xentr_theme_editor

  • Please do not post any links until you have 3 posts as they will automatically be rejected to prevent SPAM. Many words are also blocked due to being used in SPAM Messages. Thanks!

Rants etc.....

If I wasn't already switching to Bell at the end of the month I'd probably be doing so now.... third robocall from them WRT the router UPNP security exploit... I've got the latest firmware, UPNP is turned off, and have tested using GRC which reports back that it's not seeing any vulnerabilities. I even went so far today as to run the GRC test on every PC in the home on the off chance that there was a nasty hiding on one of them which was effectively doing the same thing outside of the router. Nothing....

Called them today hoping to be able to resolve the issue (more for them than for me since I'm moving on at the end of the month), but they don't have the capability from their end to test for this real time??? Their only solution would be for me to get rid of my current router in spite of the negative responses to testing from my end.

I wasn't moving on with any kinds of bad feelings (more related to the state of rogers' current infrastructure down here), but their lack of ability to troubleshoot what appears to be a false positive real time has got me kinda irked.

I briefly worked for rogers earlier in the year, this exact thing was what made me quit and work elsewhere. They have one guy who runs scans on systems on the rogers networks and cuts them off for what they deem to be malicious software.(EULA violations) They insist that all machines be serviced by them (only 4 systems per sub, min payment of 149.99$ for a single incident, then 15$ a month to service the other 3 machines) before turning it back on.

Their solution - pay for their "techxpert" services or take it into a shop and have them look at it. It seemed to happen the most in areas where people had little to no choice for an alternative. I have even seen it happen to people without any PC's in the home. The reason they "cant test it" is because they have set it up so that their T1 agents cant do literally anything but troubleshoot basic connectivity. If you want anything further you have to pay for it.

How they are able to get away with this is beyond me.
 
xentr_thread_starter
I briefly worked for rogers earlier in the year, this exact thing was what made me quit and work elsewhere. They have one guy who runs scans on systems on the rogers networks and cuts them off for what they deem to be malicious software.(EULA violations) They insist that all machines be serviced by them (only 4 systems per sub, min payment of 149.99$ for a single incident, then 15$ a month to service the other 3 machines) before turning it back on.

Their solution - pay for their "techxpert" services or take it into a shop and have them look at it. It seemed to happen the most in areas where people had little to no choice for an alternative. I have even seen it happen to people without any PC's in the home. The reason they "cant test it" is because they have set it up so that their T1 agents cant do literally anything but troubleshoot basic connectivity. If you want anything further you have to pay for it.

How they are able to get away with this is beyond me.

I did 11 months on the internet tech support phone lines for them when I first retired from the military so I've got a pretty good idea what's going on, but they've apparently sub-contracted out their security division/testing since I last worked there.

Callers used to be connected directly through to this section whenever there was a concern about either a virus or possible exploit threat but now it appears you just get to talk to the tier 2 folks who either don't have the tools to properly diagnose the issue, or (and this is what I believe is most likely) don't have the desire to take the time to use those tools.

This is a pretty simple issue... either something on my network is responding to external SSDP requests or it isn't. My testing suggests that it isn't, but I'd be open to an explanation as to why my testing isn't sufficient. No such explanation was offered.
 
Give em 150$ and im betting you would get an "explanation " lol. And their gateways are shit at best, and of course they do little to nothing to help when those go to hell.

They have pretty much stripped all power from the T1 and T2 agents in lieu of paid support. They will do anything and everything to pass the buck and get someone to pay. And even when you do pay for their support, they will do everything in their power to say something isn't in their scope of support and direct you to the OEM.
 
xentr_thread_starter
Give em 150$ and im betting you would get an "explanation " lol. And their gateways are shit at best, and of course they do little to nothing to help when those go to hell.

They have pretty much stripped all power from the T1 and T2 agents in lieu of paid support. They will do anything and everything to pass the buck and get someone to pay. And even when you do pay for their support, they will do everything in their power to say something isn't in their scope of support and direct you to the OEM.

Heh... well they never attempted to offer me paid support. Maybe the fact I called armed with my own testing results saved me from that.

OTOH, I can see requiring paid support for something like software virus/malware. Just not for something hardware related.

It really does make me wonder if they're scanning for actual responses or if they're just seeing the mac address and reporting it based on the model of the router?

I wonder if a mac addy clone would resolve the issue?
 
xentr_thread_starter
Dlink router by any chance?

Yep, and there's no denying that it may have been guilty of the exploit prior to flashing the firmware and/or turning off UPNP, but all of the testing I've done from my end have come up negative. That's why I'm starting to wonder if they aren't just doing a mac addy scan and reporting a possible exploit on that.

That said, it could very well be that there's something going on that I don't have the ability to test for, but I didn't receive any kind of explanation on that which I could then take to d-link and ask for some kind of resolution.
 
Nope, they just flag dlink routers and keep at it until you swap out to one of their gateways. Surprised they haven't cut you off yet tbh.
 
xentr_thread_starter
Nope, they just flag dlink routers and keep at it until you swap out to one of their gateways. Surprised they haven't cut you off yet tbh.

Sounds like the bad old days when we weren't allowed to use third party routers which (IMO) is why we ended up with the ability to clone mac addys. :)

Maybe they haven't cut me off because they keep seeing the previous call log(s) where I've offered to do whatever they need from my end (short of using their crap gateway that I've got in bridge mode) to attempt to resolve the issue.

It says something to me that D-Link has a specific reference to Rogers and Cogeco on their troubleshooting page WRT this issue. If I had the time I'd be inclined to clone the mac addy of my PC to the router and see if the harassment goes away.

Either way it's moot..... next friday I'll be turning in my hardware. (Gotta love the fact that notice is no longer required for cancelling service.... ;) ).
 

Latest posts

Back
Top