$540 via promo credit when you add a new smartphone line with your own 4G/5G smartphone on postpaid Unlimited Plus plan between 5/18/23 - 5/31/23 & port-in req'd. Promo credit applied over 36 months; promo credits end if eligibility requirements are no longer met.
Hard to say.
But this is a Linux bug. Not sure how that affects the router.
Most home routers are based on the Linux kernel (certainly the Actiontecs are) and usually use a lot of the GNU infrastructure, too. The real question is are they using glibc or something else like uclibc.
It may be possible to filter using iptable rules according to the announcement:
Mitigating factors for UDP include:
- A firewall that drops UDP DNS packets > 512 bytes.
Mitigating factors for TCP include:
- Limit all replies to 1024 bytes.
This should catch any serious stack overflowing cracking attempts. If would good for Verizon to tell their customers how to implement such rules. Of course, they could add such rules to their customer-facing routers as an alternative, I expect, but they should tell us if they are.
The problem with those suggested mitigations is that they're essentially requiring the user to avoid any DNS resolvers that provide responses using the Extension Mechanisms for DNS, which translates to pretty much any of those that are useful for zones protected with DNSsec signatures.
It may be moot for many FiOS users, as it appears that VZ's name servers don't properly handle large replies right now anyway. You can see for yourself if you check them with OARC's DNS Reply Size Test Server.
So basically the user's choice is to either use resolvers that allow zones to be spoofed or to use resolvers that might send an answer that overflows a buffer.
Dang. Well, maybe Verizon will chime in here. Thank you, Cherokee commander.
Verizon will never chime in.
I was given the number for expert service to inquire if glibc is deployed, but I'm not certain it's worth the time.