Re: [Elecraft] K4 and Linux Infrastructure

2019-06-04 Thread Dave B via Elecraft
Hi.

The problem these days, is not only if something is exposed to the www,
but even if it can only be "seen" by other nodes on the same LAN.   Such
as the main shack PC, that probably can reach out to the WWW.  Once
"something" gets into that PC (or your IoT lightbulbs!)  It can at it's
leisure scan your shack (and/or home) LAN, looking for other
nodes/devices to poke at later, after "phoning home" with the details of
what it found.

You all have got your dumb IoT devices (including TV's and PVR's) on a
segregated VLAN haven't you?  No!  You have work to do then!

Also, irrespective of the OS used, one way to reduce the chance of user
induced mayhem, is to boot from a (protected) read only medium, copy the
OS to RAM (for speed) and use another SD card as persistent storage,
with an option during the initial boot (if for example) some combination
of keys are held down, to load the default settings into the "user"
area, as an easy "Factory Reset" feature.

Then, whatever the user does, when (not if) they muck it up, there is an
easy get out of jail free card.

As to the network security issue, the only "secure" network device, is
disconnected, powered off and in a sealed & screened box!  Period.  What
may be regarded as secure "now", in six weeks time could be hacked to
hell and back by script kiddies all over the world.  In truth,
currently, the bad types have the upper hand.

Sadly (as with any OS) a continual surveillance of the ecostructure is
needed, and the inevitable updates.  There are many ways to do that of
course, some easier, and some more "secure" than others.  Security and
convenience are mutually exclusive, sadly.  (In the case of a RO boot
medium, a switch would need to be flipped to allow a (once verified)
image to be flashed onto it, one time, said switch auto resetting once
programmed.)  Or another card shipped in by post, and that's not as
secure as you might think either!

Regarding legitimate use of a LAN/WAN connection.  One would hope(?)
that at the bare minimum:-

The radio control firmware is not run as root.

Incoming ssh requests are ignored/blocked.

In the case ssh connections are allowed, root login by ssh is blocked,
and only pre authorised (by certificate) user(s) are allowed in
(Elecraft themselves for example.)

The use of su and sudo are blocked if anyone does get to a command line
as "a user".  Also browsing the OS software/settings folders is blocked,
should the firmware die, leaving the user at a command line.

Have the radio "reach out" to Elecraft central when needed using OpenVPN
(for example, using the current state of the art security model) to
check for updates (user initiated) or for Elecraft to remote admin,
after telling the user how to initiate that feature..

Any such automatic updates are "staged" within the rig, until they can
be verified as complete, uncorrupted and genuine, before being applied.

Any custom daemon software intended for legitimate remote
control/interface use, should be written in such a way, that any corrupt
or unknown commands (and/or parameters) are ignored, not even returning
any error code to the initiator.  Greatly reducing the ability of it to
be "fuzzed" for vulnerabilities.

Also, . 

Similarly, any code created to allow the radio to control accessories
via the LAN port (PA's ATU's etc) should be created with security in
mind.  Such command & communication links should be encrypted, so only
the intended endpoints can see/use the data.  ESPECIALLY, in the case
that such links traverse the public internet...  (A licence requirement
here in the UK by the way!)

Any built in Digimode software (PSK, RTTY, CW, JT modes etc) should also
be run in a VM, within the radio.  Hopefully preventing any possible
remote takeover issues via that route!  (None that I know of at this
time, but ...)

~ ~ ~

Trouble with all the above it, it takes */a lot of time and effort/* by
the equipment makers to do, and do right, plus the testing of it all, or
contracting in some qualified penetration-testing types to test it all
for you.  And that cost money.   That, and capable hardware to do all
that, is also not exactly low cost (but is getting lower in cost.)

Also, all the above is not unique to Linux, */all OS's/* have their
issues, just that some are better(or worse) than others.

Effective Security is difficult to make user proof.  Educate the users
first.  If nothing else, listen to the "Security Now" podcasts by your
countrymen.  https://twit.tv/sn  (Another episode later today.) 
Entertaining, and you might get an appreciation of just how much mayhem
is going on out there right now.

Happy Days!

Dave B G0WBX.

(I have learnt much of the above the hard way, by digging friends and
family, and some work colleagues, out of the mire induced by a lack of
knowledge of how to stay safe on-line, and from the Security Now podcasts.)


-- 
Created on and sent from a Unix like PC running and using free and open source 
software:


Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Eric Swartz - WA6HHQ, Elecraft
I apologize if we have created any confusion on this topic.  (Yup - we have been 
a little busy as of late with the K4 introduction ;-)


To be clear - we do not plan on granting open access to the main CPU or K4 
internal operating system. That would be a impossible situation to support and 
it would significantly impact product stability.


At this point, any additional internal software applications developed for the 
K4 will be coming via Elecraft.


Of course we will certainly will have a robust external API for the K4.

In the interest of reducing list bandwidth overload, lets end this thread at 
this time.


73,
Eric
/elecraft.com/

On 6/3/2019 3:31 PM, Dave Cole (NK7Z) wrote:
Based on the lack of ability to chance the CW rise times, I suspect Elecraft 
will not give access to the processor, and OS.  I would not.


Why?  If too many users change things, and break things, the radio will get a 
bad rep...  If Elecraft is smart, they will lock the users out of that level 
of access.


__
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecraft@mailman.qth.net

This list hosted by: http://www.qsl.net
Please help support this email list: http://www.qsl.net/donate.html

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread w7...@comcast.net


Sent from my Verizon Wireless 4GLTE smartphone

- Reply message -
From: "Lynn W. Taylor, WB6UUT" 
To: 
Subject: [Elecraft] K4 and Linux Infrastructure
Date: Mon, Jun 3, 2019 15:45


Seriously folks, think about the folks in Elecraft support and Service.

Imagine spending an hour working through a problem just to find out that 
someone is running modified firmware (and this is firmware, not software 
for us to play with).

It's an embedded system.  If you break it, you own both parts, and 
Elecraft would need a 100% reliable way to verify that you didn't 
introduce bugs.

Let this idea go, folks.

-- Lynn

On 6/3/2019 3:31 PM, Dave Cole (NK7Z) wrote:
> Based on the lack of ability to chance the CW rise times, I suspect 
> Elecraft will not give access to the processor, and OS.  I would not.
> 
> Why?  If too many users change things, and break things, the radio will 
> get a bad rep...  If Elecraft is smart, they will lock the users out of 
> that level of access.
> 
> 73s and thanks,
> Dave (NK7Z)
> https://www.nk7z.net
> ARRL Technical Specialist
> ARRL Volunteer Examiner
> ARRL Asst. Director, NW Division, Technical Resource
> 
> On 6/3/19 2:04 PM, Jeff Scaparra wrote:
>> I believe these are all good points that elecraft should consider. As for
>> myself I am a tinker-er and as such i can imagine many things i would 
>> like
>> to do with the on board system. Personally I would like the option of
>> "unlocking" access do that I could use the underlying linux system and
>> would be willing to be responsible for the security of the system if I 
>> did
>> so. I know there will be many who just want a good radio to operate and
>> that is why I am suggesting that maybe this is a opt into thing with the
>> caveat that if you unlock this your responsible to keep the radio secure.
>>
>> Jeff
>> N5SDR
>>
>> On Mon, Jun 3, 2019, 3:35 PM Dave New, N8SBE  wrote:
>>
>>> Paul,
>>>
>>> I believe you mistook the 'direction' of DDOS attack I was talking
>>> about.
>>>
>>> The K4 would not be the target of a DDOS attack, but rather an unwitting
>>> participant in launching a DDOS attack as part of robot army of IoT
>>> devices.
>>>
>>> Thousands of hacked IoT devices are for rent on the dark web, for any
>>> script kiddie that wants to attack a particular target.
>>>
>>> Also, it may be popular to use hacked web sites, or various documents
>>> with trojan horse loads to deliver ransom ware or bitcoin miners, but
>>> there are other known vectors, including various open ports found while
>>> scanning.  It may be the a router would be able to block access, but the
>>> very peer-to-peer nature of the K4 (controlling other K4's or being
>>> controlled by another K4 or PC, tablet, etc, means that routers would
>>> need to allow certain inbound connections through the router or
>>> firewall.  These allow for interesting attack vectors, which will
>>> certainly be exercised, if possible.
>>>
>>> 73,
>>>
>>> -- Dave, N8SBE
>>>
>>>  Original Message 
>>> Subject: Re: [Elecraft] K4 and Linux Infrastructure
>>> From: Paul Gacek 
>>> Date: Mon, June 03, 2019 4:00 pm
>>> To: "Dave New, N8SBE" 
>>> Cc: Elecraft Reflector , Rick WA6NHC
>>> 
>>>
>>> Dave
>>>
>>> DDOS is quite hard for any end point (PC, iPhone, K4 etc) to deal with
>>> effectively. If a million zombie Macs decide to simultaneously attack
>>> your end point your best chance is as Rick states, a device that makes
>>> up the perimeter defenses such as a firewall or cyber security
>>> alternative (i.e router, IDP). Most homes don’t have anything
>>> particularly sophisticated deployed and are therefore somewhat
>>> vulnerable. In truth DDOS attacks are quite rare and typically not aimed
>>> at Citizen Dave or his neighbors. Protection albeit optimistic is really
>>> in the realm of a corporate network but even then we have a few cases
>>> where iconic sites get hammered and go dark. Enabling the K4 to defend
>>> against DDOS is a little like building a house to withstand random bits
>>> of ISS dropping in unexpectedly; not something I’m expecting to be
>>> paying for.
>>>
>>> Unwanted ransomware or bitcoin mining programs are most likely the
>>> result of an unwitting end user at and end point (PC, Android etc) doing
>>> something that resulted in the malware ending up on their end point.
>>> Could 

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Fred Jensen
Well, all good discussion, but I advise that you do not hold your breath 
for "open firm/software in the K4," or basically any access at all.  
It's just beyond what any manufacturer can do.  I suppose Eric, who is 
noted for his business skills, could start up an "E-tunes" app store for 
the K4, with developer standards, testing, and the like.  I doubt that's 
remotely close to the top of his To-Do list however.


Having just had my 79th birthday yesterday [thanks for all the HB's!], I 
remember when Heath came out with an analog computer at what would have 
been the beginning of the "Science Hobbyist" revolution.  Without the 
Internet, there were no Email lists of course, but the number of "I did 
this and it didn't do what I expected" inquiries was way more than they 
expected.  Fortunately [for Heath] the customer base was very rapidly 
exhausted and the Heathkit Analog Computer silently sailed into the sunset.


73,
Fred ["Skip"] K6DGW
Sparks NV DM09dn
Washoe County

PS:  Anyone who tells you "79 feels just like 78" is smoking their socks.

On 6/3/2019 4:02 PM, Jeff Scaparra wrote:

Missed reply all.

At some level even if they do "only" have apps they will have this problem.
App developers will need to be able to modify and test things. Also I doubt
that there would be many apps if this is a separate process than mainstream
linux/windows. why would a hobby developer want to build a separate thing
just for one pretty expensive radio when they could just build the app for
linux or windows and support everyone.

Maybe they have some trick to make app onboarding easy.

My 2 cents
Jeff N6SDR



__
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecraft@mailman.qth.net

This list hosted by: http://www.qsl.net
Please help support this email list: http://www.qsl.net/donate.html

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Leroy Buller
Interesting discussion.  I think and surmise that the engineers at Elecraft
had to put in a pretty powerful OS and processor to do all of what they
want to do in the box.  Especially with 4 RX in the box plus all the other
things it will do.  But, besides the issues mentioned in this thread  it is
exciting what the possibilities are with the CPU in the box.  I think it is
ingenuous.

Lee K0WA

On Mon, Jun 3, 2019, 5:45 PM Lynn W. Taylor, WB6UUT <
kx...@coldrockshotbrooms.com wrote:

> Seriously folks, think about the folks in Elecraft support and Service.
>
> Imagine spending an hour working through a problem just to find out that
> someone is running modified firmware (and this is firmware, not software
> for us to play with).
>
> It's an embedded system.  If you break it, you own both parts, and
> Elecraft would need a 100% reliable way to verify that you didn't
> introduce bugs.
>
> Let this idea go, folks.
>
> -- Lynn
>
> On 6/3/2019 3:31 PM, Dave Cole (NK7Z) wrote:
> > Based on the lack of ability to chance the CW rise times, I suspect
> > Elecraft will not give access to the processor, and OS.  I would not.
> >
> > Why?  If too many users change things, and break things, the radio will
> > get a bad rep...  If Elecraft is smart, they will lock the users out of
> > that level of access.
> >
> > 73s and thanks,
> > Dave (NK7Z)
> > https://www.nk7z.net
> > ARRL Technical Specialist
> > ARRL Volunteer Examiner
> > ARRL Asst. Director, NW Division, Technical Resource
> >
> > On 6/3/19 2:04 PM, Jeff Scaparra wrote:
> >> I believe these are all good points that elecraft should consider. As
> for
> >> myself I am a tinker-er and as such i can imagine many things i would
> >> like
> >> to do with the on board system. Personally I would like the option of
> >> "unlocking" access do that I could use the underlying linux system and
> >> would be willing to be responsible for the security of the system if I
> >> did
> >> so. I know there will be many who just want a good radio to operate and
> >> that is why I am suggesting that maybe this is a opt into thing with the
> >> caveat that if you unlock this your responsible to keep the radio
> secure.
> >>
> >> Jeff
> >> N5SDR
> >>
> >> On Mon, Jun 3, 2019, 3:35 PM Dave New, N8SBE  wrote:
> >>
> >>> Paul,
> >>>
> >>> I believe you mistook the 'direction' of DDOS attack I was talking
> >>> about.
> >>>
> >>> The K4 would not be the target of a DDOS attack, but rather an
> unwitting
> >>> participant in launching a DDOS attack as part of robot army of IoT
> >>> devices.
> >>>
> >>> Thousands of hacked IoT devices are for rent on the dark web, for any
> >>> script kiddie that wants to attack a particular target.
> >>>
> >>> Also, it may be popular to use hacked web sites, or various documents
> >>> with trojan horse loads to deliver ransom ware or bitcoin miners, but
> >>> there are other known vectors, including various open ports found while
> >>> scanning.  It may be the a router would be able to block access, but
> the
> >>> very peer-to-peer nature of the K4 (controlling other K4's or being
> >>> controlled by another K4 or PC, tablet, etc, means that routers would
> >>> need to allow certain inbound connections through the router or
> >>> firewall.  These allow for interesting attack vectors, which will
> >>> certainly be exercised, if possible.
> >>>
> >>> 73,
> >>>
> >>> -- Dave, N8SBE
> >>>
> >>>  Original Message 
> >>> Subject: Re: [Elecraft] K4 and Linux Infrastructure
> >>> From: Paul Gacek 
> >>> Date: Mon, June 03, 2019 4:00 pm
> >>> To: "Dave New, N8SBE" 
> >>> Cc: Elecraft Reflector , Rick WA6NHC
> >>> 
> >>>
> >>> Dave
> >>>
> >>> DDOS is quite hard for any end point (PC, iPhone, K4 etc) to deal with
> >>> effectively. If a million zombie Macs decide to simultaneously attack
> >>> your end point your best chance is as Rick states, a device that makes
> >>> up the perimeter defenses such as a firewall or cyber security
> >>> alternative (i.e router, IDP). Most homes don’t have anything
> >>> particularly sophisticated deployed and are therefore somewhat
> >>> vulnerable. In truth DDOS attacks are quite rare and typically n

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Jeff Scaparra
Missed reply all.

At some level even if they do "only" have apps they will have this problem.
App developers will need to be able to modify and test things. Also I doubt
that there would be many apps if this is a separate process than mainstream
linux/windows. why would a hobby developer want to build a separate thing
just for one pretty expensive radio when they could just build the app for
linux or windows and support everyone.

Maybe they have some trick to make app onboarding easy.

My 2 cents
Jeff N6SDR


>> On Mon, Jun 3, 2019, 5:45 PM Lynn W. Taylor, WB6UUT <
>> kx...@coldrockshotbrooms.com> wrote:
>>
>>> Seriously folks, think about the folks in Elecraft support and Service.
>>>
>>> Imagine spending an hour working through a problem just to find out that
>>> someone is running modified firmware (and this is firmware, not software
>>> for us to play with).
>>>
>>> It's an embedded system.  If you break it, you own both parts, and
>>> Elecraft would need a 100% reliable way to verify that you didn't
>>> introduce bugs.
>>>
>>> Let this idea go, folks.
>>>
>>> -- Lynn
>>>
>>> On 6/3/2019 3:31 PM, Dave Cole (NK7Z) wrote:
>>> > Based on the lack of ability to chance the CW rise times, I suspect
>>> > Elecraft will not give access to the processor, and OS.  I would not.
>>> >
>>> > Why?  If too many users change things, and break things, the radio
>>> will
>>> > get a bad rep...  If Elecraft is smart, they will lock the users out
>>> of
>>> > that level of access.
>>> >
>>> > 73s and thanks,
>>> > Dave (NK7Z)
>>> > https://www.nk7z.net
>>> > ARRL Technical Specialist
>>> > ARRL Volunteer Examiner
>>> > ARRL Asst. Director, NW Division, Technical Resource
>>> >
>>> > On 6/3/19 2:04 PM, Jeff Scaparra wrote:
>>> >> I believe these are all good points that elecraft should consider. As
>>> for
>>> >> myself I am a tinker-er and as such i can imagine many things i would
>>> >> like
>>> >> to do with the on board system. Personally I would like the option of
>>> >> "unlocking" access do that I could use the underlying linux system and
>>> >> would be willing to be responsible for the security of the system if
>>> I
>>> >> did
>>> >> so. I know there will be many who just want a good radio to operate
>>> and
>>> >> that is why I am suggesting that maybe this is a opt into thing with
>>> the
>>> >> caveat that if you unlock this your responsible to keep the radio
>>> secure.
>>> >>
>>> >> Jeff
>>> >> N5SDR
>>> >>
>>> >> On Mon, Jun 3, 2019, 3:35 PM Dave New, N8SBE  wrote:
>>> >>
>>> >>> Paul,
>>> >>>
>>> >>> I believe you mistook the 'direction' of DDOS attack I was talking
>>> >>> about.
>>> >>>
>>> >>> The K4 would not be the target of a DDOS attack, but rather an
>>> unwitting
>>> >>> participant in launching a DDOS attack as part of robot army of IoT
>>> >>> devices.
>>> >>>
>>> >>> Thousands of hacked IoT devices are for rent on the dark web, for any
>>> >>> script kiddie that wants to attack a particular target.
>>> >>>
>>> >>> Also, it may be popular to use hacked web sites, or various documents
>>> >>> with trojan horse loads to deliver ransom ware or bitcoin miners, but
>>> >>> there are other known vectors, including various open ports found
>>> while
>>> >>> scanning.  It may be the a router would be able to block access, but
>>> the
>>> >>> very peer-to-peer nature of the K4 (controlling other K4's or being
>>> >>> controlled by another K4 or PC, tablet, etc, means that routers would
>>> >>> need to allow certain inbound connections through the router or
>>> >>> firewall.  These allow for interesting attack vectors, which will
>>> >>> certainly be exercised, if possible.
>>> >>>
>>> >>> 73,
>>> >>>
>>> >>> -- Dave, N8SBE
>>> >>>
>>> >>>  Original Message 
>>> >>> Subject: Re: [Elecraft] K4 and Linux Infr

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread W2xj
At this point I am pretty sure Elecraft is up to their neck getting a clean 
basic radio out on schedule. Additional bells and whistles will probably take a 
while. 

Sent from my iPad

> On Jun 3, 2019, at 6:07 PM, Al Lorona  wrote:
> 
> You guys have now reached the scenario I was trying to ask about last week, 
> but obviously didn't make myself understood.
> When I asked if the K4 would be able to 'talk to the outside world', I meant 
> an ability to initiate communications with a web site, a server, or something 
> else.
> Yes, allowing users to get down to the operating system would probably be 
> unmanageable. But what about loading 'apps', in the same way that you install 
> apps on your phone? I could see a logging app, a reverse beacon app, or 
> something else that would add real functionality to the radio. I'm sure 
> that's been talked about... and I wonder what the thinking is along these 
> lines.
> R,
> Al  W6LX
> __
> Elecraft mailing list
> Home: http://mailman.qth.net/mailman/listinfo/elecraft
> Help: http://mailman.qth.net/mmfaq.htm
> Post: mailto:Elecraft@mailman.qth.net
> 
> This list hosted by: http://www.qsl.net
> Please help support this email list: http://www.qsl.net/donate.html

__
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecraft@mailman.qth.net

This list hosted by: http://www.qsl.net
Please help support this email list: http://www.qsl.net/donate.html


Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Lynn W. Taylor, WB6UUT

Seriously folks, think about the folks in Elecraft support and Service.

Imagine spending an hour working through a problem just to find out that 
someone is running modified firmware (and this is firmware, not software 
for us to play with).


It's an embedded system.  If you break it, you own both parts, and 
Elecraft would need a 100% reliable way to verify that you didn't 
introduce bugs.


Let this idea go, folks.

-- Lynn

On 6/3/2019 3:31 PM, Dave Cole (NK7Z) wrote:
Based on the lack of ability to chance the CW rise times, I suspect 
Elecraft will not give access to the processor, and OS.  I would not.


Why?  If too many users change things, and break things, the radio will 
get a bad rep...  If Elecraft is smart, they will lock the users out of 
that level of access.


73s and thanks,
Dave (NK7Z)
https://www.nk7z.net
ARRL Technical Specialist
ARRL Volunteer Examiner
ARRL Asst. Director, NW Division, Technical Resource

On 6/3/19 2:04 PM, Jeff Scaparra wrote:

I believe these are all good points that elecraft should consider. As for
myself I am a tinker-er and as such i can imagine many things i would 
like

to do with the on board system. Personally I would like the option of
"unlocking" access do that I could use the underlying linux system and
would be willing to be responsible for the security of the system if I 
did

so. I know there will be many who just want a good radio to operate and
that is why I am suggesting that maybe this is a opt into thing with the
caveat that if you unlock this your responsible to keep the radio secure.

Jeff
N5SDR

On Mon, Jun 3, 2019, 3:35 PM Dave New, N8SBE  wrote:


Paul,

I believe you mistook the 'direction' of DDOS attack I was talking
about.

The K4 would not be the target of a DDOS attack, but rather an unwitting
participant in launching a DDOS attack as part of robot army of IoT
devices.

Thousands of hacked IoT devices are for rent on the dark web, for any
script kiddie that wants to attack a particular target.

Also, it may be popular to use hacked web sites, or various documents
with trojan horse loads to deliver ransom ware or bitcoin miners, but
there are other known vectors, including various open ports found while
scanning.  It may be the a router would be able to block access, but the
very peer-to-peer nature of the K4 (controlling other K4's or being
controlled by another K4 or PC, tablet, etc, means that routers would
need to allow certain inbound connections through the router or
firewall.  These allow for interesting attack vectors, which will
certainly be exercised, if possible.

73,

-- Dave, N8SBE

 Original Message 
Subject: Re: [Elecraft] K4 and Linux Infrastructure
From: Paul Gacek 
Date: Mon, June 03, 2019 4:00 pm
To: "Dave New, N8SBE" 
Cc: Elecraft Reflector , Rick WA6NHC


Dave

DDOS is quite hard for any end point (PC, iPhone, K4 etc) to deal with
effectively. If a million zombie Macs decide to simultaneously attack
your end point your best chance is as Rick states, a device that makes
up the perimeter defenses such as a firewall or cyber security
alternative (i.e router, IDP). Most homes don’t have anything
particularly sophisticated deployed and are therefore somewhat
vulnerable. In truth DDOS attacks are quite rare and typically not aimed
at Citizen Dave or his neighbors. Protection albeit optimistic is really
in the realm of a corporate network but even then we have a few cases
where iconic sites get hammered and go dark. Enabling the K4 to defend
against DDOS is a little like building a house to withstand random bits
of ISS dropping in unexpectedly; not something I’m expecting to be
paying for.

Unwanted ransomware or bitcoin mining programs are most likely the
result of an unwitting end user at and end point (PC, Android etc) doing
something that resulted in the malware ending up on their end point.
Could be surfing to a suspect web site (www.PawnStorm4U.com) or even
going to a compromised but reputable site such as NASA.gov.
Alternatively, it could be someone opening a compromised PDF or
Word/Excel attachment. The best protection here is to be cautious and
mindful of what you do in the cyber world and absolutely make sure you
are running the most uptodate OS (not XP) and to its most current patch
level.


Presumably but maybe not, the K4 won’t make available to the ham
operator a browser that allows them to surf wherever nor an email client
that they can read Excel attachments at the whim of the ham operator.
That is best done outside of the K4.


Hardening Linux, following best practices on coding and penetration
testing are all things to be aware of and implement as appropriately.


For those who might be interested in perusing details of some of these
topics these links might be interesting;
Secure Coding Practices
https://msdn.microsoft.com/en-us/aa570401Hardening Linux

https://www.computerworld.com/article/3144985/linux-hardening-a-15-step-checklist-for-a-secure-linux-server.htmlPe

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Dave Cole (NK7Z)
Based on the lack of ability to chance the CW rise times, I suspect 
Elecraft will not give access to the processor, and OS.  I would not.


Why?  If too many users change things, and break things, the radio will 
get a bad rep...  If Elecraft is smart, they will lock the users out of 
that level of access.


73s and thanks,
Dave (NK7Z)
https://www.nk7z.net
ARRL Technical Specialist
ARRL Volunteer Examiner
ARRL Asst. Director, NW Division, Technical Resource

On 6/3/19 2:04 PM, Jeff Scaparra wrote:

I believe these are all good points that elecraft should consider. As for
myself I am a tinker-er and as such i can imagine many things i would like
to do with the on board system. Personally I would like the option of
"unlocking" access do that I could use the underlying linux system and
would be willing to be responsible for the security of the system if I did
so. I know there will be many who just want a good radio to operate and
that is why I am suggesting that maybe this is a opt into thing with the
caveat that if you unlock this your responsible to keep the radio secure.

Jeff
N5SDR

On Mon, Jun 3, 2019, 3:35 PM Dave New, N8SBE  wrote:


Paul,

I believe you mistook the 'direction' of DDOS attack I was talking
about.

The K4 would not be the target of a DDOS attack, but rather an unwitting
participant in launching a DDOS attack as part of robot army of IoT
devices.

Thousands of hacked IoT devices are for rent on the dark web, for any
script kiddie that wants to attack a particular target.

Also, it may be popular to use hacked web sites, or various documents
with trojan horse loads to deliver ransom ware or bitcoin miners, but
there are other known vectors, including various open ports found while
scanning.  It may be the a router would be able to block access, but the
very peer-to-peer nature of the K4 (controlling other K4's or being
controlled by another K4 or PC, tablet, etc, means that routers would
need to allow certain inbound connections through the router or
firewall.  These allow for interesting attack vectors, which will
certainly be exercised, if possible.

73,

-- Dave, N8SBE

 Original Message 
Subject: Re: [Elecraft] K4 and Linux Infrastructure
From: Paul Gacek 
Date: Mon, June 03, 2019 4:00 pm
To: "Dave New, N8SBE" 
Cc: Elecraft Reflector , Rick WA6NHC


Dave

DDOS is quite hard for any end point (PC, iPhone, K4 etc) to deal with
effectively. If a million zombie Macs decide to simultaneously attack
your end point your best chance is as Rick states, a device that makes
up the perimeter defenses such as a firewall or cyber security
alternative (i.e router, IDP). Most homes don’t have anything
particularly sophisticated deployed and are therefore somewhat
vulnerable. In truth DDOS attacks are quite rare and typically not aimed
at Citizen Dave or his neighbors. Protection albeit optimistic is really
in the realm of a corporate network but even then we have a few cases
where iconic sites get hammered and go dark. Enabling the K4 to defend
against DDOS is a little like building a house to withstand random bits
of ISS dropping in unexpectedly; not something I’m expecting to be
paying for.

Unwanted ransomware or bitcoin mining programs are most likely the
result of an unwitting end user at and end point (PC, Android etc) doing
something that resulted in the malware ending up on their end point.
Could be surfing to a suspect web site (www.PawnStorm4U.com) or even
going to a compromised but reputable site such as NASA.gov.
Alternatively, it could be someone opening a compromised PDF or
Word/Excel attachment. The best protection here is to be cautious and
mindful of what you do in the cyber world and absolutely make sure you
are running the most uptodate OS (not XP) and to its most current patch
level.


Presumably but maybe not, the K4 won’t make available to the ham
operator a browser that allows them to surf wherever nor an email client
that they can read Excel attachments at the whim of the ham operator.
That is best done outside of the K4.


Hardening Linux, following best practices on coding and penetration
testing are all things to be aware of and implement as appropriately.


For those who might be interested in perusing details of some of these
topics these links might be interesting;
Secure Coding Practices
https://msdn.microsoft.com/en-us/aa570401Hardening Linux

https://www.computerworld.com/article/3144985/linux-hardening-a-15-step-checklist-for-a-secure-linux-server.htmlPenetration
Testing https://www.tenable.com


With Elecraft’s proximity to Silicon Valley and presumably contacts
abounding, I’m optimistic the K4 will do us proud and I won’t have
to rely on Rocky and Bullwinkle to keep nefarious foreign agents out of
my K4.


Paul
W6PNG/M0SNA
www.nomadic.blog






On Jun 3, 2019, at 7:58 PM, Rick WA6NHC  wrote:

Much of that protection can be implemented at the router level (>90% of
all sites) and the internal linux (fairly bullet proof) w

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Al Lorona
 You guys have now reached the scenario I was trying to ask about last week, 
but obviously didn't make myself understood.
When I asked if the K4 would be able to 'talk to the outside world', I meant an 
ability to initiate communications with a web site, a server, or something else.
Yes, allowing users to get down to the operating system would probably be 
unmanageable. But what about loading 'apps', in the same way that you install 
apps on your phone? I could see a logging app, a reverse beacon app, or 
something else that would add real functionality to the radio. I'm sure that's 
been talked about... and I wonder what the thinking is along these lines.
R,
Al  W6LX
__
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecraft@mailman.qth.net

This list hosted by: http://www.qsl.net
Please help support this email list: http://www.qsl.net/donate.html

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Grant Youngman
The Elecraft guys might agree to this after a night of heavy drinking, but I 
doubt that will happen.  You’re right … if it isn’t locked down it would be a 
nightmare for them, and one for the rest of us, too.

Grant NQ5T
K3 #2091 KX3 #8342

> On Jun 3, 2019, at 5:43 PM, Fred Jensen  wrote:
> 
> Jeff:  In addition to the nightmare for Elecraft you point out, can you 
> imagine the traffic load it would create on this list?  "I loaded WSJT-X, 
> HRD, and N1MM+ and now the K4 doesn't work.  What's wrong?" [:-)
> 
> 73,
> Fred ["Skip"] K6DGW
> Sparks NV DM09dn
> Washoe County
> \

__
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecraft@mailman.qth.net

This list hosted by: http://www.qsl.net
Please help support this email list: http://www.qsl.net/donate.html

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Fred Jensen
Jeff:  In addition to the nightmare for Elecraft you point out, can you 
imagine the traffic load it would create on this list?  "I loaded 
WSJT-X, HRD, and N1MM+ and now the K4 doesn't work.  What's wrong?" [:-)


73,
Fred ["Skip"] K6DGW
Sparks NV DM09dn
Washoe County

On 6/3/2019 2:19 PM, Jeff Scaparra wrote:

Actually there is more to think about than security here as well. What
would elecraft do about users that break the system but misconfiguring
stuff, etc... if they allow users to opt in I would fully expect users to
have to agree to owning responsibility for any modifications. This would
mean that if you have a problem with the radio and send it in and the
problem is solved by reflashing the base image then you should be charged
for wasting their time. I would also expect to have the base image given to
users so we can fix our own mistakes.


I think this problem will exist one way or another. Quite likely elecraft
will be legally required to make available some or all of the base image of
the radio due to software licences. It is also likely that someone will
figure out how to get access to the underlying system. In my opinion
elecraft can get out in front by setting expectations and telling users if
you do this your on your own from a warranty perspective. It would be nice
of them to limit that but they could have that void the whole warranty.

It will be interesting to see how they handle this. This is precisely the
reason I got put my deposit for the second group. I want to see how this
shakes out before commiting which means I cant be the first one with the
radio.

Jeff N5SDR




__
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecraft@mailman.qth.net

This list hosted by: http://www.qsl.net
Please help support this email list: http://www.qsl.net/donate.html

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Jeff Scaparra
Actually there is more to think about than security here as well. What
would elecraft do about users that break the system but misconfiguring
stuff, etc... if they allow users to opt in I would fully expect users to
have to agree to owning responsibility for any modifications. This would
mean that if you have a problem with the radio and send it in and the
problem is solved by reflashing the base image then you should be charged
for wasting their time. I would also expect to have the base image given to
users so we can fix our own mistakes.


I think this problem will exist one way or another. Quite likely elecraft
will be legally required to make available some or all of the base image of
the radio due to software licences. It is also likely that someone will
figure out how to get access to the underlying system. In my opinion
elecraft can get out in front by setting expectations and telling users if
you do this your on your own from a warranty perspective. It would be nice
of them to limit that but they could have that void the whole warranty.

It will be interesting to see how they handle this. This is precisely the
reason I got put my deposit for the second group. I want to see how this
shakes out before commiting which means I cant be the first one with the
radio.

Jeff N5SDR

On Mon, Jun 3, 2019, 4:04 PM Jeff Scaparra  wrote:

> I believe these are all good points that elecraft should consider. As for
> myself I am a tinker-er and as such i can imagine many things i would like
> to do with the on board system. Personally I would like the option of
> "unlocking" access do that I could use the underlying linux system and
> would be willing to be responsible for the security of the system if I did
> so. I know there will be many who just want a good radio to operate and
> that is why I am suggesting that maybe this is a opt into thing with the
> caveat that if you unlock this your responsible to keep the radio secure.
>
> Jeff
> N5SDR
>
> On Mon, Jun 3, 2019, 3:35 PM Dave New, N8SBE  wrote:
>
>> Paul,
>>
>> I believe you mistook the 'direction' of DDOS attack I was talking
>> about.
>>
>> The K4 would not be the target of a DDOS attack, but rather an unwitting
>> participant in launching a DDOS attack as part of robot army of IoT
>> devices.
>>
>> Thousands of hacked IoT devices are for rent on the dark web, for any
>> script kiddie that wants to attack a particular target.
>>
>> Also, it may be popular to use hacked web sites, or various documents
>> with trojan horse loads to deliver ransom ware or bitcoin miners, but
>> there are other known vectors, including various open ports found while
>> scanning.  It may be the a router would be able to block access, but the
>> very peer-to-peer nature of the K4 (controlling other K4's or being
>> controlled by another K4 or PC, tablet, etc, means that routers would
>> need to allow certain inbound connections through the router or
>> firewall.  These allow for interesting attack vectors, which will
>> certainly be exercised, if possible.
>>
>> 73,
>>
>> -- Dave, N8SBE
>>
>>  Original Message 
>> Subject: Re: [Elecraft] K4 and Linux Infrastructure
>> From: Paul Gacek 
>> Date: Mon, June 03, 2019 4:00 pm
>> To: "Dave New, N8SBE" 
>> Cc: Elecraft Reflector , Rick WA6NHC
>> 
>>
>> Dave
>>
>> DDOS is quite hard for any end point (PC, iPhone, K4 etc) to deal with
>> effectively. If a million zombie Macs decide to simultaneously attack
>> your end point your best chance is as Rick states, a device that makes
>> up the perimeter defenses such as a firewall or cyber security
>> alternative (i.e router, IDP). Most homes don’t have anything
>> particularly sophisticated deployed and are therefore somewhat
>> vulnerable. In truth DDOS attacks are quite rare and typically not aimed
>> at Citizen Dave or his neighbors. Protection albeit optimistic is really
>> in the realm of a corporate network but even then we have a few cases
>> where iconic sites get hammered and go dark. Enabling the K4 to defend
>> against DDOS is a little like building a house to withstand random bits
>> of ISS dropping in unexpectedly; not something I’m expecting to be
>> paying for.
>>
>> Unwanted ransomware or bitcoin mining programs are most likely the
>> result of an unwitting end user at and end point (PC, Android etc) doing
>> something that resulted in the malware ending up on their end point.
>> Could be surfing to a suspect web site (www.PawnStorm4U.com) or even
>> going to a compromised but reputable site such as NASA.gov.
>> Alternatively, it could be someone opening a co

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Jeff Scaparra
I believe these are all good points that elecraft should consider. As for
myself I am a tinker-er and as such i can imagine many things i would like
to do with the on board system. Personally I would like the option of
"unlocking" access do that I could use the underlying linux system and
would be willing to be responsible for the security of the system if I did
so. I know there will be many who just want a good radio to operate and
that is why I am suggesting that maybe this is a opt into thing with the
caveat that if you unlock this your responsible to keep the radio secure.

Jeff
N5SDR

On Mon, Jun 3, 2019, 3:35 PM Dave New, N8SBE  wrote:

> Paul,
>
> I believe you mistook the 'direction' of DDOS attack I was talking
> about.
>
> The K4 would not be the target of a DDOS attack, but rather an unwitting
> participant in launching a DDOS attack as part of robot army of IoT
> devices.
>
> Thousands of hacked IoT devices are for rent on the dark web, for any
> script kiddie that wants to attack a particular target.
>
> Also, it may be popular to use hacked web sites, or various documents
> with trojan horse loads to deliver ransom ware or bitcoin miners, but
> there are other known vectors, including various open ports found while
> scanning.  It may be the a router would be able to block access, but the
> very peer-to-peer nature of the K4 (controlling other K4's or being
> controlled by another K4 or PC, tablet, etc, means that routers would
> need to allow certain inbound connections through the router or
> firewall.  These allow for interesting attack vectors, which will
> certainly be exercised, if possible.
>
> 73,
>
> -- Dave, N8SBE
>
>  Original Message 
> Subject: Re: [Elecraft] K4 and Linux Infrastructure
> From: Paul Gacek 
> Date: Mon, June 03, 2019 4:00 pm
> To: "Dave New, N8SBE" 
> Cc: Elecraft Reflector , Rick WA6NHC
> 
>
> Dave
>
> DDOS is quite hard for any end point (PC, iPhone, K4 etc) to deal with
> effectively. If a million zombie Macs decide to simultaneously attack
> your end point your best chance is as Rick states, a device that makes
> up the perimeter defenses such as a firewall or cyber security
> alternative (i.e router, IDP). Most homes don’t have anything
> particularly sophisticated deployed and are therefore somewhat
> vulnerable. In truth DDOS attacks are quite rare and typically not aimed
> at Citizen Dave or his neighbors. Protection albeit optimistic is really
> in the realm of a corporate network but even then we have a few cases
> where iconic sites get hammered and go dark. Enabling the K4 to defend
> against DDOS is a little like building a house to withstand random bits
> of ISS dropping in unexpectedly; not something I’m expecting to be
> paying for.
>
> Unwanted ransomware or bitcoin mining programs are most likely the
> result of an unwitting end user at and end point (PC, Android etc) doing
> something that resulted in the malware ending up on their end point.
> Could be surfing to a suspect web site (www.PawnStorm4U.com) or even
> going to a compromised but reputable site such as NASA.gov.
> Alternatively, it could be someone opening a compromised PDF or
> Word/Excel attachment. The best protection here is to be cautious and
> mindful of what you do in the cyber world and absolutely make sure you
> are running the most uptodate OS (not XP) and to its most current patch
> level.
>
>
> Presumably but maybe not, the K4 won’t make available to the ham
> operator a browser that allows them to surf wherever nor an email client
> that they can read Excel attachments at the whim of the ham operator.
> That is best done outside of the K4.
>
>
> Hardening Linux, following best practices on coding and penetration
> testing are all things to be aware of and implement as appropriately.
>
>
> For those who might be interested in perusing details of some of these
> topics these links might be interesting;
> Secure Coding Practices
> https://msdn.microsoft.com/en-us/aa570401Hardening Linux
>
> https://www.computerworld.com/article/3144985/linux-hardening-a-15-step-checklist-for-a-secure-linux-server.htmlPenetration
> Testing https://www.tenable.com
>
>
> With Elecraft’s proximity to Silicon Valley and presumably contacts
> abounding, I’m optimistic the K4 will do us proud and I won’t have
> to rely on Rocky and Bullwinkle to keep nefarious foreign agents out of
> my K4.
>
>
> Paul
> W6PNG/M0SNA
> www.nomadic.blog
>
>
>
>
>
>
> On Jun 3, 2019, at 7:58 PM, Rick WA6NHC  wrote:
>
> Much of that protection can be implemented at the router level (>90% of
> all sites) and the internal linux (fairly bullet proof) will deal with
> the radio talking 

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Dave New, N8SBE
Paul,

I believe you mistook the 'direction' of DDOS attack I was talking
about.

The K4 would not be the target of a DDOS attack, but rather an unwitting
participant in launching a DDOS attack as part of robot army of IoT
devices.

Thousands of hacked IoT devices are for rent on the dark web, for any
script kiddie that wants to attack a particular target.

Also, it may be popular to use hacked web sites, or various documents
with trojan horse loads to deliver ransom ware or bitcoin miners, but
there are other known vectors, including various open ports found while
scanning.  It may be the a router would be able to block access, but the
very peer-to-peer nature of the K4 (controlling other K4's or being
controlled by another K4 or PC, tablet, etc, means that routers would
need to allow certain inbound connections through the router or
firewall.  These allow for interesting attack vectors, which will
certainly be exercised, if possible.

73,

-- Dave, N8SBE

 Original Message 
Subject: Re: [Elecraft] K4 and Linux Infrastructure
From: Paul Gacek 
Date: Mon, June 03, 2019 4:00 pm
To: "Dave New, N8SBE" 
Cc: Elecraft Reflector , Rick WA6NHC


Dave

DDOS is quite hard for any end point (PC, iPhone, K4 etc) to deal with
effectively. If a million zombie Macs decide to simultaneously attack
your end point your best chance is as Rick states, a device that makes
up the perimeter defenses such as a firewall or cyber security
alternative (i.e router, IDP). Most homes don’t have anything
particularly sophisticated deployed and are therefore somewhat
vulnerable. In truth DDOS attacks are quite rare and typically not aimed
at Citizen Dave or his neighbors. Protection albeit optimistic is really
in the realm of a corporate network but even then we have a few cases
where iconic sites get hammered and go dark. Enabling the K4 to defend
against DDOS is a little like building a house to withstand random bits
of ISS dropping in unexpectedly; not something I’m expecting to be
paying for.

Unwanted ransomware or bitcoin mining programs are most likely the
result of an unwitting end user at and end point (PC, Android etc) doing
something that resulted in the malware ending up on their end point.
Could be surfing to a suspect web site (www.PawnStorm4U.com) or even
going to a compromised but reputable site such as NASA.gov. 
Alternatively, it could be someone opening a compromised PDF or
Word/Excel attachment. The best protection here is to be cautious and
mindful of what you do in the cyber world and absolutely make sure you
are running the most uptodate OS (not XP) and to its most current patch
level.


Presumably but maybe not, the K4 won’t make available to the ham
operator a browser that allows them to surf wherever nor an email client
that they can read Excel attachments at the whim of the ham operator.
That is best done outside of the K4.


Hardening Linux, following best practices on coding and penetration
testing are all things to be aware of and implement as appropriately.


For those who might be interested in perusing details of some of these
topics these links might be interesting;
Secure Coding Practices
https://msdn.microsoft.com/en-us/aa570401Hardening Linux
https://www.computerworld.com/article/3144985/linux-hardening-a-15-step-checklist-for-a-secure-linux-server.htmlPenetration
Testing https://www.tenable.com


With Elecraft’s proximity to Silicon Valley and presumably contacts
abounding, I’m optimistic the K4 will do us proud and I won’t have
to rely on Rocky and Bullwinkle to keep nefarious foreign agents out of
my K4.


Paul
W6PNG/M0SNA
www.nomadic.blog






On Jun 3, 2019, at 7:58 PM, Rick WA6NHC  wrote:

Much of that protection can be implemented at the router level (>90% of
all sites) and the internal linux (fairly bullet proof) will deal with
the radio talking to the world.

It shouldn't be too difficult for Elecraft to refine security to the
radio, you'd only need a few ports of network access, which if required,
could be coded to set values (MAC address) up to the menu level...  or
limited access into the linux side of the radio.

I'm confident it has been considered and managed with the usual Elecraft
elegance.

Rick NHC


On 6/3/2019 11:50 AM, Dave New, N8SBE wrote:
So, let's let the elephant in the room bellow a bit.

Ahem, CYBER SECURITY.

Now that you've put a popular, modern OS in the K4, and hooked it up to
Ethernet (and therefore the Internet), you've just opened a stinking
pile of attack vectors.

And please don't think that no one will bother figuring out how to 'own'
such a powerful connected processor.  If you spend anytime reading up on
things like Distributed Denial of Service (DDOS) attacks, you will find
that things like webcams and routers (which typically don't even have a
32-bit OS in them) have been marshaled to unleash frightening
multi-gigabit attacks on various targets.

Or, try the newest craze, dropping Bitcoin or other digital currency
m

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Paul Gacek via Elecraft
tasked with dealing
>> with the cyber security aspects of this new toy, and what plans you may
>> have for outside pen testing, etc. have been made.
>> 
>> At the very least, you should be using authenticated boot and
>> authenticated flash, protected by a root certificate in an internal
>> hardware trust anchor.
>> 
>> 73,
>> 
>> -- Dave, N8SBE
>> 
>>  Original Message 
>> Subject: Re: [Elecraft] K4 and Linux Infrastructure
>> From: Wayne Burdick 
>> Date: Sun, June 02, 2019 11:52 am
>> To: Leroy Buller 
>> Cc: Elecraft Reflector , Lee Buller
>> 
>> 
>> x86, not PI (ARM). It's the controller for internal/external displays
>> and streaming I/O, runs the server for remote clients, and serves as the
>> present/future app engine.
>> 
>> Additional details pending.
>> 
>> 73,
>> Wayne
>> N6KR
>> 
>> 
>> 
>> __
>> Elecraft mailing list
>> Home: http://mailman.qth.net/mailman/listinfo/elecraft
>> Help: http://mailman.qth.net/mmfaq.htm
>> Post: mailto:Elecraft@mailman.qth.net
>> 
>> This list hosted by: http://www.qsl.net
>> Please help support this email list: http://www.qsl.net/donate.html
> __
> Elecraft mailing list
> Home: http://mailman.qth.net/mailman/listinfo/elecraft
> Help: http://mailman.qth.net/mmfaq.htm
> Post: mailto:Elecraft@mailman.qth.net
> 
> This list hosted by: http://www.qsl.net
> Please help support this email list: http://www.qsl.net/donate.html

__
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecraft@mailman.qth.net

This list hosted by: http://www.qsl.net
Please help support this email list: http://www.qsl.net/donate.html

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Rick WA6NHC
Much of that protection can be implemented at the router level (>90% of 
all sites) and the internal linux (fairly bullet proof) will deal with 
the radio talking to the world.


It shouldn't be too difficult for Elecraft to refine security to the 
radio, you'd only need a few ports of network access, which if required, 
could be coded to set values (MAC address) up to the menu level...  or 
limited access into the linux side of the radio.


I'm confident it has been considered and managed with the usual Elecraft 
elegance.


Rick NHC


On 6/3/2019 11:50 AM, Dave New, N8SBE wrote:

So, let's let the elephant in the room bellow a bit.

Ahem, CYBER SECURITY.

Now that you've put a popular, modern OS in the K4, and hooked it up to
Ethernet (and therefore the Internet), you've just opened a stinking
pile of attack vectors.

And please don't think that no one will bother figuring out how to 'own'
such a powerful connected processor.  If you spend anytime reading up on
things like Distributed Denial of Service (DDOS) attacks, you will find
that things like webcams and routers (which typically don't even have a
32-bit OS in them) have been marshaled to unleash frightening
multi-gigabit attacks on various targets.

Or, try the newest craze, dropping Bitcoin or other digital currency
mining engines on unsuspecting machines, taking them over hog mode, and
pegging the CPU at 100%, using your electric bill for their gain.

Or, maybe the K4 will be the first ham radio to suffer from a
ransom-ware attack, where the poor ham is asked to ante up some ransom
(in bitcoin usually, to make it hard to track) to get control of his
radio back.

True, at least one or more other companies have already stepped out
ahead, by putting Windows 10 in their radio.

I'm just wondering if anyone at Elecraft has been tasked with dealing
with the cyber security aspects of this new toy, and what plans you may
have for outside pen testing, etc. have been made.

At the very least, you should be using authenticated boot and
authenticated flash, protected by a root certificate in an internal
hardware trust anchor.

73,

-- Dave, N8SBE

 Original Message 
Subject: Re: [Elecraft] K4 and Linux Infrastructure
From: Wayne Burdick 
Date: Sun, June 02, 2019 11:52 am
To: Leroy Buller 
Cc: Elecraft Reflector , Lee Buller


x86, not PI (ARM). It's the controller for internal/external displays
and streaming I/O, runs the server for remote clients, and serves as the
present/future app engine.

Additional details pending.

73,
Wayne
N6KR



__
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecraft@mailman.qth.net

This list hosted by: http://www.qsl.net
Please help support this email list: http://www.qsl.net/donate.html

__
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecraft@mailman.qth.net

This list hosted by: http://www.qsl.net
Please help support this email list: http://www.qsl.net/donate.html

Re: [Elecraft] K4 and Linux Infrastructure

2019-06-03 Thread Dave New, N8SBE
So, let's let the elephant in the room bellow a bit.

Ahem, CYBER SECURITY.

Now that you've put a popular, modern OS in the K4, and hooked it up to
Ethernet (and therefore the Internet), you've just opened a stinking
pile of attack vectors.

And please don't think that no one will bother figuring out how to 'own'
such a powerful connected processor.  If you spend anytime reading up on
things like Distributed Denial of Service (DDOS) attacks, you will find
that things like webcams and routers (which typically don't even have a
32-bit OS in them) have been marshaled to unleash frightening
multi-gigabit attacks on various targets.

Or, try the newest craze, dropping Bitcoin or other digital currency
mining engines on unsuspecting machines, taking them over hog mode, and
pegging the CPU at 100%, using your electric bill for their gain.

Or, maybe the K4 will be the first ham radio to suffer from a
ransom-ware attack, where the poor ham is asked to ante up some ransom
(in bitcoin usually, to make it hard to track) to get control of his
radio back.

True, at least one or more other companies have already stepped out
ahead, by putting Windows 10 in their radio.

I'm just wondering if anyone at Elecraft has been tasked with dealing
with the cyber security aspects of this new toy, and what plans you may
have for outside pen testing, etc. have been made.

At the very least, you should be using authenticated boot and
authenticated flash, protected by a root certificate in an internal
hardware trust anchor.

73,

-- Dave, N8SBE

 Original Message 
Subject: Re: [Elecraft] K4 and Linux Infrastructure
From: Wayne Burdick 
Date: Sun, June 02, 2019 11:52 am
To: Leroy Buller 
Cc: Elecraft Reflector , Lee Buller


x86, not PI (ARM). It's the controller for internal/external displays
and streaming I/O, runs the server for remote clients, and serves as the
present/future app engine.

Additional details pending.

73,
Wayne
N6KR



__
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecraft@mailman.qth.net

This list hosted by: http://www.qsl.net
Please help support this email list: http://www.qsl.net/donate.html


Re: [Elecraft] K4 and Linux Infrastructure

2019-06-02 Thread Wayne Burdick
x86, not PI (ARM). It's the controller for internal/external displays and 
streaming I/O, runs the server for remote clients, and serves as the 
present/future app engine. 

Additional details pending.

73,
Wayne
N6KR


> On Jun 1, 2019, at 2:18 PM, Leroy Buller  wrote:
> 
> So, K4 and the internal Linux system.  What is it doing for the radio,
> processor type, clock speed  ram, any ssd,  and version.  I am assuming or
> guessing it is a PI of some sort or tigally designed by Elecraft?
> 
> Will anyone know?
> 
> Lee K0WA



__
Elecraft mailing list
Home: http://mailman.qth.net/mailman/listinfo/elecraft
Help: http://mailman.qth.net/mmfaq.htm
Post: mailto:Elecraft@mailman.qth.net

This list hosted by: http://www.qsl.net
Please help support this email list: http://www.qsl.net/donate.html