Home > Uncategorized > BGP / MPLS Routers on Infinity TR069 Network

BGP / MPLS Routers on Infinity TR069 Network

Following on from the previous post, the extra VLAN provided to each customers CPE can be bridged through to the secondary ethernet port, allowing any computer to receive an IP address on the management network via DHCP.

Obviously I wanted to know how far-reaching this network goes that is getting pushed into every customers premises.

First thing first, the access subnet only allows communication between your CPE and the subnet gateway, which is a lot better than seeing a sea of other CPE’s from a security standpoint.

TR069 Server

So the CPE doesnt seem to have a TR069 URL and there is no extra information in the DHCP lease, so I haven’t looked for/at the TR069 server.
However, available details from the CPE device are;

ACS URL: Blank
ACS USER: hgw
ACS PW: ❤ chars>
CONNECTION REQUEST USER: acs
CONNECTION REQUEST PASS: ❤ chars>
CERT ENABLE: no
PERIODIC INFORM: no

DNS Servers

I was given two DNS servers;

10.160.170.231
10.160.170.232

These look to be running a stable, well patched version of Bind but I didn’t probe any deeper as this is journey is for understanding the infrastructure ONLY, not for causing issues or poor technicians any extra work!

Routes

On the way to our DNS servers we pass a couple of hops;

[root@box ~]# tracepath 10.160.170.232
 1:  30.4x.x.me                                           0.119ms pmtu 1500
 1:  30.4x.x.x                                             5.924ms asymm  2
 2:  10.160.160.65                                        13.684ms asymm  3
 3:  no reply
 4:  no reply

[root@box ~]# tracepath 10.160.170.231
 1:  30.4x.x.me                                           0.107ms pmtu 1500
 1:  30.4x.x.x                                             5.954ms asymm  2
 2:  10.160.160.65                                        13.699ms asymm  3
 3:  no reply
 4:  no reply

This got me thinking, what else is on 10.160.170.231; Nothing.
Further thinking, 10.160.160.x, 10.160.170.x, followed the pattern, some 10.160.x.0/24 subnets come back as routable, while some give dest net unreachable.
Creating a list of routable nets starting 10.160.x.0/24 seemed wise;

[root@box ~]# for i in $(seq 1 254) ; do ping -t 1 -c 1 10.160.$i.1 | grep -B 1 “Destination Net Unreachable” ; done | grep PING | sort | uniq | awk -F “.” ‘{print $3}’ | sort -n > notvalid.txt
[root@box ~]# seq 1 255 > all.txt
[root@box ~]# diff notvalid.txt all.txt | grep “>” | cut -c 3-6

In this CLI mess above, we are finding a list of 10.160.x subnets that Don’t have a route (Destination Net Unreachable). and inverting it to give us a list of valid nets.

BGP / MPLS Devices

So what’s on the routable subnets? Looks like BGP/MPLS routers, as SSH, BGP and LDP (Label distribution protocol) services are available;

Host is up (0.014s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
179/tcp open  bgp
646/tcp open  ldp

10.160.128.67
Host is up (0.012s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
179/tcp open  bgp
646/tcp open  ldp

10.160.160.66
Host is up (0.011s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
179/tcp open  bgp
646/tcp open  ldp

This is my stop

If this were my network, my next thoughts would be;

– BGP requires configuration on both sides to bring up a peer but LDP doesn’t have any such security and allows directed creation of sessions even on different IP subnets.
– a successful LDP session may give information as to surrounding routers and networks.
– SSH could have weak passwords

But, this ISN’T my network and as this was merely a quick look into the VLAN’s presented in the premises, I’m not going to risk (for legal and ethical reasons) bringing up an LDP session or trying the SSH connection.

Hopefully someone BT-related could fill in this picture with what we are looking at here?
Anyway, wasn’t expecting open BGP/LDP ports a hop away from any users CPE!

 

  1. Tom
    July 17, 2012 at 11:13 pm

    I / We just came across this IP range (seems to be allocated to the DoD in the USA?) assigned to the VDSL modem on a BT FTTC service and after a lot of googling, found your page.
    Interesting stuff.. If I locate any information – I will be in touch.

    In the mean time this is what alerted us to the strange IP – might point you in the right direction of other hosts and their function on the vlan:

    2012-7-16 4:46:4 Alert 10400 Intrusion -> IN=ptm1.301 OUT= MAC=10:c6:1f:XX:XX:XX:00:14:f6:XX:XX:XX:08:00:45:XX:XX:XX SRC=10.160.168.138 DST=30.119.X.X LEN=52 TOS=0x00 PREC=0x00 TTL=61 ID=34466 DF PROTO=TCP SPT=33104 DPT=161 WINDOW=5840 RES=0x00 SYN URGP=0
    2012-7-16 4:46:4 Alert 10400 Intrusion -> IN=ptm1.301 OUT= MAC=10:c6:1f:XX:XX:XX:00:14:f6:XX:XX:XX:08:00:45:XX:XX:XX SRC=10.160.168.137 DST=30.119.X.X LEN=52 TOS=0x00 PREC=0x00 TTL=61 ID=18164 DF PROTO=TCP SPT=51044 DPT=161 WINDOW=5840 RES=0x00 SYN URGP=0

    • July 18, 2012 at 8:58 pm

      Thanks for the extra information, see my latest post regarding any worries about the DoD whois registration.
      As for the logs, this looks like 10.160.168.138 and 10.160.168.137 are machines querying your CPE device via SNMP.
      This would be fine (and standard for network devices) to gather stats on anything from network interface errors to device temperature and CPU load.
      I wouldn’t worry about these too much in your logs, although it does give another subnet for investigation.

  1. No trackbacks yet.

Leave a comment