Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-26 Thread gordonb3


Regarding VLANs, just think of it as a postal system:

1: you write a letter to someone in Moskow - this is your data 
2: you put the letter in an envelope - this is your Ethernet package
3: you send the letter which is then transported to the sorting center -
this is the wire between your computer and the switch
4: in the sorting center the letter is put in a bag that is labeled
Moscow - this your VLAN tag
5: the bag is transported to the airport, together with bags to other
destinations - this is the wire to the next switch
6: on the airport the bags are placed on the correct planes - you
shouldn't need that many switches, but this for story consistence
7: in Moscow the bag is opened - this is the removal of the VLAN tag
8: the letter is transported to the final destination - this is the wire
between the switch and the receiver
9: the receiver opens the envelope, reads the letter and writes a letter
back.


As for masquerading, this is a special case of NAT where the router
replaces the origin of the package with its own address (SNAT - Source
Network Address Translation). Yes if you cascade consumer type routers
this will cause this NAT process to occur just as many times as you have
routers stacked, but because every next router cannot see that the
package has previously been masqueraded already this will not cause any
issue. The main issue that you can have with NAT is usually related to
destination rewriting (DNAT) where the target machine is configured to
use a different router to send the reply (which in this type of NAT is
the original sender IP). This is something like you asking Bob who is
not wearing his hearing aid what time it is and Adam shouting from the
other room that it is 10PM which is probably not related because it is
broad daylight and annoyingly Bob is not responding so you still don't
know what time it is.



gordonb3's Profile: http://forums.slimdevices.com/member.php?userid=71050
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-26 Thread Jaca


gordonb3 wrote: 
> So to answer the main question whether you need VLANs:
> 
> No. The same can be accomplished by simply adding more hardware. For
> instance to separate your internal network from SB devices you can
> simply place a masquerading router in between. The same for less trusted
> IoT devices, just branch it off by adding secondary routers directly
> behind the ISP router. That's not a bad idea either way because many
> ISPs install back doors in their supplied routers, officially to be able
> to perform maintenance but who knows what else they do?Could you please 
> expand on "masquerading router"?

Wouldn't that introduce double Nat problem?

Also are vlan subject double Nat?
All examples of the vlan use seems to introduce vlan subnet and dhcp so
I would assume that double Nat also applies.. However I believe vlan is
on different layer so maybe not.. I clearly don't quite get it yet..

BTW looking at my gear it should be possible to set up vlans..

Guest network vlan seems straight forward as no other devices should be
visible to guests and double Nat should not be concern.


However for squeezebox vlan I would somehow need to make NAS member of
SB vlan and main vlan (or non vlan traffic)

Ideally if only lms docker container is part of both (for extra
security) - perhaps this can be done with macvlan.

BTW I have found someones hack for NAS becoming member of few vlans,
however it apparently does not work with vswitch which I'm using for
vDSM

There is still topic of sorting mesh network to work with vlan I'm not
sure about (maybe no big deal if it's just bridged to tagged lan port )

Anyway more I learn more complicated it all is.



3x Squeezebox Touch, 4x Squeezebox Radio, Squeezelite (RPi 3B with
HiFiBerry DAC+Pro on OSMC), Material Skin Apk, Squeeze Commander,
Logitech Media Server Version: 8.2.0 with Material Skin (Docker in
DS218+)

Jaca's Profile: http://forums.slimdevices.com/member.php?userid=58187
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-25 Thread gordonb3


So to answer the main question whether you need VLANs:

No. The same can be accomplished by simply adding more hardware. For
instance to separate your internal network from SB devices you can
simply place a masquerading router in between. The same for less trusted
IoT devices, just branch it off by adding secondary routers directly
behind the ISP router. That's not a bad idea either way because many
ISPs install back doors in their supplied routers, officially to be able
to perform maintenance but who knows what else they do?



gordonb3's Profile: http://forums.slimdevices.com/member.php?userid=71050
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-25 Thread gordonb3

I wonder if this deserves it's own topic? At least it seems appropriate
to explain some of the definitions as this appears to confuse a lot of
people.

NETWORK TOPOLOGY (HARDWARE WIRING)
In essence there are three different ways to connect your machine to a
network: bus, ring and star. On a bus all devices branch of from a
single wire, like a battery powered string of Christmas lights. Ring is
similar however each node has two connectors that in turn each connect
to just one neighbour. Both these methods are no longer used for
ethernet¹. Present day networks all use a star shaped topology, but like
a snowflake it may contain branches that form a new star. Nelson's
drawing is a nice example of that.


¹) Fun fact: Ethernet is named such because its very first
implementation was in fact wireless. It was developed by the University
of Hawaii to allow computer communication between the islands. The
original protocol was unmanaged and was nicknamed `Aloha` as each node
would simply start sending information regardless of whether another
node already occupied the line, garbling the signal.


STAR NETWORK COMPONENTS

- The heart of a star network is either a hub or switch. The
  difference between the two is that a hub simply repeats all data from
  one incoming line to all other lines whereas a switch will only
  forward the data to the line to which the target machine is connected.
  An exception to this are so-called broadcast and multicast messages
  which will be repeated to all lines.
- A managed switch is a special type of switch where you can configure
  individual ports to allow or disallow specific data streams or assign
  higher priority.
- A router is yet another type of switch that allows going from one IP
  address range to another. This may be static pass through, but in many
  cases it involves what is known as masquerading where the router
  rewrites the package so that the receiver cannot see the original
  sender but only the router.
- An access point (AP) is a hub that uses wifi radio instead of
  wiring. Consumer devices usually combine this with a router function.
  

DEFINITIONS

- An SSID is the public name of a wifi network. A single AP may
  publish multiple SSIDs, each which it's own policies (password,
  encryption method, etc) attached to it.
- VLAN is a method to allow sending multiple networks over a single
  wire. A poor man's solution to this is to simply use multiple IP
  address ranges, but in that case multicast messages sent by one
  network will also be seen by the other network(s). VLAN tagging allows
  network components that are able to process it to be isolated from
  other traffic (having either a different VLAN tag or no tag at all).
  Machines that cannot process VLAN tags will always drop tagged
  packets.



gordonb3's Profile: http://forums.slimdevices.com/member.php?userid=71050
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-24 Thread P Nelson

After reading this discussion, I need to improve my security of Internet
of “unsecured” Things (IoT).  If everything was wireless, I could put
them on a guest wireless network SSID(s).  However, my old DirecTV box,
Arlo camera system, and Roku are connected via ethernet.  (I could
switch the Roku to wireless on the guest network).   My understanding is
I need to create a virtual LAN (VLAN) for the IoT devices connected via
ethernet.  The ASUS router does not support VLAN.   My research mentions
adding a managed switch that supports VLAN could be a solution.  I am
not sure if a switch would be placed before or after the ASUS router.

Here is a picture of my current set-up (sorry for my awful writing):

35585
The ASUS’s WiFi appears to be sufficient power to have good signal for
the house.  The only time I will need to turn-on WiFi at the second
router is when I need to have WiFi in the backyard and the guest
cottage, which is infrequent.

Does anyone have any suggestions, that are hopefully easy, on how to
improve the security of the Arlo, Roku, and DirecTV?  

Thanks in advance!


+---+
|Filename: Network small.jpg|
|Download: http://forums.slimdevices.com/attachment.php?attachmentid=35585|
+---+


P Nelson's Profile: http://forums.slimdevices.com/member.php?userid=58158
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-24 Thread gordonb3


I bet it has to possible to allow specified traffic to pass from guest
to main wifi on openwrt. The main challenge here really is that you
can't have any routing between the SBs as this will block the broadcasts
(which is of course the objective), so this won't work with a fully
wireless `poor mans mesh` setup.



gordonb3's Profile: http://forums.slimdevices.com/member.php?userid=71050
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-24 Thread Jaca


gordonb3 wrote: 
> That won't matter. The VLAN info will only be on the outside connection,
> otherwise nothing in your house would be able to talk to each other. You
> can simply create new VLANs and you could even re-use VLAN IDs from the
> main router as long as you make sure that no tagged data is sent on your
> outside line. If your SBs are all wired you could set this up with your
> current hardware (don't know what you run LMS on?)
> 
> Not exactly an expert on openwrt, but from what I've seen it is
> basically Linux and it does offer guest wifi so probably all that you
> require for segmenting your network is already inside those boxes.
> Somebody may in fact have already done something similar and posted it
> on their 'user forum' (https://forum.openwrt.org/)

Thank you, that all sounds encouraging. 
I run LMS in docker on synology NAS.
Also I have in past manged to create guest wifi on openwrt but it is
completely separated from lan devices (including NAS with LMS) hence my
original question about phones as controllers..

I bet you are right about openwrt...
And wonder if  perhaps it's just matter of correct firewall settings

BTW most of my squeezebox devices are  wireless with exception of 2 (1st
wired from openwrt AP and  2nd  from managed switch)

Looks I will have to do some testing now.
Thanks a lot for all your help [emoji106]



3x Squeezebox Touch, 4x Squeezebox Radio, Squeezelite (RPi 3B with
HiFiBerry DAC+Pro on OSMC), Material Skin Apk, Squeeze Commander,
Logitech Media Server Version: 8.2.0 with Material Skin (Docker in
DS218+)

Jaca's Profile: http://forums.slimdevices.com/member.php?userid=58187
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-24 Thread gordonb3


Jaca wrote: 
> Thank you for going into trouble of this comprehensive answer..
> 
> I will try get my head around it when I find a minute.. I mean quite few
> hours to scratch my head.. 
> 
> I think my main problem was fact that due to rural location my lan is
> actually already vlan of next-door meraki router managed by isp (it was
> only way to get fibre speed connection) So not sure if I can create
> another vlan within vlan( like nested vlan) without admin access to main
> router.. I do have  switch with vlan capability and few openwrt routers
> acting as dumb AP mesh wifi so few possible options are there. However I
> remember worrying about double NAT as dhcp is running on managed router
> next door. Not sure if that's relevant to vlans or not.. 
> 
> I can request some vlan config changes from isp, but I would need to be
> actually sure I know what I'm doing [emoji23]..
That won't matter. The VLAN info will only be on the outside connection,
otherwise nothing in your house would be able to talk to each other. You
can simply create new VLANs and you could even re-use VLAN IDs from the
main router as long as you make sure that no tagged data is sent on your
outside line. If your SBs are all wired you could set this up with your
current hardware (don't know what you run LMS on?)

Not exactly an expert on openwrt, but from what I've seen it is
basically Linux and it does offer guest wifi so probably all that you
require for segmenting your network is already inside those boxes.
Somebody may in fact have already done something similar and posted it
on their 'user forum' (https://forum.openwrt.org/)



gordonb3's Profile: http://forums.slimdevices.com/member.php?userid=71050
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-23 Thread Jaca


gordonb3 wrote: 
> I have a somewhat older device, an Excito B3 (armv5, 1GHz, 2*Gb NIC +
> Wifi). I don't actually use the second NIC adapter internally though
> because this also serves as my internet router. What I did was enable
> VLAN tagging on the internal NIC and create multiple SSIDs on the wifi
> and then I bridged some of these virtual objects. Confused?
> 
> WIFI:
> The idea is the same as a guest wifi. Assuming you run Linux and your
> machine has a wifi adapter, you need to install `hostapd`. The default
> config should get you going to create a wifi AP. The next step is to
> identify your adapter name and note it's MAC address but change the
> first two digit number to become `02` (e.g. if you have
> `09:ab:cd:ef:12:34` write down `02:ab:cd:ef:12:34`). In your
> hostapd.conf add/edit the following directives:
> 
> 
Code:

  >   > interface=
  > bssid=

> > 
> I use a udev rule to override the so-called predictable names to
> follow the old standard where the wifi adapter is wlan0. To create
> additional SSIDs extend the hostapd.conf with directives like the
> following:
> 
> 
Code:

  >   > bss=wlan0_0
  > ssid=squeezeplay
  > 
  > bss=wlan0_1
  > ssid=guest
  > 
  > bss=wlan0_2
  > ssid= privileged
  > wpa_key_mgmt=WPA-PSK
  > wpa_pairwise=CCMP
  > wpa=3
  > wpa_passphrase=ExtremelySecretPassword

> > 
> 
> Note that the original wlan0 is your primary SSID, so if you add all
> of the above you will have 4 wifi networks in total. Of course all of
> these need their own static IP address and you require a DHCP server
> to distribute IP addresses to connecting machines. Despite its name,
> `dnsmasq` works excellent for this.
> 
> VLAN TAGGING
> In a nutshell this means that you wrap your network traffic in an
> additional envelope. Both peers must support it, meaning that you
> require a switch that is able to understand this protocol (802.11q).
> Since however the switch can either add or strip the additional VLAN
> tag you do not need to make changes to other devices as well, but you
> will have to mark which physical port on the switch is linked to what
> VLAN.Thank you for going into trouble of this comprehensive answer..

I will try get my head around it when I find a minute.. I mean quite few
hours to scratch my head.. 

I think my main problem was fact that due to rural location my lan is
actually already vlan of next-door meraki router managed by isp (it was
only way to get fibre speed connection) So not sure if I can create
another vlan within vlan( like nested vlan) without admin access to main
router.. I do have  switch with vlan capability and few openwrt routers
acting as dumb AP mesh wifi so few possible options are there. However I
remember worrying about double NAT as dhcp is running on managed router
next door. Not sure if that's relevant to vlans or not.. 

I can request some vlan config changes from isp, but I would need to be
actually sure I know what I'm doing [emoji23]..



3x Squeezebox Touch, 4x Squeezebox Radio, Squeezelite (RPi 3B with
HiFiBerry DAC+Pro on OSMC), Material Skin Apk, Squeeze Commander,
Logitech Media Server Version: 8.2.0 with Material Skin (Docker in
DS218+)

Jaca's Profile: http://forums.slimdevices.com/member.php?userid=58187
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-23 Thread gordonb3


Jaca wrote: 
> Thanks, so your set up is actually not affecting phone operation..that's
> sound great. Could I ask what device is you lms hosted on so it has 2
> lan connections.. I was trying to set smth similar but got nowhere,
> thanks
I have a somewhat older device, an Excito B3 (armv5, 1GHz, 2*Gb NIC +
Wifi). I don't actually use the second NIC adapter internally though
because this also serves as my internet router. What I did was enable
VLAN tagging on the internal NIC and create multiple SSIDs on the wifi
and then I bridged some of these virtual objects. Confused?

WIFI:
The idea is the same as a guest wifi. Assuming you run Linux and your
machine has a wifi adapter, you need to install `hostapd`. The default
config should get you going to create a wifi AP. The next step is to
identify your adapter name and note it's MAC address but change the
first two digit number to become `02` (e.g. if you have
`09:ab:cd:ef:12:34` write down `02:ab:cd:ef:12:34`). In your
hostapd.conf add/edit the following directives:


Code:

interface=
  bssid=


I use a udev rule to override the so-called predictable names to follow
the old standard where the wifi adapter is wlan0. To create additional
SSIDs extend the hostapd.conf with directives like the following:


Code:

bss=wlan0_0
  ssid=squeezeplay
  
  bss=wlan0_1
  ssid=guest
  
  bss=wlan0_2
  ssid= privileged
  wpa_key_mgmt=WPA-PSK
  wpa_pairwise=CCMP
  wpa=3
  wpa_passphrase=ExtremelySecretPassword



Note that the original wlan0 is your primary SSID, so if you add all of
the above you will have 4 wifi networks in total. Of course all of these
need their own static IP address and you require a DHCP server to
distribute IP addresses to connecting machines. Despite its name,
`dnsmasq` works excellent for this.

VLAN TAGGING
In a nutshell this means that you wrap your network traffic in an
additional envelope. Both peers must support it, meaning that you
require a switch that is able to understand this protocol (802.11q).
Since however the switch can either add or strip the additional VLAN tag
you do not need to make changes to other devices as well, but you will
have to mark which physical port on the switch is linked to what VLAN.



gordonb3's Profile: http://forums.slimdevices.com/member.php?userid=71050
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread Jaca


gordonb3 wrote: 
> Those talk to LMS and that server has a secondary address on my regular
> LAN which also provides a route to the outside world so I can listen to
> radio.Thanks, so your set up is actually not affecting phone operation..that's
sound great. Could I ask what device is you lms hosted on so it has 2
lan connections.. I was trying to set smth similar but got nowhere,
thanks



3x Squeezebox Touch, 4x Squeezebox Radio, Squeezelite (RPi 3B with
HiFiBerry DAC+Pro on OSMC), Material Skin Apk, Squeeze Commander,
Logitech Media Server Version: 8.2.0 with Material Skin (Docker in
DS218+)

Jaca's Profile: http://forums.slimdevices.com/member.php?userid=58187
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread gordonb3


Jaca wrote: 
> Just wondering how you control your squeezeboxes? I cannot image life
> without material apk on my phone or tablet.

Those talk to LMS and that server has a secondary address on my regular
LAN which also provides a route to the outside world so I can listen to
radio.



gordonb3's Profile: http://forums.slimdevices.com/member.php?userid=71050
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread jablonski


Just a quick thank you to the people who provided extensive explanations
and elaborated on what risks there are and how big.

In any case I get that, in principle, the risk that my local network
would get compromised due to LMS and the SBs alone is very small (I'm
not forwarding any LMS ports to the internet).

Still, I also get that the risk is not entirely zero, and I also have my
Philips Hue system and other stuff that might bring their own risks (to
my surprise, yesterday, I discovered that I have far more devices hooked
up to my network than I realised I have. It gave me a scare for a
moment, but they were really all my own).
So maybe I'll still create that VLAN (after I figure out how), even if
it's just for ease of mind, or for the "idea" of doing it proper. But in
any case I know now that there's no need to hurry.



jablonski's Profile: http://forums.slimdevices.com/member.php?userid=23317
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread Jaca


gordonb3 wrote: 
> Yeah, I actually run my SBs on an `open` wifi with the LMS machine
> acting as the AP (hostapd). I have a MAC address restriction on it
> though and the address pool is completely filled. There is also a
> restrictive firewall that runs both ways, only allowing ports
> 80,3483,9000,9090 TCP and 67,68,53,3483,17784 UDP, so anyone managing to
> gain access to this wifi SSID despite the installed barriers will
> quickly get bored to hell and leave.Just wondering how you control your 
> squeezeboxes? I cannot image life
without material apk on my phone or tablet.



3x Squeezebox Touch, 4x Squeezebox Radio, Squeezelite (RPi 3B with
HiFiBerry DAC+Pro on OSMC), Material Skin Apk, Squeeze Commander,
Logitech Media Server Version: 8.2.0 with Material Skin (Docker in
DS218+)

Jaca's Profile: http://forums.slimdevices.com/member.php?userid=58187
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread gordonb3


philippe_44 wrote: 
> All my untrusted devices run on a separated WiFi network that has its
> own public IP (my ISP allows me to have two) because I agree with you,
> all these gadgets are, intentionally or not, security disasters. Re SB,
> one other thing is that you're stuck to older WPA and your WiFi is
> subject to KRACK or similar attacks vectors. One option is to run your
> SB system in the same "dirty pool" as your other gadgets.
Yeah, I actually run my SBs on an `open` wifi with the LMS machine
acting as the AP (hostapd). I have a MAC address restriction on it
though and the address pool is completely filled. There is also a
restrictive firewall that runs both ways, only allowing ports
80,3483,9000,9090 TCP and 67,68,53,3483,17784 UDP, so anyone managing to
gain access to this wifi SSID despite the installed barriers will
quickly get bored to hell and leave.



gordonb3's Profile: http://forums.slimdevices.com/member.php?userid=71050
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread philippe_44


philchillbill wrote: 
> But don’t forget that the Chinese baby monitor or IP cam you
> bought and connected up on your LAN is constantly phoning home to pick
> up potential malware. The attacker doesn’t have to target your
> home specifically. Targeting the manufacturer’s website is a
> single point of attention for a hacker. If successful, the millions of
> IOT devices phoning home will pick up the malware with no need for a
> targeted attack on anybody specific. The Chinese use off the shelf IOT
> stacks they don’t necessarily understand too well and many of
> those are riddled with vulnerabilities.

All my untrusted devices run on a separated WiFi network that has its
own public IP (my ISP allows me to have two) because I agree with you,
all these gadgets are, intentionally or not, security disasters. Re SB,
one other thing is that you're stuck to older WPA and your WiFi is
subject to KRACK or similar attacks vectors. One option is to run your
SB system in the same "dirty pool" as your other gadgets.



LMS 8.2 on Odroid-C4 - *SqueezeAMP!*, 5xRadio, 5xBoom, 2xDuet, 1xTouch,
1xSB3. Sonos PLAY:3, PLAY:5, Marantz NR1603, Foobar2000, ShairPortW,
2xChromecast Audio, Chromecast v1 and v2, Squeezelite on Pi,  Yamaha
WX-010, AppleTV 4, Airport Express, GGMM E5, RivaArena 1 & 3

philippe_44's Profile: http://forums.slimdevices.com/member.php?userid=17261
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread philchillbill


gordonb3 wrote: 
> That's all hypothetical. I mean, how many SBs are really still out
> there? Would there really be someone thinking it might be worth while to
> reprogram e.g. a Tuya device to find and manipulate SBs through their
> exposed ports?

Oh sure. But never say never. The world is full of wackos (me, for
instance :cool:). Could also be a generic search for anything running
BusyBox on the LAN.



philchillbill's Profile: http://forums.slimdevices.com/member.php?userid=68920
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread gordonb3

philchillbill wrote: 
> But don’t forget that the Chinese baby monitor or IP cam you bought and
> connected up on your LAN is constantly phoning home to pick up potential
> malware. The attacker doesn’t have to target your home specifically.
> Targeting the manufacturer’s website is a single point of attention for
> a hacker. If successful, the millions of IOT devices phoning home will
> pick up the malware with no need for a targeted attack on anybody
> specific. The Chinese use off the shelf IOT stacks they don’t
> necessarily understand too well and many of those are riddled with
> vulnerabilities.
That's all hypothetical. I mean, how many SBs are really still out
there? Would there really be someone thinking it might be worth while to
reprogram e.g. a Tuya device to find and manipulate SBs through their
exposed ports?



gordonb3's Profile: http://forums.slimdevices.com/member.php?userid=71050
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread philchillbill

gordonb3 wrote: 
> As some already responded, your SBs sit in a private network. The point
> about this is not so much the firewall that sits between you and the
> dangerous internet, but that no public router knows how to direct
> traffic from any random machine on the internet towards any address on
> your private LAN.
> 
> No this does not mean that you are completely safe, but what it does
> mean is that a hacker will have to do James Bond stuff to find out your
> network details and I would dare question whether you are worth so much
> trouble - not meant in any offensive way of course. The methods that
> hackers use to get access to devices owned by random people are roughly
> the following:
> >   > 
  -  you opening a web page that contains malware
  -  you opening an email that contains executable code inline
  > (usually a screen saver file)
  -  you opening an email attachment that includes a malicious macro
  > to be executed by the associated application
  > > > 
> 
> If you are something of a hobbyist the following methods may apply as
> well:
> >   > 
  -  you opening port 25 on your firewall to expose an email server
  -  you opening web ports on your firewall to expose a web server
  > with some kind of preprocessor capability (PHP, Java, Perl) allowing
  > random code injection
  -  you opening the SSH port on your firewall
  > > > 
> 
> None of this would ever apply to your SBs. For those to load something
> malicious someone would first have to hack your entire network
> topology to redirect traffic from your SB away from its intended
> target, towards a machine that is controlled by the hacker. Again way
> too much trouble for what this type of hacker wants to accomplish,
> which is really nothing else than sending spam, finding other
> vulnerable machines and occasionally organizing so-called Denial of
> Service attacks.
> 
> 
> All of this said I still run my SB devices in a separate VLAN as I
> found they are extremely loud, sending broadcasts even at a higher
> rate than Apple devices do and I don't really need my workstation to
> be constantly distracted from the processes I want it to run by
> investigating whether it should act on those broadcasts.

But don’t forget that the Chinese baby monitor or IP cam you bought and
connected up on your LAN is constantly phoning home to pick up potential
malware. The attacker doesn’t have to target your home specifically.
Targeting the manufacturer’s website is a single point of attention for
a hacker. If successful, the millions of IOT devices phoning home will
pick up the malware with no need for a targeted attack on anybody
specific. The Chinese use off the shelf IOT stacks they don’t
necessarily understand too well and many of those are riddled with
vulnerabilities.





philchillbill's Profile: http://forums.slimdevices.com/member.php?userid=68920
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread gordonb3


As some already responded, your SBs sit in a private network. The point
about this is not so much the firewall that sits between you and the
dangerous internet, but that no public router knows how to direct
traffic from any random machine on the internet towards any address on
your private LAN.

No this does not mean that you are completely safe, but what it does
mean is that a hacker will have to do James Bond stuff to find out your
network details and I would dare question whether you are worth so much
trouble - not meant in any offensive way of course. The methods that
hackers use to get access to devices owned by random people are roughly
the following:
  
-  you opening a web page that contains malware
-  you opening an email that contains executable code inline (usually
  a screen saver file)
-  you opening an email attachment that includes a malicious macro to
  be executed by the associated application
  

If you are something of a hobbyist the following methods may apply as
well:
  
-  you opening port 25 on your firewall to expose an email server
-  you opening web ports on your firewall to expose a web server with
  some kind of preprocessor capability (PHP, Java, Perl) allowing random
  code injection
-  you opening the SSH port on your firewall
  

None of this would ever apply to your SBs. For those to load something
malicious someone would first have to hack your entire network topology
to redirect traffic from your SB away from its intended target, towards
a machine that is controlled by the hacker. Again way too much trouble
for what this type of hacker wants to accomplish, which is really
nothing else than sending spam, finding other vulnerable machines and
occasionally organizing so-called Denial of Service attacks.


All of this said I still run my SB devices in a separate VLAN as I found
they are extremely loud, sending broadcasts even at a higher rate than
Apple devices do and I don't really need my workstation to be constantly
distracted from the processes I want it to run by investigating whether
it should act on those broadcasts.



gordonb3's Profile: http://forums.slimdevices.com/member.php?userid=71050
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread Michael Herger

Thanks a lot for your replies. The main trigger for my concern are the
frequent warnings in the media about smart home appliances (like
dishwashers with wifi) that are often not updated, so that unpatched
weaknesses can be exploited by hackers who then can enter your home
network and sniff out what you're doing on your other devices, such as
phone and computer.


I believe that the SB was indeed designed with an "innocent" network in 
mind: we're all good people and we give you access to this little Linux 
box (Touch & Radio). It wouldn't be done this way nowadays any more.


That being said: these devices are inside your network. An attacker 
would have to get in to your network before they could get access to 
your device. There is a potential risk of a manipulated audio stream 
causing an issue on the device. It would be interesting to see whether a 
hacker could exploit a buffer overflow or whatever in a codec to get 
access to the device itself...


One of the problems with many devices is the "cloud" connection - which 
using mysb is. As long as you can trust this cloud, you're good. But it 
gives outside users (limited) access to your devices. I can control your 
player at any time. Your fridge vendor can probably monitor the content 
of your new smart fridge. The real problem starts when other people you 
don't trust get access to these services. Or when a device could have a 
bigger impact on one's live than a radio. Imagine the smart cars out 
there nowadays. If those cars get hacked (and it has been done before), 
an attacker can control your breaks or whatever.


I believe the biggest risk in the SB universe is opening LMS to the 
internet. Even if protected with a password, I wouldn't trust it. And 
there have been attacks involving reading full disk content from LMS 
installations. This is easily done and real.


Very little to no risk I see with the old players (up to the Classic). 
They're rather dumb devices. Radio/Touch/Controller, with their Linux 
based OS, offer way more potential. But again: the attack surface is 
rather small, as they're hardly ever exposed to the internet.

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread philchillbill


jablonski wrote: 
> Thanks a lot for your replies. The main trigger for my concern are the
> frequent warnings in the media about smart home appliances (like
> dishwashers with wifi) that are often not updated, so that unpatched
> weaknesses can be exploited by hackers who then can enter your home
> network and sniff out what you're doing on your other devices, such as
> phone and computer. 
> So my assumption was that eventually in every device that is longer on
> the market, weaknesses may be discovered and exploited. The same also
> applies for computers and phones, of course. But your testing puts my
> mind at ease a little, awesome that you did that, philchillbill.

Here's a link to where I published that script in the Domoticz Wiki in
2017:
https://www.domoticz.com/wiki/Logitech_Media_Server#Using_Ambient_Light_Sensor_in_SB-Radio_and_SB-Touch

One more thing I'd add is that firewalls give people a false sense of
security. People also think if you don't open any ports in your router,
you're safe. However, any device already inside your LAN can 'phone
home' without being blocked and e.g. most modern TVs or Smart
Thermostats and even Philips HUE do that. After you install them, they
constantly contact their manufacturers web portals for all kinds of
things like checking for updates or uploading your viewing habits data.
-Outward- traffic from your LAN is always allowed, unless you set up a
very restrictive firewalling regime. The 'danger' is that bugs or
backdoors in these newer devices talking regularly to the cloud
inadvertently retrieve compromised payloads which can then run inside
your LAN and can snoop around for other (older) devices to infect. When
that new device gets patched (because it is still being updated by the
manufacturer) the older device -will- stay infected because it never
gets updates to clean out the malware.

Not worth sleepless nights, but just something to keep in the back of
your mind :D



philchillbill's Profile: http://forums.slimdevices.com/member.php?userid=68920
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-22 Thread jablonski

philchillbill wrote: 
> A few years ago, I wrote a shell script that I installed on my SB-Radio
> to read out its internal light sensor and post that data to Domoticz in
> a 5-second CRON. I could do that by SSHing into the Radio and by knowing
> it’s a Linux-based device, I could find my way around on its file system
> pretty quickly. 
> 
> When my script is running, it in no way changes the behavior of the SBR
> from a user’s perspective. That did make me very aware of what happens
> when a device on your local LAN is compromised to become part of a
> botnet. My code wasn’t malicious and I wrote it myself, but what if?
> 
> To get in to the SBR, you have to navigate the menu structure in the
> player’s GUI and enable SSH. In theory you need physical access to the
> player to do that. But of course if there’s a zero-day in the BusyBox
> then who knows…
> 
> The chances are very, very, very small. But never, ever, say never.

Thanks a lot for your replies. The main trigger for my concern are the
frequent warnings in the media about smart home appliances (like
dishwashers with wifi) that are often not updated, so that unpatched
weaknesses can be exploited by hackers who then can enter your home
network and sniff out what you're doing on your other devices, such as
phone and computer. 
So my assumption was that eventually in every device that is longer on
the market, weaknesses may be discovered and exploited. The same also
applies for computers and phones, of course. But your testing puts my
mind at least a little, awesome that you did that, philchillbill.



jablonski's Profile: http://forums.slimdevices.com/member.php?userid=23317
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-21 Thread philchillbill

A few years ago, I wrote a shell script that I installed on my SB-Radio
to read out its internal light sensor and post that data to Domoticz in
a 5-second CRON. I could do that by SSHing into the Radio and by knowing
it’s a Linux-based device, I could find my way around on its file system
pretty quickly. 

When my script is running, it in no way changes the behavior of the SBR
from a user’s perspective. That did make me very aware of what happens
when a device on your local LAN is compromised to become part of a
botnet. My code wasn’t malicious and I wrote it myself, but what if?

To get in to the SBR, you have to navigate the menu structure in the
player’s GUI and enable SSH. In theory you need physical access to the
player to do that. But of course if there’s a zero-day in the BusyBox
then who knows…

The chances are very, very, very small. But never, ever, say never.





philchillbill's Profile: http://forums.slimdevices.com/member.php?userid=68920
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


Re: [slim] Security risks of old Squeezeboxes(?)

2021-08-21 Thread d6jg

jablonski wrote: 
> Hi All,
> 
> After searching the internet and this forum for a bit, I decided to
> start this subject because I could not really find anything about it.
> Apologies in advance if I overlooked something obvious.
> I wanted to post it on the new logitech forum that was announced
> recently, but it seems to be down at the moment. So here it goes...
> 
> I have a bunch of Squeezeboxes (some Classics, a Duet and then an
> additional controller), and since very recently, they are connected to a
> recent version of LMS on Picoreplayer.
> 
> I really still love my Squeezeboxes and would prefer to keep using them
> for as long as possible, however, I have become increasingly concerned
> about any potential security risks.
> The firmware (obviously) isn't updated anymore, at least not that I'm
> aware.
> 
> So does anyone know if there is any clear and present danger, to use
> these devices on the same network as my phone, laptop, company laptop,
> and so on?
> 
> And is there any difference in that risk between being connected
> directly to mysqueezebox.com vs being connected to the latest available
> LMS?
> (Would connecting to a recent LMS mitigate any of the security risks of
> directly connecting with an old SB to the internet?)
> 
> I am considering to setup a separate network, but if it turns out that
> there's not much reason to worry, then I'd prefer to avoid the hassle.

I don’t think there are any security risks applying to SB Devices as
they themselves don’t hold data and are built purely to stream music. 

You are far more likely to introduce a malware into your network by
clicking on a link in an email or on a website than you are of
introducing it via LMS.



VB2.4[/B] STORAGE *QNAP TS419P (NFS)
[B]Living Room* Joggler & Pi4/Khadas  -> Onkyo TXNR686 -> Celestion F20s

*Office* Joggler & Pi3 -> Denon RCD N8 -> Celestion F10s 
*Dining Room* SB Boom 
*Kitchen* UE Radio (upgraded to SB Radio)
*Bedroom (Bedside)* Pi Zero+DAC ->ToppingTP21 ->AKG Headphones
*Bedroom (TV) & Bathroom* SB Touch ->Denon AVR ->Mordaunt Short M10s +
Kef ceiling speakers
*Guest Room* Joggler > Topping Amp -> Wharfedale Modus Cubes
Everything controlled by iPeng & Material on iOS

d6jg's Profile: http://forums.slimdevices.com/member.php?userid=44051
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss


[slim] Security risks of old Squeezeboxes(?)

2021-08-21 Thread jablonski


Hi All,

After searching the internet and this forum for a bit, I decided to
start this subject because I could not really find anything about it.
Apologies in advance if I overlooked something obvious.
I wanted to post it on the new logitech forum that was announced
recently, but it seems to be down at the moment. So here it goes...

I have a bunch of Squeezeboxes (some Classics, a Duet and then an
additional controller), and since very recently, they are connected to a
recent version of LMS on Picoreplayer.

I really still love my Squeezeboxes and would prefer to keep using them
for as long as possible, however, I have become increasingly concerned
about any potential security risks.
The firmware (obviously) isn't updated anymore, at least not that I'm
aware.

So does anyone know if there is any clear and present danger, to use
these devices on the same network as my phone, laptop, company laptop,
and so on?

And is there any difference in that risk between being connected
directly to mysqueezebox.com vs being connected to the latest available
LMS?
(Would connecting to a recent LMS mitigate any of the security risks of
directly connecting with an old SB to the internet?)

I am considering to setup a separate network, but if it turns out that
there's not much reason to worry, then I'd prefer to avoid the hassle.



jablonski's Profile: http://forums.slimdevices.com/member.php?userid=23317
View this thread: http://forums.slimdevices.com/showthread.php?t=115017

___
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss