Broadband-Hamnet™ Forum
Welcome Guest   [Register]  [Login]
«StartPrev241242243244245246247248249250NextEnd»
 Subject :Re:Re:What, if anything, keeps the bad guys out?.. 2014-03-18- 10:15:55 
KG6JEI
Member
Joined: 2013-12-02- 19:52:05
Posts: 516
Location
Forum : General
Topic : What, if anything, keeps the bad guys out?

Well, that is always an option. 

I tend to prefer to find balance, a method that allows an acceptable level of risk to reward.

No computer based system will ever be 100% secure, the only way to do that is as you mention to unplug.  One does need to understand the risks involved to judge for themselves the risk/reward.

The point to be made though is a BBHN network is much more complex in a computer security nature than most other protocols are.  The next closest protocol is Packet with an IP stack but that never really took off so much of the ham radio security side was never developed, after that Packet with a BBS(Winlink over  falls into this category as well)   Much less flexible, limited risk vectors compared to WIFI.




[KH2SR 2014-03-18- 09:06:17]:

Well I guess everyone should just turn off all our computers, lock them in the shed, and huddle in fear in a cave someplace then.

IP Logged
Note: Most posts submitted from iPhone
 Subject :Re:What, if anything, keeps the bad guys out?.. 2014-03-18- 09:06:17 
KH2SR
Member
Joined: 2014-02-20- 03:44:15
Posts: 37
Location: Saratoga, CA
Forum : General
Topic : What, if anything, keeps the bad guys out?

Well I guess everyone should just turn off all our computers, lock them in the shed, and huddle in fear in a cave someplace then.
IP Logged
 Subject :Re:What, if anything, keeps the bad guys out?.. 2014-03-18- 08:38:41 
KG6JEI
Member
Joined: 2013-12-02- 19:52:05
Posts: 516
Location
Forum : General
Topic : What, if anything, keeps the bad guys out?

"1. Few hams even know this technology exists let alone non hams."

I would be less worried about the hams,  worry about the 13-16 year old down the block who enjoys a computer networking challenge (I've been there, done that myself -- I was almost running the networks for the local school district back when I was a student (Elementary through High School) as I was often the go-to student who could point out the issue.

Also with beacons up to 10x a second with the default SSID your not exactly hidden either.


"2. The use of directional antennas that are horizontally polarized greatly reduces how many people are even in range of a node."


That is not really security, but yes it will reduce the number of people whom can directly get to a node, however all you need to do is get to ANY node and your on the entire network and maybe make it more likely that your actions will be seen.


"3. Nodes do have custom passwords for changing the settings so at least control of the node is protected."

This is true, so long as you don't log in over WIFI (no encryption)  it protects the node from being taken over until the password is found (brute force attack -- nothing is built in to lock users out on repeat incorrect passwords.) Worse yet, once the GUI password is found it is also the ROOT password for the node itself letting an attacker install anything they want.


"4. Each node lists all nodes it is connected to or has been connected to. This list contains call signs. A quick search online will tell you if the callsign is real or not. If not then alert your local ham clubs that you need help tracking down someone who is illegally operating."

So you know you have a bad egg but you can't do anything to stop them. IF its a bogus callsign you still have to track them down,  this wont be easy or fun.  Point 2 comes back to haunt you now,  now you have to be IN THE PATH of the signal,  you can get a good idea of where it is with some highly directional antennas but than you still have to get there and get close (as you will be relying on non beam path signal to guide you)  The node in question would also need to still be online while searching.

"5. Various devices that you would connect to a node such as a computer, regular wifi hotspot, file servers, webcams, and other devices have their own configuration software that typically allows the use of a password to protect access to that device."

Well that will keep them off the device (again pay attention to passwords, if your in an area that allows encryption than they are fairly safe, if no encryption is allowed than the passwords may be sent every time you log into the device) 

We are talking about computers which are known for security vulnerabilities however no matter what so we can't guarantee this will stop an attacker.   Even if it does, you still have the issue of all other nodes helping in distributing traffic.


Background:

My day job has me titled as a Sr. Systems Enginer -- I deal with consulting on and deploying security solutions from the desktop up to the infrastructure layer

IP Logged
Note: Most posts submitted from iPhone
 Subject :setup question.. 2014-03-18- 08:20:25 
kc8zpi
Member
Joined: 2013-11-25- 18:05:55
Posts: 4
Location
Forum : Applications
Topic : setup question

I have a setup question for the community.  What I'm trying to end up with is a MESH network for two SAR communication trucks that the wired and wireless devices on the network are on the same IP network so I can print to either trucks printers.

Currently I setup a MESH node and linked a standard Linksys AP in each truck but this setup would require additional manual routing for them to work.

Please let me know if there is a solution to my needs.

Thank you,

Ryan Kelley

IP Logged
 Subject :Re:What, if anything, keeps the bad guys out?.. 2014-03-18- 08:02:06 
KH2SR
Member
Joined: 2014-02-20- 03:44:15
Posts: 37
Location: Saratoga, CA
Forum : General
Topic : What, if anything, keeps the bad guys out?

Hi Andy,

I agree that we should be concerned with malicious access to our nodes. However I believe there are several factors that greatly reduce the likelihood of this occurring.

  1. Few hams even know this technology exists let alone non hams.
  2. The use of directional antennas that are horizontally polarized greatly reduces how many people are even in range of a node.
  3. Nodes do have custom passwords for changing the settings so at least control of the node is protected.
  4. Each node lists all nodes it is connected to or has been connected to. This list contains call signs. A quick search online will tell you if the callsign is real or not. If not then alert your local ham clubs that you need help tracking down someone who is illegally operating.
  5. Various devices that you would connect to a node such as a computer, regular wifi hotspot, file servers, webcams, and other devices have their own configuration software that typically allows the use of a password to protect access to that device.

James - KH2SR

[N2CN 2014-03-18- 06:17:22]:

Hi All,

I'm new to BBHN, and I've set up a toy network with three nodes.  So far, I am very impressed.  I'm looking to get our local club (W1EE, Stamford Amateur Radio Association) working with this technology.

One thing that concerns me about a wide-area deployment in a populated region is the potential for interference.  If I understand correctly, the only thing that one needs to join a BBHN mesh is the SSID of that mesh, which is standardized and broadcast.  This means that a curious person, be they well-intentioned or malicious, could with a little effort join a mesh and cause a variety of problems.  I understand that the whole point of BBHN is to make it easy for nodes to connect, but human nature being what it is, there is potential for disruption.

Am I correct? And if so, has any thought been given to how to exclude malicious nodes?

73,

Andy, N2CN


IP Logged
Last Edited On: 2014-03-18- 08:03:27 By KH2SR for the Reason
 Subject :Re:What, if anything, keeps the bad guys out?.. 2014-03-18- 08:01:59 
KG6JEI
Member
Joined: 2013-12-02- 19:52:05
Posts: 516
Location
Forum : General
Topic : What, if anything, keeps the bad guys out?

Short Answer: Absolutely Nothing

BBHN nodes are basically the same as an open voice repeater with no PL tone set.

Now the setup is a bit more complicated than just connecting to the SSID, you would need to run a few additional programs to actually transmit data over the network.

The default deployment keeps random devices from doing too much (except sending “HEY IM HERE” ) but does nothing to stop a rouge BBHN device from connecting or a rouge person whom has the skill to understand just what they are looking at.

Has core looked into any method to solve this: I don't know to be honest.

Have I looked into ways to solve this: Yes, but none of them are that great unless it makes it into a core build they all honestly need some work before I blurt them out (need a lot more testing and thought)

I haven't seen that many people ask this question (which I believe is a good question). I would say the more people speak up and specify it as something they need to be able to deploy the more likely it would be to land on a desk and be looked at

IP Logged
Note: Most posts submitted from iPhone
 Subject :What, if anything, keeps the bad guys out?.. 2014-03-18- 06:17:22 
N2CN
Member
Joined: 2014-03-12- 20:55:59
Posts: 4
Location
Forum : General
Topic : What, if anything, keeps the bad guys out?

Hi All,

I'm new to BBHN, and I've set up a toy network with three nodes.  So far, I am very impressed.  I'm looking to get our local club (W1EE, Stamford Amateur Radio Association) working with this technology.

One thing that concerns me about a wide-area deployment in a populated region is the potential for interference.  If I understand correctly, the only thing that one needs to join a BBHN mesh is the SSID of that mesh, which is standardized and broadcast.  This means that a curious person, be they well-intentioned or malicious, could with a little effort join a mesh and cause a variety of problems.  I understand that the whole point of BBHN is to make it easy for nodes to connect, but human nature being what it is, there is potential for disruption.

Am I correct? And if so, has any thought been given to how to exclude malicious nodes?

73,

Andy, N2CN

IP Logged
 Subject :Re:Mesh nodes in Laurel, MD (actually Frederick).. 2014-03-17- 07:31:14 
K3MMB
Member
Joined: 2014-03-16- 19:00:57
Posts: 71
Location
Forum : Maryland
Topic : Mesh nodes in Laurel, MD

MESH Alive and Well in Frederick.

At least two Ops with multiply nodes.


IP Logged
 Subject :Re:Help us gather info on UBNT Devices.. 2014-03-17- 06:21:11 
K6AH
Member
Joined: 2012-03-05- 10:47:45
Posts: 181
Location: San Diego, CA
Forum : UBNT Firmware
Topic : Help us gather info on UBNT Devices

Thank you Mike!  There are a couple other devices being updated soon, so I'll wait to update the chart until then.

We appreciate the help.

73,

Andre, K6AH

IP Logged
Member of:
Beta Test Team
San Diego Mesh Working Group
Running 3.0.1
 Subject :NANOBRIDGE M2.. 2014-03-17- 05:56:40 
K3MMB
Member
Joined: 2014-03-16- 19:00:57
Posts: 71
Location
Forum : UBNT Firmware
Topic : Help us gather info on UBNT Devices


Hope this helps 73 de mike

XM.v5.3# cat /etc/board.info

board.sysid=0xe232

board.name=NanoBridge M2

board.shortname=NB2

board.subtype=

board.hwaddr=00272230AD07

board.reboot=30

board.upgrade=150

board.phycount=1

radio.1.name=

radio.1.shortname=

radio.1.bus=pci

radio.1.subsystemid=0xe232

radio.1.subvendorid=0x0777

radio.1.txpower.max=23

radio.1.txpower.offset=2

radio.1.antennas=1

radio.1.def_antenna=4

radio.1.antenna.1.id=4

radio.1.antenna.1.name=Combined

radio.1.antenna.1.gain=18

XM.v5.3#

IP Logged
Last Edited On: 2014-03-17- 06:03:18 By K3MMB for the Reason clean up line feeds
 Subject :Re:HamChat Server.. 2014-03-17- 04:17:22 
N1AHH
Member
Joined: 2013-12-29- 09:04:08
Posts: 11
Location
Forum : Applications
Topic : HamChat Server

Thanks Rusty. Now it makes sense. I did not expect the router would be able to interact with a repository. I am traveling now but will give it another try when I get back home. Thanks again. Ron, N1AHH
IP Logged
 Subject :how do I recover from an unknown image.. 2014-03-16- 08:15:22 
k6dlc
Member
Joined: 2014-01-26- 20:13:48
Posts: 9
Location
 
Forum : Firmware
Topic : how do I recover from an unknown image

   My wrt54l is now in unknown state. No dhcp from the router, default router ip are not there.

I am unable to connect to the router. Arp shows no broadcast from the router. I hope I am not hose.

I  have installed bbhn 1.0.0

  Thanks you.




IP Logged
 Subject :how do I recover from an unknown image.. 2014-03-16- 08:15:09 
k6dlc
Member
Joined: 2014-01-26- 20:13:48
Posts: 9
Location
 
Forum : Firmware
Topic : how do I recover from an unknown image

   My wrt54l is now in unknown state. No dhcp from the router, default router ip are not there.

I am unable to connect to the router. Arp shows no broadcast from the router. I hope I am not hose.

I  have installed bbhn 1.0.0

  Thanks you.




IP Logged
 Subject :Re:Help us gather info on UBNT Devices.. 2014-03-16- 02:42:39 
K6AH
Member
Joined: 2012-03-05- 10:47:45
Posts: 181
Location: San Diego, CA
Forum : UBNT Firmware
Topic : Help us gather info on UBNT Devices

That would be great Remi.  Wow, first I've encountered the NanoBeam.  What a cool product.

Thanks for your help!

Andre, K6AH

IP Logged
Member of:
Beta Test Team
San Diego Mesh Working Group
Running 3.0.1
 Subject :Re:Success/Failure for Different Router Models.. 2014-03-15- 19:09:59 
kb9zmr
Member
Joined: 2013-09-24- 14:42:24
Posts: 14
Location: Central Illinois
 
Forum : Hardware
Topic : Success/Failure for Different Router Models

So you are *not* seeing a BroadbandHamnet-v1 SSID from a wireless scan? Did you try a 30/30/30 reset? Can you ping it? I found that with one of my newer laptops, right after I change the password & node ID, it cannot get a new IP from the router doing an ipconfig /release & ipconfig /renew. Another XP laptop has no issue. But the first laptop caused me to waste hours by making me believe I had bricked 3 different routers.
IP Logged
 Subject :Re:Re:Success/Failure for Different Router Models.. 2014-03-15- 10:30:53 
KD2DJV
Member
Joined: 2013-04-03- 16:38:31
Posts: 1
Location
Forum : Hardware
Topic : Success/Failure for Different Router Models


I have had a similar experience, except i originally lost ethernet, but after configuring the 1.0 firmware (just setting call sign and password) i lost wireless as well. Any help would be greatly appreciated.




[kb9zmr 2014-03-14- 15:34:25]:

I have been successful flashing a WR850G V2. It had some quirks, mainly I lost Ethernet after the flash even after resetting my laptop's IP using IPCONFIG. The laptop just could not find the DHCP server on the router. I also have to say that the router seemed to be sketchy *before* the flash. Sometimes the original admin web pages would not load. I let it sit for *weeks* figuring it was bricked, but then I realized I had not tried wireless, like I have with other WRT54G's. Boom. I was in and after the config & reboot, it is working fine.

IP Logged
 Subject :Re:Re:Help us gather info on UBNT Devices.. 2014-03-15- 09:17:56 
F6CNB
Member
Joined: 2013-06-20- 09:22:08
Posts: 17
Location: Frelsburg, Texas
Forum : UBNT Firmware
Topic : Help us gather info on UBNT Devices

Andre, I should be able to get the following: NanoBridge M2 the new NanoBeam M2 and NanoBeam M5 as soon as I am back in France (Next Thursday) 73 Remi W5/F6CNB
IP Logged
 Subject :Re:Why aren't we using AMPR ip addresses?.. 2014-03-15- 05:07:28 
wb2ifs
Member
Joined: 2010-09-01- 12:42:38
Posts: 31
Location: FN18ns
   
Forum : General
Topic : Why aren't we using AMPR ip addresses?

TNX OM de WB2IFS/3
IP Logged
Jesse Alexander, WB2IFS/3
Prince George's County ARES/RACES
http://www.pgares.org/
twitter: @pgcares
wb2ifs@arrl.net
 Subject :Re:ubiquiti bullet firmware that is coming out... 2014-03-15- 04:09:51 
kb9mwr
Member
Joined: 2010-10-06- 23:04:25
Posts: 54
Location
Forum : UBNT Firmware
Topic : ubiquiti bullet firmware that is coming out.

Just wondering if future releases of the Ubiquiti HSMM firmware will allow ham to select channels outside of the shared noisy Part 15 space?
IP Logged
 Subject :Re:Time Zone difference between 1.0.0 and 1.0.1 Firmware.. 2014-03-14- 19:50:30 
KG6JEI
Member
Joined: 2013-12-02- 19:52:05
Posts: 516
Location
Forum : Firmware
Topic : Time Zone difference between 1.0.0 and 1.0.1 Firmware

The Ubiquiti version uses a newer core operating system (openwrt  10.03.1). Compared to Linksys (using  7.09). For better hardware and software support.  This means some files are changed in how they are handled around setting configurations.


To set the time zone for a node edit /etc/config/system under system add timezone per

http://wiki.openwrt.org/doc/uci/system. (Pay close attention to the TZ value   per the table )

you may need to put that in /etc/config.mesh/system as well so it isn't overwritten on a config save.

As for a GUI timezone setting this is the first I've heard of it do I can't really comment  to that.

IP Logged
Note: Most posts submitted from iPhone
Page #  «StartPrev241242243244245246247248249250NextEnd»


Powered by ccBoard


SPONSORED AD: