cooloutac
Very Senior Member
In 1999 tomato and dd-wrt were actually active. People wrote defensive programs. They didn't throw their hands up quoting threat models and deem layers of security as too trivial to bother with. Or consider them too boring or less lucrative to work on.No. The gui is just an IP whitelist with no concepts of interfaces. Doing it with ebtables is a bit more precise since you can specify the interface you want to block.
Also, what’s with the constant ranting about consumer grade embedded devices sucking at security? It wasn’t much better in 1999.
What’s your threat model and what are you protecting against?
Using the word threat model makes me cringe, because its whats wrong with the security industry. There is no such thing. Its a phrase companies use to justify cost savings. For a consumer, ALL actors are in your threat model. For what we are talking about costs and usability are not affected.
And maybe I am misunderstanding that command. Still seems you are specifying ip address. And how do I enter that command? telnet? ssh? I don' want those enabled at all. Thats a whole other potential problem. and fyi I would also block the 8443 https port.