked to have been notified of this,” the official said.

The NSA was similarly in the dark, according to Rob Joyce, the White House’s top cybersecurity official. In a message posted Jan. 13 to Twitter, he said the NSA “did not know about these flaws.” A White House spokesman declined to comment further, referring instead to the tweet.

. . . .

The DHS also stumbled with its initial guidance. The agency’s Computer Emergency Response Team first linked to an advisory stating the only way to “fully remove” the flaws was by replacing the chip. CERT now advises users instead to patch their systems.

The DHS should have been looped in early on to help coordinate the flaws’ disclosure, Joyent’s Mr. Cantrill said. “I don’t understand why CERT would not be your first stop,” he said.
Old 01-29-2018, 11:11 AM
  #498  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,344
Received 10,112 Likes on 6,104 Posts
The fact that this flaw requires a bios update means that this flaw will be exploited for years to come. Many PCs won't even get the bios update and you can only download the update by going to the OEM website and downloading a different update for each PC model. The problem won't go away until PCs are replaced with newer models
Old 01-29-2018, 11:25 AM
  #499  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,326
Received 2,043 Likes on 1,132 Posts
Somebody better be going to jail.
Old 01-29-2018, 08:59 PM
  #500  
Race Director
 
nfnsquared's Avatar
 
Join Date: Dec 2003
Location: MAGA country
Posts: 12,474
Received 1,793 Likes on 1,346 Posts
Windows emergency patch: Microsoft's new update kills off Intel's Spectre fix | ZDNet

I haven't experienced (5 different computers), nor have I heard of anyone locally experiencing the random reboots.....
Old 02-05-2018, 03:15 PM
  #501  
Needs more Lemon Pledge
 
stogie1020's Avatar
 
Join Date: Mar 2005
Location: Phoenix, AZ
Age: 51
Posts: 52,768
Received 2,000 Likes on 1,173 Posts
wife's older laptop died after the "critical security update" patch...

no system restore, nothing.
Old 02-19-2018, 09:15 AM
  #502  
Race Director
 
nfnsquared's Avatar
 
Join Date: Dec 2003
Location: MAGA country
Posts: 12,474
Received 1,793 Likes on 1,346 Posts
New Security Exploit Found for Meltdown and Spectre Vulnerability | IT Pro
Old 04-03-2018, 08:28 AM
  #503  
Safety Car
 
Anachostic's Avatar
 
Join Date: Jul 2007
Posts: 4,845
Received 145 Likes on 90 Posts
Panera Bread's entire website is down because they created a PR disaster with security researchers who found an open API that would expose customer data. The juicy part of the saga is their security officer was the security officer for Equifax, just before Equifax's massive security breach. They were notified about the vulnerability 8 months ago and did nothing about it.

https://medium.com/@djhoulihan/no-pa...y-bf078027f815
Old 05-29-2018, 12:43 PM
  #504  
Needs more Lemon Pledge
 
stogie1020's Avatar
 
Join Date: Mar 2005
Location: Phoenix, AZ
Age: 51
Posts: 52,768
Received 2,000 Likes on 1,173 Posts

FBI to all router users: Reboot now to neuter Russia's VPNFilter malware


https://www.zdnet.com/article/fbi-to...ilter-malware/
Old 05-29-2018, 12:44 PM
  #505  
Go Giants
 
Whiskers's Avatar
 
Join Date: Aug 2004
Location: PA
Age: 52
Posts: 69,899
Received 1,231 Likes on 821 Posts
Make me.
Old 05-29-2018, 12:49 PM
  #506  
Needs more Lemon Pledge
 
stogie1020's Avatar
 
Join Date: Mar 2005
Location: Phoenix, AZ
Age: 51
Posts: 52,768
Received 2,000 Likes on 1,173 Posts
Originally Posted by Whiskers
Make me.
Nyet.
Old 05-29-2018, 01:24 PM
  #507  
Safety Car
 
Anachostic's Avatar
 
Join Date: Jul 2007
Posts: 4,845
Received 145 Likes on 90 Posts
I assume this is for the people who are allowed to have their own routers? Verizon, I mean Frontier, controls my router. if it's a big deal, they should reboot it for me.
Old 05-29-2018, 02:27 PM
  #508  
_
 
AZuser's Avatar
 
Join Date: Nov 2006
Posts: 18,692
Received 3,097 Likes on 1,867 Posts
Now the U.S. govt has control of the routers and can monitor its citizens instead of the Russians Attachment 120154

Users with infected routers can remove the dangerous Stage 2 and Stage 3 components of VPNFilter by rebooting the device. However, Stage 1 of VPNFilter will persist after a reboot, potentially allowing the attackers to reinfect the compromised routers.

The web address the FBI seized on Wednesday, ToKnowAll[.]com, could have been used to reinstall Stage 2 and Stage 3 malware, but all traffic to this address is now being directed to a server under the FBI's control.

The FBI nonetheless is urging all small office and home router owners to reboot devices even if they were not made by one of the affected vendors. This will help neuter the threat and help the FBI identify infected devices.

The Justice Department said the FBI-controlled server to which infected devices are now communicating with will collect the IP addresses of each device.
Old 05-29-2018, 07:47 PM
  #509  
Registered but harmless
 
Will Y.'s Avatar
 
Join Date: Aug 2005
Location: Los Angeles, CA
Age: 59
Posts: 14,841
Received 1,102 Likes on 763 Posts
Originally Posted by Anachostic
I assume this is for the people who are allowed to have their own routers? Verizon, I mean Frontier, controls my router. if it's a big deal, they should reboot it for me.
Do you not have the router in your premises?

This advice only applies to certain routers anyway, and mine isn't on the list.
Old 05-30-2018, 06:52 AM
  #510  
Safety Car
 
Anachostic's Avatar
 
Join Date: Jul 2007
Posts: 4,845
Received 145 Likes on 90 Posts
Originally Posted by Will Y.
Do you not have the router in your premises?

This advice only applies to certain routers anyway, and mine isn't on the list.
I probably said that poorly. What I meant was that I have to use my ISP's provided router. I can't buy and install a 3rd-party router. I can log into the thing and set port forwarding or whatever, but that's about all. It's an old Actiontec, so I don't think it's vulnerable.
Old 05-30-2018, 07:58 AM
  #511  
_
 
AZuser's Avatar
 
Join Date: Nov 2006
Posts: 18,692
Received 3,097 Likes on 1,867 Posts
Originally Posted by Anachostic
I probably said that poorly. What I meant was that I have to use my ISP's provided router. I can't buy and install a 3rd-party router. I can log into the thing and set port forwarding or whatever, but that's about all. It's an old Actiontec, so I don't think it's vulnerable.
You should be able to use your own router. If it's not on already, you'll need to have Frontier activate (turn on) the ethernet port on your ONT (Optical Network Terminal) and then just run an ethernet cable from the ONT to your router's WAN port instead of using the Coax.

If you just want to reboot, push the power switch button and unplug power.


Last edited by AZuser; 05-30-2018 at 08:02 AM.
The following users liked this post:
#1 STUNNA (05-31-2018)
Old 05-30-2018, 11:52 AM
  #512  
Safety Car
 
brian2's Avatar
 
Join Date: Oct 2002
Location: NJ
Posts: 3,963
Received 811 Likes on 532 Posts
Originally Posted by AZuser
Now the U.S. govt has control of the routers and can monitor its citizens instead of the Russians
all your base are belong to us
Old 05-30-2018, 12:07 PM
  #513  
Safety Car
 
Anachostic's Avatar
 
Join Date: Jul 2007
Posts: 4,845
Received 145 Likes on 90 Posts
Originally Posted by AZuser
You should be able to use your own router. If it's not on already, you'll need to have Frontier activate (turn on) the ethernet port on your ONT (Optical Network Terminal) and then just run an ethernet cable from the ONT to your router's WAN port instead of using the Coax.

If you just want to reboot, push the power switch button and unplug power.

http://www.youtube.com/watch?v=I3lAX6t_ZsI
I'll review this tonight. I currently have the coax cable running to my router. I was under the impression it was an either/or thing, where I would either have to run cat5 to my cable boxes to use cat5 on my router, or use coax for both my router and cable boxes.

Thanks for the heads-up. Can't wait to have Frontier take my house down for days. The last time I called them - to change my phone number - I lost my grandfathered Verizon plan and my bill went up $50/mo.
Old 05-30-2018, 12:11 PM
  #514  
Safety Car
 
brian2's Avatar
 
Join Date: Oct 2002
Location: NJ
Posts: 3,963
Received 811 Likes on 532 Posts
Originally Posted by Anachostic
I'll review this tonight. I currently have the coax cable running to my router. I was under the impression it was an either/or thing, where I would either have to run cat5 to my cable boxes to use cat5 on my router, or use coax for both my router and cable boxes.

Thanks for the heads-up. Can't wait to have Frontier take my house down for days. The last time I called them - to change my phone number - I lost my grandfathered Verizon plan and my bill went up $50/mo.
https://www.approvedmodems.com/frontier.html
Old 05-30-2018, 12:22 PM
  #515  
Senior Moderator
 
thoiboi's Avatar
 
Join Date: Apr 2010
Location: SoCal, CA
Posts: 46,857
Received 8,568 Likes on 6,621 Posts
well i do have that TP Link router time to reboot I guess! Gonna ruin my 140 day uptime
Old 05-30-2018, 12:26 PM
  #516  
Moderator
iTrader: (1)
 
justnspace's Avatar
 
Join Date: Feb 2010
Posts: 86,295
Received 16,260 Likes on 11,971 Posts
rebooted mine over the weekend. Dont know if my asus is on the list, but did it anyway.
accidentally changed one character of the SSID and then couldnt log into a device that throws it's own wifi...until i changed the SSID back to the original.
networking is still troublesome! at least we came along way from win95 and manually configuring.
Old 05-30-2018, 02:55 PM
  #517  
Safety Car
 
Anachostic's Avatar
 
Join Date: Jul 2007
Posts: 4,845
Received 145 Likes on 90 Posts
Originally Posted by brian2
I don't think I pay rent for my router.

Old 05-30-2018, 03:10 PM
  #518  
_
 
AZuser's Avatar
 
Join Date: Nov 2006
Posts: 18,692
Received 3,097 Likes on 1,867 Posts
If you're on the 2 year contract with bundled tv and internet, you get the modem/router for free during that 2 yr term.
The following users liked this post:
Anachostic (05-30-2018)
Old 05-30-2018, 08:54 PM
  #519  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,326
Received 2,043 Likes on 1,132 Posts
Old 05-31-2018, 12:43 AM
  #520  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,344
Received 10,112 Likes on 6,104 Posts
Originally Posted by Anachostic
I'll review this tonight. I currently have the coax cable running to my router. I was under the impression it was an either/or thing, where I would either have to run cat5 to my cable boxes to use cat5 on my router, or use coax for both my router and cable boxes.

Thanks for the heads-up. Can't wait to have Frontier take my house down for days. The last time I called them - to change my phone number - I lost my grandfathered Verizon plan and my bill went up $50/mo.
You'll have to call them to have them switch over from coax to Cat 5, it might require an onsite visit. FYI it's normal for there to be some gunky gel in the CAT 5 port on the ONT, it's to weatherproof the port.

Quick Reply: The Official Internet/Computer Security News Discussion Thread



All times are GMT -5. The time now is 06:14 PM.