My thoughts exactly .... if a company's response to a problem with their equipment is to instead of fixing the problem but to ask you to replace it with a new model
I would go buy something new ... it just wouldn't be with the same company
This would be a great opportunity for a rival company to take advantage of this.
It would. They could over a discount with the turn in of a d-link device and roll in some nonsense about reducing e-waste. They will probably get a nice little sales boost and tax breaks while helping the decline of a competitor.
oh, these are all four years past their EOL. Yeesh.
Yeah, at a certain point it's the consumer's (and blog writer's) fault, and that's after EoL. Not patching a supported one and just getting rid of support, saying buy a newer one? Yeah, that's bad.
Continuing to not support an EoL model that you already don't support due to EoL (or even dropping support for an EoL model that no one expected you to support in the first place due to EoL)? Non-issue.
I was going to disagree, because manufacturers often set a very short and arbitrary EOL, but looking at the amazon price history this doesn't seem to have been sold new since around 2013.
Continuing to not support an EoL model that you already don’t support due to EoL (or even dropping support for an EoL model that no one expected you to support in the first place due to EoL)? Non-issue.
Dropping support should mean opening the source. I think there's a movement about that.
At what point is that acceptable? Attacks like this were well known when this was new so shouldn't they fix it? 12 year old cars have been recalled before, but there are a lot of cars without the latest safety fixes. We need aeserious debate over when it is accebtable to call something that works scrap because it isn't supported. there are costs to the environment and society around this so even though I don't own one of these devices I'm affected but it.
Any vendor is going to reach a point where they no longer are willing to support older devices. So you have three choices:
Run with the vulnerability. This is incredibly stupid and I'd hope no one did this.
Replace the OS on any such device with something open source. Probably the best option for those who already own such a device.
Never buy a proprietary device in the first place. Unless you really, really need something the propriety device offers, a beige box running some flavor of 'nix is probably a better long term solution.
Ok, I guess there is a fourth option. Learn to enjoy that vendor bending you over every few years. This is what many businesses do and it can make sense. You just need to have lots of money.
If you’re using one of these models, it’s highly recommended that you replace your NAS system with one that’s still receiving patches from the manufacturer. If that isn’t possible right now, Netsecfish suggests restricting access to your NAS settings menu/interface to only trusted IP addresses. You could also isolate your NAS from the public internet to ensure that only authorized users can interact with it.
Emphasis mine, regardless of this incident, even with a brand new supported model, it shouldn't be exposed to the internet. Half the reason these security issues are such a big deal is because manufacturers wanted to make things simple and designed it to sit on the open internet, so they wouldn't have to deal with support requests. Now their customers are exposed because of poor recommendations and the lack of updates.
I do SMB support. I recently replaced one at a customer , essentially because it didn’t support larger disks. Also because it was slow as fuck. replacing a 10 year plus device doesn’t seem that unreasonable.
I can't blame them. I think relying on the manufacturer for updates means that you are expecting them to spend money on you. That works for a while but not indefinitely