Hi.
At the very least, see if the embedded Linux it uses (what version of
what distro, anyone know? I've not seen anything re that mentioned...)
has a firewall facility you can invoke and setup. Even if it is only
possible from the command line. They can have full network
connectivity, but still be invisible to random port pokers, plus rules
can be setup for what you "Want" to do, and still protect against what
you don't want to happen. (Remote file access etc.)
If you setup for remote access via SSH, then read up how to use
Certificates for authentication, and not rely on passphrases.
A semi instant solution, would be to "hide" the K4 behind a reconfigured
wired router. That way, it can reach out for any authorised updates,
but nothing can "see" it from the rest of your LAN. (Unless you "need"
it, in which case, that extra router can be configured to do so.
Effectively much like a hardware firewall. But make sure that routers
own OS is all up to date too!)
You could put other Shack connected stuff on the same protected LAN as
well, if needed. Else, see if your existing router can create and
manage an isolated VLAN for the K4. Preferably on a separate physical
cable run.
Linux as a whole is less troublesome than "some other" OS re malware,
but it does exist, also so do vulnerabilities. It is just that most
Linux users would spot a behavioural change and go searching for stuff
to kill off.
(If you think Windows updates too often, you aint' seen nothing yet,
security updates are issued as needed, not waiting for one batch a
month! But with most Linux's, updating, even a kernel update is only a
few minutes of your time, not hours like that "other" OS)
Because of that, it is less targeted by the usual bad guys, but sadly
that is beginning to change. :-( Thankfully though, Linux generally has
the tools to do manage that and protect itself without needing to
download other stuff. But it does need time and learning how to do so.
If you are really concerned, do not connect your K4 to your LAN, except
when needed (official updates etc.) Or if you "Need to" (Remote Shack
working etc) then plan it, and install the needed protective devices
(dedicated firewall router for example) to hide it behind.
The first thing to find out, is just which embedded Linux is used in the
K4, and what protective tools are provided as standard. If there is not
even a firewall to use, I'd be asking serious questions of Elecraft as
to why such was left out.
73.
Dave G0WBX(G8KBV) I gave up with Windoze for my own computing needs
over 7 years ago now. Not regretted it one bit.
On 01/07/2022 23:27, elecraft-requ...@mailman.qth.net wrote:
Date: Fri, 1 Jul 2022 13:39:51 -0300
From: gordon young<gngyo...@gmail.com>
To:elecraft@mailman.qth.net
Subject: [Elecraft] Elecraft K4 Ethernet Vulnerability
Message-ID:<097588cf-06dc-46a8-84ed-459e824af...@gmail.com>
Content-Type: text/plain; charset=us-ascii
Ladies and gentlemen,
Perhaps this is old news to some however I thought it worth asking before my
radio arrives. Given the K4 now has direct Ethernet connectivity, how
vulnerable is it to malware, bugs, worms and bad internet stuff in general?
What is recommended for the radio itself besides protecting the associated
computer? For example, should a VPN be used or is the risk considered low
enough to disregard?
Thanks in advance
Gord
VE1GVY
K4 wannabee
--
Created on and sent from a Unix like PC running and using free and open source
software:
______________________________________________________________
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecraft@mailman.qth.net
This list hosted by: http://www.qsl.net
Please help support this email list: http://www.qsl.net/donate.html
Message delivered to arch...@mail-archive.com