logoalt Hacker News

nunez12/09/20242 repliesview on HN

Routers supplied by AT&T here in the US for their fiber gigabit service do RADIUS authentication with the carrier gateway using certs built into the device. There used to be an older version of this router that had known vulnerabilities which made extracting those certs possible but they've since been patched and those certs have been invalidated.


Replies

surfaceofthesun12/09/2024

Note that you can still downgrade an existing gateway, extract certs[0], then bypass the device [1]. I had to do this with OPNsense to avoid the latency buildup issue, which has been ongoing for months[2].

---

0 -- https://www.dupuis.xyz/bgw210-700-root-and-certs/

1 -- https://github.com/MonkWho/pfatt

2 -- https://www.reddit.com/r/ATTFiber/comments/1eqfouo/psa_att_n...

eightysixfour12/09/2024

I believe you can set those to pass through mode and put a router/firewLl behind it without any kind of double NAT. Other than some kind of MITM, you have at least minimized the likelihood of someone using it as an entry point to your network.