ISPadmin 4.21

Clients

  • You can now add a note to an IPTV service.

  • HU localization: Wrong prices for Internet services were displayed in the Client card, in Clients Internet and in the tariff settings when a special VAT rate for Internet services was used. The bug is fixed now.

  • The form used for adding a new General service to the system has been fixed. Before the fix, it was not possible to enter a price in the form of a decimal number.

  • When a credit note is issued, the system, by default, confirms it immediately (the Confirm credit note now checkbox). The note is thus immediately included in the various accounting overviews in the system.

 

ADMINISTRATOR RIGHTS

  • New rights to Settings have been implemented. Previously, the rights were set for MasterAdmin, and for Main admin in some cases. Currently, the rights are automatically set for MasterAdmin only, and you have to set up the rest manually.

 

Modified script

When running
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl
with check, checkdevices, checkusers, or cleaninfected parameter, a dialog will be displayed, and you will be able to specify the following parameters:

IP addresses (all) ? : You may insert a list of IP addresses to be scanned by typing them. If you leave it blank, the script will use IP addresses from the database.
SSH PORT (22) ? : Default port for ssh is 22. If your ssh is somewhere else, enter ssh port number here.
SSH usernames for connect ( ubnt, admin, mother) ? : Usernames used for accessing the units. If blank, the script will try to use ubnt, admin, mother.
DEBUG (yes) ? : If you select yes, the progress of the test will be displayed in the console.

 

Help


Check  devices from ISP admin bookmark ROUTERS
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl check             - show ONLY vulnerable and infected ROUTERS ( AP )

Check devices like AP ....( may take a long time )
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl checkdevices      - show ONLY vulnerable and infected devices ( Acces points )

Check  END USER devices ....( may take along time )
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl checkusers        - show ONLY vulnerable and infected client end device

Clean INFECTED devices ( from previous check )
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl cleaninfected     - show vulnerable and infected devices and  REMOVE infection

 

More on Ubiquiti - security bug in changelog version 4.21, beta1.

 

Detecting and removing

router ubnt
Reacting to the revealed vulnerability, we released ISPadmin, version 4.20, which included a utility for detecting and curing infected Ubiquiti units. Due to the emergency situation we released the very first version of the utility quickly.

Now we are presenting the utility with enhanced functionalities.

alert icon Run the utility from ISPadmin console (connected via SSH) under root user, ISPadmin does not detect anything automatically!

/usr/local/script/ispadmin/ubnt_vulnerability_test.pl

 

When running the utility without any parameter, help is displayed.

terminal help

 

Check devices from ISP admin bookmark ROUTERS
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl check <username> <username2> <username3> <username4> <username5> - show ONLY vulnerable and infected ROUTERS ( AP )


Tests all Ubiquiti units inserted in Hardware Routers. If you run this command, the system tries to attack the unit, and if it succeeds, the console displays information with IP address and firmware version. If the system succeeds in connecting to Ubiquiti unit, it tries to determine whether there is the virus or not. If yes, it displays such information in the console. Nothing else. When 10 units are tested, a dot appears on the screen to show you that the script is still running and testing other units.


Check devices like AP ....( may take a long time )
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl checkdevices <username> <username2> <username3> <username4> <username5>
  - show ONLY vulnerable and infected devices ( Acces points )


Tests all devices inserted as “Device attached to device” in Hardware Routers. In this case, the utility doesn´t care about device type since such information might not be available here. The utility tries to attack all IP addresses. If there are a lot of devices in your system, this might take a long time.

Check END USER devices ....( may take a long time )
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl checkusers <username> <username2> <username3> <username4> <username5>
    - show ONLY vulnerable and infected client end device


Tests all IP addresses assigned to clients. The system tests all client-assigned IP addresses for it does not know whether a client has Ubiquiti device, or not. This operation might take a long time, since all IP addresses in the system are tested.

Clean INFECTED devices ( from previous check )
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl cleaninfected
   - show vulnerable and infected devices and  REMOVE infection


If an infected unit is detected in the previous step, you may clean it this way. This operation connects to and cleans just those units, which are marked as infected. It means that prior to this step you have to run the utility with parameters check, checkdevices, or checkusers. Failing this no units are marked as infected and using parameter “cleaninfected” makes no difference.

 

terminal

A mandatory parameters are: check, checkdevices, checkusers, or cleaninfected. You may use user names, which you use for login to Ubiquiti units as an optional parameter. This is needed in cases when a key is stored in Ubiquiti unit after being attacked to enable login via ssh without password. You need to know the user name with which you connect to the system. If unknown, you won´t be able to connect. While running the vulnerability test, a default user name ubnt and user admin are tested. If you use neither of these, the script won´t be able to test vulnerability hence the need for entering a different username used for accessing the unit (no need for password). Then the system will try using these usernames.

 

Listing of UBNT units in ISPadmin

When you log into ISPadmin, you will see information about Vulnerability of UBNT devices:

ubnt upozorneni

 

In Other Tools > Vulnerability of UBNT devices, you will find a tool for displaying vulnerable devices as detected by the utility - see above.

ubnt seznam

 

alert icon Check the box at the end of each row (or check all, or you may use reversed selection) to select those devices, for which you want the system to update firmware - by clicking on on the bottom.

UBIQUITI BUG - MODIFICATION

Modified script

When running
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl
with check, checkdevices, checkusers, or cleaninfected parameter, a dialog will be displayed, and you will be able to specify the following parameters:

IP addresses (all) ? : You may insert a list of IP addresses to be scanned by typing them. If you leave it blank, the script will use IP addresses from the database.
SSH PORT (22) ? : Default port for ssh is 22. If your ssh is somewhere else, enter ssh port number here.
SSH usernames for connect ( ubnt, admin, mother) ? : Usernames used for accessing the units. If blank, the script will try to use ubnt, admin, mother.
DEBUG (yes) ? : If you select yes, the progress of the test will be displayed in the console.

 

Help


Check  devices from ISP admin bookmark ROUTERS
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl check             - show ONLY vulnerable and infected ROUTERS ( AP )

Check devices like AP ....( may take a long time )
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl checkdevices      - show ONLY vulnerable and infected devices ( Acces points )

Check  END USER devices ....( may take along time )
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl checkusers        - show ONLY vulnerable and infected client end device

Clean INFECTED devices ( from previous check )
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl cleaninfected     - show vulnerable and infected devices and  REMOVE infection

 

More on Ubiquiti - security bug in changelog version 4.21, beta1.

 

UBIQUITI BUG

Detecting and removing

router ubnt
Reacting to the revealed vulnerability, we released ISPadmin, version 4.20, which included a utility for detecting and curing infected Ubiquiti units. Due to the emergency situation we released the very first version of the utility quickly.

Now we are presenting the utility with enhanced functionalities.

alert icon Run the utility from ISPadmin console (connected via SSH) under root user, ISPadmin does not detect anything automatically!

/usr/local/script/ispadmin/ubnt_vulnerability_test.pl

 

When running the utility without any parameter, help is displayed.

terminal help

 

Check devices from ISP admin bookmark ROUTERS
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl check <username> <username2> <username3> <username4> <username5> - show ONLY vulnerable and infected ROUTERS ( AP )


Tests all Ubiquiti units inserted in Hardware Routers. If you run this command, the system tries to attack the unit, and if it succeeds, the console displays information with IP address and firmware version. If the system succeeds in connecting to Ubiquiti unit, it tries to determine whether there is the virus or not. If yes, it displays such information in the console. Nothing else. When 10 units are tested, a dot appears on the screen to show you that the script is still running and testing other units.


Check devices like AP ....( may take a long time )
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl checkdevices <username> <username2> <username3> <username4> <username5>
  - show ONLY vulnerable and infected devices ( Acces points )


Tests all devices inserted as “Device attached to device” in Hardware Routers. In this case, the utility doesn´t care about device type since such information might not be available here. The utility tries to attack all IP addresses. If there are a lot of devices in your system, this might take a long time.

Check END USER devices ....( may take a long time )
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl checkusers <username> <username2> <username3> <username4> <username5>
    - show ONLY vulnerable and infected client end device


Tests all IP addresses assigned to clients. The system tests all client-assigned IP addresses for it does not know whether a client has Ubiquiti device, or not. This operation might take a long time, since all IP addresses in the system are tested.

Clean INFECTED devices ( from previous check )
/usr/local/script/ispadmin/ubnt_vulnerability_test.pl cleaninfected
   - show vulnerable and infected devices and  REMOVE infection


If an infected unit is detected in the previous step, you may clean it this way. This operation connects to and cleans just those units, which are marked as infected. It means that prior to this step you have to run the utility with parameters check, checkdevices, or checkusers. Failing this no units are marked as infected and using parameter “cleaninfected” makes no difference.

 

terminal

A mandatory parameters are: check, checkdevices, checkusers, or cleaninfected. You may use user names, which you use for login to Ubiquiti units as an optional parameter. This is needed in cases when a key is stored in Ubiquiti unit after being attacked to enable login via ssh without password. You need to know the user name with which you connect to the system. If unknown, you won´t be able to connect. While running the vulnerability test, a default user name ubnt and user admin are tested. If you use neither of these, the script won´t be able to test vulnerability hence the need for entering a different username used for accessing the unit (no need for password). Then the system will try using these usernames.

 

Listing of UBNT units in ISPadmin

When you log into ISPadmin, you will see information about Vulnerability of UBNT devices:

ubnt upozorneni

 

In Other Tools > Vulnerability of UBNT devices, you will find a tool for displaying vulnerable devices as detected by the utility - see above.

ubnt seznam

 

alert icon Check the box at the end of each row (or check all, or you may use reversed selection) to select those devices, for which you want the system to update firmware - by clicking on on the bottom.


NEWS

  •  A new filter Client group has been added to Invoicing Overviews Payments. You can use it for payment type Paired only.
  • New system variables added:
            - $CLI_RAW_NAME$ - the variable is replaced with client´s name from “Personal data” section.
            - $CLI_NAME_INVOICING$ - the variable is replaced with client´s name from “Invoicing data” section.
  • Bookmarks Clients VoIP and Clients General have been amended with the following filters: “Invoice group”, “Client group”, “Client status”, and “Client payment type”.
  • In scheduling overview - Scheduling Overview, and Client card / Scheduled interventions - an icon for editing the intervention is now displayed. This way you can edit any saved solution, even for completed tasks. One has to have “Edit” right for a given bookmark.
  • Newly, you can turn off information about aggregation for Client portal. To do it, change ID ci_display_tariff_agregation in Settings Syst. settings Client portal.
  • You can now make a copy of a tariff in Settings Tariffs Internet. There is an icon for it - - at the end of each row.
  • When saving a client information, a new duplicity check on Company ID and personal ID is carried out. If a match is found, you´ll get information message. You will be able to save the record, anyway.
  • You can now use http://ISPadmindomain.cz/new/www/find-client-by-phone-number/?number=420999888777 to get Client card of a client with the number used in “number” parameter. ISPadmin administrator must be logged in.
  • You can now filter clients by Client groups if matched payments filter is used in Invoicing Overviews Payments.
  • Information on Ram Disk (initialization, error messages, disk space) are now displayed in Statistics Server statistics Graphs.
  • You can now define your own report type in Settings Code lists Scheduling Report type.

 

REWRITTEN PAGES

  • Other Tools
  • Settings Administrators Mikrotik Login Group / Users

 

WIthdrawals

  • New filters “Submission date”, “Invoice group” and “Locality” have been added to Statistics Client stat. Withdrawals, and to Client card / Withdrawals. Columns with address, creation user and date, and time to withdrawal have been added. You can also add any number of notes to each withdrawal. There is the icon for it at the end of each row - . There are columns Last note date and Notes in the tab, too.

ADMINISTRATOR RIGHTS

  • New rights to Settings have been implemented. Previously, the rights were set for MasterAdmin, and for Main admin in some cases. Currently, the rights are automatically set for MasterAdmin only, and you have to set up the rest manually.

 

NEWS

  •  A new filter Client group has been added to Invoicing Overviews Payments. You can use it for payment type Paired only.
  • New system variables added:
            - $CLI_RAW_NAME$ - the variable is replaced with client´s name from “Personal data” section.
            - $CLI_NAME_INVOICING$ - the variable is replaced with client´s name from “Invoicing data” section.
  • Bookmarks Clients VoIP and Clients General have been amended with the following filters: “Invoice group”, “Client group”, “Client status”, and “Client payment type”.
  • In scheduling overview - Scheduling Overview, and Client card / Scheduled interventions - an icon for editing the intervention is now displayed. This way you can edit any saved solution, even for completed tasks. One has to have “Edit” right for a given bookmark.
  • Newly, you can turn off information about aggregation for Client portal. To do it, change ID ci_display_tariff_agregation in Settings Syst. settings Client portal.
  • You can now make a copy of a tariff in Settings Tariffs Internet. There is an icon for it - - at the end of each row.
  • When saving a client information, a new duplicity check on Company ID and personal ID is carried out. If a match is found, you´ll get information message. You will be able to save the record, anyway.
  • You can now use http://ISPadmindomain.cz/new/www/find-client-by-phone-number/?number=420999888777 to get Client card of a client with the number used in “number” parameter. ISPadmin administrator must be logged in.
  • You can now filter clients by Client groups if matched payments filter is used in Invoicing Overviews Payments.
  • Information on Ram Disk (initialization, error messages, disk space) are now displayed in Statistics Server statistics Graphs.
  • You can now define your own report type in Settings Code lists Scheduling Report type.

 

REWRITTEN PAGES

  • Other Tools
  • Settings Administrators Mikrotik Login Group / Users

 

WIthdrawals

  • New filters “Submission date”, “Invoice group” and “Locality” have been added to Statistics Client stat. Withdrawals, and to Client card / Withdrawals. Columns with address, creation user and date, and time to withdrawal have been added. You can also add any number of notes to each withdrawal. There is the icon for it at the end of each row - . There are columns Last note date and Notes in the tab, too.

CONTACT

NET service solution, s.r.o.
Žerotínova 3056/81a
787 01 Šumperk
Czech Republic