Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-30 Thread Mark Phillips
Thanks, MC_SEQUOIA for the explanation.

 My assumption was that HTTPS encrypts the messages between the client
browser and server, so one cannot just eavesdrop on the messages back and
forth to generate a map of how to intercept and change the messages. Of
course, one would have to gain access to the private WiFi network created
with the AP, protected by a 16 character password and MAC filter, first.

My security strategy was to put up multiple barriers to make it an annoying
project for the nefarious types. Aslo, our launches are 2-4 hours long at
most, and then the passwords change for the next launch, and no Internet
connection.

If someone is good enough to get through 3 randomly generated 16 character
passwords and a MAC white list in 3 hours with a laptop within 300 feet of
the launch site, he/she deserves the honor of launching all the rockets!

Good idea to check the DHCP client list periodically during the launch. The
AP provides that as well as a way to deny an unknown connected device, if
needed.

Mark

On Fri, Dec 29, 2023 at 2:38 PM MC_Sequoia  wrote:

>
> > > "I want to set up some sort of secure connection between the cell phone
> > > and the web site running on the Pi."
> > >
> > > This should be doable via a vpn client/server. A quick google search on
> > > "raspberry pi cell phone vpn" returned this:
> >
> >
> > Are you saying a VPN is needed along with the SSL, or as a replacement?
> Why
> > both, or why as a replacement?
>
> An SSL certificate enables a web site to use HTTPS and it also verifies
> the website's domain authenticity through a certificate authority. This is
> all more for end-user security and privacy. Self-signed certs are for
> non-production enviros.
>
> This does provide end to end security for any and every connected device,
> but with a VPN, you can restrict which ip addr(s) can connect only via the
> vpn. But since, "It is not accessible to the Internet, as the AP is not
> connected to the Internet this is all happening on a private ip network",
> all of this is secure connection concern is irrelevant as no one outside of
> the private ip net can access the launch web site.
>
> Yes, it's possible to spoof a mac address, forge ip packets, etc. And
> curious tech savvy kids will be curious tech savvy kids, but you're talking
> about a fairly serious amount of time, effort, knowledge, skill and tools
> to pull this off.
>
> I'd suggest there are far more interesting internet things for those
> curious tech savvy kids to hack & crack on and/or into.
>
> I walked away from a lucrative cybersecurity career a few decades ago
> because my experience was that the whole industry was built on the idea of
> scaring people to buy security products and services. Yes, there are very
> real vulnerabilities, exploits, security concerns and bad actor
> hacker/crackers but people fail to correctly asses the real risks, threats
> and targets.
>
> If you setup a reasonably secure launch situation and some black hat
> genius kid cracks it and launches the rocket on you, they gotta be close
> enough to get onto the WiFi and not in mom's basement over the internet.
>
> You should also be able to monitor the devices in real time that are
> connecting to the WiFi AP. If you're not familiar with this, either poke
> around on the AP mmgmt. web site or look through the instruction manual for
> mac table, ip table, arp table, connected devices, or the like. If you see
> a new device that you don't know connect to the AP before the launch, don't
> launch until you figure out what's going on and/or disconnect/block that
> device.
>
> I hope that gives you a better understanding of this whole secure launch
> concern and gives you some peace of mind. Cheers!
>


Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-29 Thread MC_Sequoia


> > "I want to set up some sort of secure connection between the cell phone
> > and the web site running on the Pi."
> > 
> > This should be doable via a vpn client/server. A quick google search on
> > "raspberry pi cell phone vpn" returned this:
> 
> 
> Are you saying a VPN is needed along with the SSL, or as a replacement? Why
> both, or why as a replacement?

An SSL certificate enables a web site to use HTTPS and it also verifies the 
website's domain authenticity through a certificate authority. This is all more 
for end-user security and privacy. Self-signed certs are for non-production 
enviros. 

This does provide end to end security for any and every connected device, but 
with a VPN, you can restrict which ip addr(s) can connect only via the vpn. But 
since, "It is not accessible to the Internet, as the AP is not connected to the 
Internet this is all happening on a private ip network", all of this is secure 
connection concern is irrelevant as no one outside of the private ip net can 
access the launch web site. 

Yes, it's possible to spoof a mac address, forge ip packets, etc. And curious 
tech savvy kids will be curious tech savvy kids, but you're talking about a 
fairly serious amount of time, effort, knowledge, skill and tools to pull this 
off. 

I'd suggest there are far more interesting internet things for those curious 
tech savvy kids to hack & crack on and/or into. 

I walked away from a lucrative cybersecurity career a few decades ago because 
my experience was that the whole industry was built on the idea of scaring 
people to buy security products and services. Yes, there are very real 
vulnerabilities, exploits, security concerns and bad actor hacker/crackers but 
people fail to correctly asses the real risks, threats and targets. 

If you setup a reasonably secure launch situation and some black hat genius kid 
cracks it and launches the rocket on you, they gotta be close enough to get 
onto the WiFi and not in mom's basement over the internet. 

You should also be able to monitor the devices in real time that are connecting 
to the WiFi AP. If you're not familiar with this, either poke around on the AP 
mmgmt. web site or look through the instruction manual for mac table, ip table, 
arp table, connected devices, or the like. If you see a new device that you 
don't know connect to the AP before the launch, don't launch until you figure 
out what's going on and/or disconnect/block that device. 

I hope that gives you a better understanding of this whole secure launch 
concern and gives you some peace of mind. Cheers!


Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-28 Thread Mark Phillips
@MC_Sequoia




On Sun, Dec 24, 2023 at 3:23 PM MC_Sequoia  wrote:

> "I want to set up some sort of secure connection between the cell phone
> and the web site running on the Pi."
>
> This should be doable via a vpn client/server. A quick google search on
> "raspberry pi cell phone vpn" returned this:
>

Are you saying a VPN is needed along with the SSL, or as a replacement? Why
both, or why as a replacement?

>
> "If you're going to be connecting to Pi VPN on a mobile device, I
> recommend OpenVPN Connect, the official client. It's completely free and
> integrates really well with iOS and Android. The first step is to open the
> App Store or Play Store, depending on your device. In either case, search
> for OpenVPN Connect"
>
> You should be able to easily find step-by-step instructions to do get this
> setup and working.
>
> That'll solve the secure connection between the cell ph and the Rpi hosted
> website, but that doesn't your "main concern is an attacker connecting to
> the web site and igniting the rocket while the user is connecting thew
> wires to the igniter."
>
> I'm going to suggest the probability of this happening is your best
> security.
>
> However, I'm not the adult that's responsible for children's safety.
>
> The big question here is whether the Rpi hosted website is accessible from
> the internet?
>

It is not accessible to the Internet, as the AP is not connected to the
Internet.

>
> My suspicion is that it would have a non-internet routable private not
> pubic ip addr in the following ip addr ranges:
> 10.0. 0.0 to 10.255. 255.255.
> 172.16. 0.0 to 172.31. 255.255.
> 192.168. 0.0 to 192.168. 255.255.
>
> If the Rpi website is accessible via the public internet than there's 2
> other other options.
>
> 1. Learn about securing/hardening a Rpi.
> https://www.chrisapproved.com/blog/raspberry-pi-hardening.html
>
> 2. Change all the passwords and codes on launch day.


That is a given. Sorry I didn't mention it.

>
>
> I hope that's somewhat helpful.
>
>
>
>
>
>
>
>


Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-26 Thread Robert Citek
Point not missed. It’s frosty beverage time. - Robert

On Tue, Dec 26, 2023 at 17:32 Ted Mittelstaedt 
wrote:

>
> You missed the point.
>
> As an adult responsible for kids shooting off model rockets would I take
> all precautions?
>
> Obviously.  Not only because it's the duty of the older to set an example
> for the younger but because our litigious society would take my house away
> if I didn't.
>
> But would I draw conclusions from observing others taking these
> precautions that model rocketry is so dangerous that no way on Earth should
> anyone do it without taking precautions?
>
> Ah, no.
>
> You can't bubble-wrap the world and people need to understand what risk is
> all about.  Risk should never be used to frighten people away from taking
> risks.
>
> Electric ignitors today are safer than the old-school way of setting off
> rockets which was to insert a fuse into the butt end of the rocket and
> light it off.
>
> But only marginally.
>
> Ted
>
>
> -Original Message-
> From: PLUG  On Behalf Of Robert Citek
> Sent: Tuesday, December 26, 2023 4:46 AM
> To: Portland Linux/Unix Group 
> Subject: Re: [PLUG] Looking for some WiFi AP Security Advice
>
> Thanks, Ted, for some wonderful examples of survivorship bias.
>
> https://en.m.wikipedia.org/wiki/Survivorship_bias
>
> Not every kid survives to adulthood.  And not every kid who does survive
> does so without losing or damaging some parts. Any EMT, Paramedic, or ER
> staff can tell you countless tales from the other side of that probability
> curve.
>
> But those are best shared in-person over some frosty beverages, not on
> this list.
>
> Regards,
> - Robert
>
>
> On Mon, Dec 25, 2023 at 21:58 Ted Mittelstaedt 
> wrote:
>
> > Yeah although I'll provide the perspective opposite from the "Nanny
> State"
> > perspective which is:
> >
> > "AFAIK it's still just a toy model rocket"
> >
> > As kids we used to do all kinds of fun and games with these that would
> > fall into The Christmas Story classification of "You'll put your eye
> > out"
> >
> > I saw a kid once stick a lit match up the ass of one of these to set
> > it off because he had run out of ignitors and sure enough it Did
> > ignite and blast off.  Other than a lot of "holy shit's" from the rest
> > of us nobody suffered any ill effects - there is in fact enough Time
> > to quickly yank your hand away when you hear the rocket engine ignite,
> > it is after all very small.
> >
> > We also specialized in launching these at less than a perfect 90
> > degree angle aiming at targets, as well as loading them With a variety
> > of payloads OTHER than the recommended plastic parachute and wadded
> > tissue paper.  Hezbollah would have been proud of us.
> >
> > Despite our "model rocketry" picadilloes, all of us grew up with all
> > fingers intact and nobody's house burnt down.
> >
> > Chances are no matter how Rube Goldberg it is, there's no way it will
> > be as bad as some of the stuff we did and the rocket will most likely
> > launch with no ill effects.
> >
> > Ted
> >
> > -Original Message-
> > From: PLUG  On Behalf Of Michael
> > Barnes
> > Sent: Sunday, December 24, 2023 7:28 PM
> > To: Portland Linux/Unix Group 
> > Subject: Re: [PLUG] Looking for some WiFi AP Security Advice
> >
> > Doesn't matter how much security you build in. There is no way on
> > earth you should be launching rockets with anything other than a
> > safety/lockout key equipped hard wired system. Do all you want with
> > fancy clocks, timers, horns, etc for the public's viewing pleasure and
> > show, but the actual launch circuit powering the igniter should only
> > be hardwired under manual control with appropriate safeties in place.
> > Anything else is a disaster waiting to happen and potential for injury
> and lawsuits.
> >
> > Been doing model rockets since 1963.
> >
> >
> > Michael
> >
> > On Sun, Dec 24, 2023 at 3:23 PM MC_Sequoia 
> > wrote:
> >
> > > "I want to set up some sort of secure connection between the cell
> > > phone and the web site running on the Pi."
> > >
> > > This should be doable via a vpn client/server. A quick google search
> > > on "raspberry pi cell phone vpn" returned this:
> > >
> > > "If you're going to be connecting to Pi VPN on a mobile device, I
> > > recommend OpenVPN Connect, the official client. It's completely free
> > > and inte

Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-26 Thread Ted Mittelstaedt


You missed the point.

As an adult responsible for kids shooting off model rockets would I take all 
precautions?

Obviously.  Not only because it's the duty of the older to set an example for 
the younger but because our litigious society would take my house away if I 
didn't.

But would I draw conclusions from observing others taking these precautions 
that model rocketry is so dangerous that no way on Earth should anyone do it 
without taking precautions?

Ah, no.

You can't bubble-wrap the world and people need to understand what risk is all 
about.  Risk should never be used to frighten people away from taking risks.

Electric ignitors today are safer than the old-school way of setting off 
rockets which was to insert a fuse into the butt end of the rocket and light it 
off.

But only marginally.

Ted


-Original Message-
From: PLUG  On Behalf Of Robert Citek
Sent: Tuesday, December 26, 2023 4:46 AM
To: Portland Linux/Unix Group 
Subject: Re: [PLUG] Looking for some WiFi AP Security Advice

Thanks, Ted, for some wonderful examples of survivorship bias.

https://en.m.wikipedia.org/wiki/Survivorship_bias

Not every kid survives to adulthood.  And not every kid who does survive does 
so without losing or damaging some parts. Any EMT, Paramedic, or ER staff can 
tell you countless tales from the other side of that probability curve.

But those are best shared in-person over some frosty beverages, not on this 
list.

Regards,
- Robert


On Mon, Dec 25, 2023 at 21:58 Ted Mittelstaedt 
wrote:

> Yeah although I'll provide the perspective opposite from the "Nanny State"
> perspective which is:
>
> "AFAIK it's still just a toy model rocket"
>
> As kids we used to do all kinds of fun and games with these that would 
> fall into The Christmas Story classification of "You'll put your eye 
> out"
>
> I saw a kid once stick a lit match up the ass of one of these to set 
> it off because he had run out of ignitors and sure enough it Did 
> ignite and blast off.  Other than a lot of "holy shit's" from the rest 
> of us nobody suffered any ill effects - there is in fact enough Time 
> to quickly yank your hand away when you hear the rocket engine ignite, 
> it is after all very small.
>
> We also specialized in launching these at less than a perfect 90 
> degree angle aiming at targets, as well as loading them With a variety 
> of payloads OTHER than the recommended plastic parachute and wadded 
> tissue paper.  Hezbollah would have been proud of us.
>
> Despite our "model rocketry" picadilloes, all of us grew up with all 
> fingers intact and nobody's house burnt down.
>
> Chances are no matter how Rube Goldberg it is, there's no way it will 
> be as bad as some of the stuff we did and the rocket will most likely 
> launch with no ill effects.
>
> Ted
>
> -Original Message-----
> From: PLUG  On Behalf Of Michael 
> Barnes
> Sent: Sunday, December 24, 2023 7:28 PM
> To: Portland Linux/Unix Group 
> Subject: Re: [PLUG] Looking for some WiFi AP Security Advice
>
> Doesn't matter how much security you build in. There is no way on 
> earth you should be launching rockets with anything other than a 
> safety/lockout key equipped hard wired system. Do all you want with 
> fancy clocks, timers, horns, etc for the public's viewing pleasure and 
> show, but the actual launch circuit powering the igniter should only 
> be hardwired under manual control with appropriate safeties in place. 
> Anything else is a disaster waiting to happen and potential for injury and 
> lawsuits.
>
> Been doing model rockets since 1963.
>
>
> Michael
>
> On Sun, Dec 24, 2023 at 3:23 PM MC_Sequoia 
> wrote:
>
> > "I want to set up some sort of secure connection between the cell 
> > phone and the web site running on the Pi."
> >
> > This should be doable via a vpn client/server. A quick google search 
> > on "raspberry pi cell phone vpn" returned this:
> >
> > "If you're going to be connecting to Pi VPN on a mobile device, I 
> > recommend OpenVPN Connect, the official client. It's completely free 
> > and integrates really well with iOS and Android. The first step is 
> > to open the App Store or Play Store, depending on your device. In 
> > either case, search for OpenVPN Connect"
> >
> > You should be able to easily find step-by-step instructions to do 
> > get this setup and working.
> >
> > That'll solve the secure connection between the cell ph and the Rpi 
> > hosted website, but that doesn't your "main concern is an attacker 
> > connecting to the web site and igniting the rocket while the user is 
> > connecting thew wires to the igniter."
> >
> > I'm go

Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-26 Thread Robert Citek
Thanks, Ted, for some wonderful examples of survivorship bias.

https://en.m.wikipedia.org/wiki/Survivorship_bias

Not every kid survives to adulthood.  And not every kid who does survive
does so without losing or damaging some parts. Any EMT, Paramedic, or ER
staff can tell you countless tales from the other side of that probability
curve.

But those are best shared in-person over some frosty beverages, not on this
list.

Regards,
- Robert


On Mon, Dec 25, 2023 at 21:58 Ted Mittelstaedt 
wrote:

> Yeah although I'll provide the perspective opposite from the "Nanny State"
> perspective which is:
>
> "AFAIK it's still just a toy model rocket"
>
> As kids we used to do all kinds of fun and games with these that would
> fall into The Christmas Story classification of
> "You'll put your eye out"
>
> I saw a kid once stick a lit match up the ass of one of these to set it
> off because he had run out of ignitors and sure enough it
> Did ignite and blast off.  Other than a lot of "holy shit's" from the rest
> of us nobody suffered any ill effects - there is in fact enough
> Time to quickly yank your hand away when you hear the rocket engine
> ignite, it is after all very small.
>
> We also specialized in launching these at less than a perfect 90 degree
> angle aiming at targets, as well as loading them
> With a variety of payloads OTHER than the recommended plastic parachute
> and wadded tissue paper.  Hezbollah would have been proud of us.
>
> Despite our "model rocketry" picadilloes, all of us grew up with all
> fingers intact and nobody's house burnt down.
>
> Chances are no matter how Rube Goldberg it is, there's no way it will be
> as bad as some of the stuff we did and
> the rocket will most likely launch with no ill effects.
>
> Ted
>
> -Original Message-----
> From: PLUG  On Behalf Of Michael Barnes
> Sent: Sunday, December 24, 2023 7:28 PM
> To: Portland Linux/Unix Group 
> Subject: Re: [PLUG] Looking for some WiFi AP Security Advice
>
> Doesn't matter how much security you build in. There is no way on earth
> you should be launching rockets with anything other than a safety/lockout
> key equipped hard wired system. Do all you want with fancy clocks, timers,
> horns, etc for the public's viewing pleasure and show, but the actual
> launch circuit powering the igniter should only be hardwired under manual
> control with appropriate safeties in place. Anything else is a disaster
> waiting to happen and potential for injury and lawsuits.
>
> Been doing model rockets since 1963.
>
>
> Michael
>
> On Sun, Dec 24, 2023 at 3:23 PM MC_Sequoia 
> wrote:
>
> > "I want to set up some sort of secure connection between the cell
> > phone and the web site running on the Pi."
> >
> > This should be doable via a vpn client/server. A quick google search
> > on "raspberry pi cell phone vpn" returned this:
> >
> > "If you're going to be connecting to Pi VPN on a mobile device, I
> > recommend OpenVPN Connect, the official client. It's completely free
> > and integrates really well with iOS and Android. The first step is to
> > open the App Store or Play Store, depending on your device. In either
> > case, search for OpenVPN Connect"
> >
> > You should be able to easily find step-by-step instructions to do get
> > this setup and working.
> >
> > That'll solve the secure connection between the cell ph and the Rpi
> > hosted website, but that doesn't your "main concern is an attacker
> > connecting to the web site and igniting the rocket while the user is
> > connecting thew wires to the igniter."
> >
> > I'm going to suggest the probability of this happening is your best
> > security.
> >
> > However, I'm not the adult that's responsible for children's safety.
> >
> > The big question here is whether the Rpi hosted website is accessible
> > from the internet?
> >
> > My suspicion is that it would have a non-internet routable private not
> > pubic ip addr in the following ip addr ranges:
> > 10.0. 0.0 to 10.255. 255.255.
> > 172.16. 0.0 to 172.31. 255.255.
> > 192.168. 0.0 to 192.168. 255.255.
> >
> > If the Rpi website is accessible via the public internet than there's
> > 2 other other options.
> >
> > 1. Learn about securing/hardening a Rpi.
> > https://www.chrisapproved.com/blog/raspberry-pi-hardening.html
> >
> > 2. Change all the passwords and codes on launch day.
> >
> > I hope that's somewhat helpful.
> >
> >
> >
> >
> >
> >
> >
> >
>
>


Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-25 Thread Russell Senior
On Sun, Dec 24, 2023 at 12:34 PM Russell Senior 
wrote:

>
>
> On Sun, Dec 24, 2023 at 11:59 AM Mark Phillips 
> wrote:
>
>> I am working on a project and need some security advice.
>> [...]
>>
>
https://youtu.be/pWcTEizBW74?si=TxAQ2xKTDYGHD_K1=170

-- 
Russell Senior
russ...@personaltelco.net


Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-25 Thread Ted Mittelstaedt
Yeah although I'll provide the perspective opposite from the "Nanny State" 
perspective which is:

"AFAIK it's still just a toy model rocket"

As kids we used to do all kinds of fun and games with these that would fall 
into The Christmas Story classification of
"You'll put your eye out"

I saw a kid once stick a lit match up the ass of one of these to set it off 
because he had run out of ignitors and sure enough it
Did ignite and blast off.  Other than a lot of "holy shit's" from the rest of 
us nobody suffered any ill effects - there is in fact enough
Time to quickly yank your hand away when you hear the rocket engine ignite, it 
is after all very small.

We also specialized in launching these at less than a perfect 90 degree angle 
aiming at targets, as well as loading them
With a variety of payloads OTHER than the recommended plastic parachute and 
wadded tissue paper.  Hezbollah would have been proud of us.

Despite our "model rocketry" picadilloes, all of us grew up with all fingers 
intact and nobody's house burnt down.

Chances are no matter how Rube Goldberg it is, there's no way it will be as bad 
as some of the stuff we did and
the rocket will most likely launch with no ill effects.

Ted

-Original Message-
From: PLUG  On Behalf Of Michael Barnes
Sent: Sunday, December 24, 2023 7:28 PM
To: Portland Linux/Unix Group 
Subject: Re: [PLUG] Looking for some WiFi AP Security Advice

Doesn't matter how much security you build in. There is no way on earth you 
should be launching rockets with anything other than a safety/lockout key 
equipped hard wired system. Do all you want with fancy clocks, timers, horns, 
etc for the public's viewing pleasure and show, but the actual launch circuit 
powering the igniter should only be hardwired under manual control with 
appropriate safeties in place. Anything else is a disaster waiting to happen 
and potential for injury and lawsuits.

Been doing model rockets since 1963.


Michael

On Sun, Dec 24, 2023 at 3:23 PM MC_Sequoia  wrote:

> "I want to set up some sort of secure connection between the cell 
> phone and the web site running on the Pi."
>
> This should be doable via a vpn client/server. A quick google search 
> on "raspberry pi cell phone vpn" returned this:
>
> "If you're going to be connecting to Pi VPN on a mobile device, I 
> recommend OpenVPN Connect, the official client. It's completely free 
> and integrates really well with iOS and Android. The first step is to 
> open the App Store or Play Store, depending on your device. In either 
> case, search for OpenVPN Connect"
>
> You should be able to easily find step-by-step instructions to do get 
> this setup and working.
>
> That'll solve the secure connection between the cell ph and the Rpi 
> hosted website, but that doesn't your "main concern is an attacker 
> connecting to the web site and igniting the rocket while the user is 
> connecting thew wires to the igniter."
>
> I'm going to suggest the probability of this happening is your best 
> security.
>
> However, I'm not the adult that's responsible for children's safety.
>
> The big question here is whether the Rpi hosted website is accessible 
> from the internet?
>
> My suspicion is that it would have a non-internet routable private not 
> pubic ip addr in the following ip addr ranges:
> 10.0. 0.0 to 10.255. 255.255.
> 172.16. 0.0 to 172.31. 255.255.
> 192.168. 0.0 to 192.168. 255.255.
>
> If the Rpi website is accessible via the public internet than there's 
> 2 other other options.
>
> 1. Learn about securing/hardening a Rpi.
> https://www.chrisapproved.com/blog/raspberry-pi-hardening.html
>
> 2. Change all the passwords and codes on launch day.
>
> I hope that's somewhat helpful.
>
>
>
>
>
>
>
>



Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-24 Thread Michael Barnes
Doesn't matter how much security you build in. There is no way on earth you
should be launching rockets with anything other than a safety/lockout key
equipped hard wired system. Do all you want with fancy clocks, timers,
horns, etc for the public's viewing pleasure and show, but the actual
launch circuit powering the igniter should only be hardwired under manual
control with appropriate safeties in place. Anything else is a disaster
waiting to happen and potential for injury and lawsuits.

Been doing model rockets since 1963.


Michael

On Sun, Dec 24, 2023 at 3:23 PM MC_Sequoia  wrote:

> "I want to set up some sort of secure connection between the cell phone
> and the web site running on the Pi."
>
> This should be doable via a vpn client/server. A quick google search on
> "raspberry pi cell phone vpn" returned this:
>
> "If you're going to be connecting to Pi VPN on a mobile device, I
> recommend OpenVPN Connect, the official client. It's completely free and
> integrates really well with iOS and Android. The first step is to open the
> App Store or Play Store, depending on your device. In either case, search
> for OpenVPN Connect"
>
> You should be able to easily find step-by-step instructions to do get this
> setup and working.
>
> That'll solve the secure connection between the cell ph and the Rpi hosted
> website, but that doesn't your "main concern is an attacker connecting to
> the web site and igniting the rocket while the user is connecting thew
> wires to the igniter."
>
> I'm going to suggest the probability of this happening is your best
> security.
>
> However, I'm not the adult that's responsible for children's safety.
>
> The big question here is whether the Rpi hosted website is accessible from
> the internet?
>
> My suspicion is that it would have a non-internet routable private not
> pubic ip addr in the following ip addr ranges:
> 10.0. 0.0 to 10.255. 255.255.
> 172.16. 0.0 to 172.31. 255.255.
> 192.168. 0.0 to 192.168. 255.255.
>
> If the Rpi website is accessible via the public internet than there's 2
> other other options.
>
> 1. Learn about securing/hardening a Rpi.
> https://www.chrisapproved.com/blog/raspberry-pi-hardening.html
>
> 2. Change all the passwords and codes on launch day.
>
> I hope that's somewhat helpful.
>
>
>
>
>
>
>
>


Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-24 Thread MC_Sequoia
"I want to set up some sort of secure connection between the cell phone and the 
web site running on the Pi."

This should be doable via a vpn client/server. A quick google search on 
"raspberry pi cell phone vpn" returned this:

"If you're going to be connecting to Pi VPN on a mobile device, I recommend 
OpenVPN Connect, the official client. It's completely free and integrates 
really well with iOS and Android. The first step is to open the App Store or 
Play Store, depending on your device. In either case, search for OpenVPN 
Connect"

You should be able to easily find step-by-step instructions to do get this 
setup and working.

That'll solve the secure connection between the cell ph and the Rpi hosted 
website, but that doesn't your "main concern is an attacker connecting to the 
web site and igniting the rocket while the user is connecting thew wires to the 
igniter."

I'm going to suggest the probability of this happening is your best security.

However, I'm not the adult that's responsible for children's safety.

The big question here is whether the Rpi hosted website is accessible from the 
internet?

My suspicion is that it would have a non-internet routable private not pubic ip 
addr in the following ip addr ranges:
10.0. 0.0 to 10.255. 255.255.
172.16. 0.0 to 172.31. 255.255.
192.168. 0.0 to 192.168. 255.255.

If the Rpi website is accessible via the public internet than there's 2 other 
other options. 

1. Learn about securing/hardening a Rpi. 
https://www.chrisapproved.com/blog/raspberry-pi-hardening.html

2. Change all the passwords and codes on launch day. 

I hope that's somewhat helpful. 









Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-24 Thread Ted Mittelstaedt



> Yes: using a website to launch the rocket.

I know, really!  They are supposed to use a Habitrrail that releases a rodent 
that runs through a maze and triggers a button as a food reward  Website?  
How simple!

(clearly you are under the impression model rocketry is all about launching 
rockets.  It isn't.  It's about building them and planning out the launch.  15 
seconds after launch the rocket has drifted off course and falls into a tree or 
someone's roof.)

Ted 




Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-24 Thread Ted Mittelstaedt
I built a number of these things in my youth, timer based and so on.   Th 
wireless and pi are of course unnecessary, as was the digital countdown display 
I used in my youth.

The big thing that kills these attempts is the power to the ignitor.  Ignitors 
need a lot more power than just 2-4a.  While that will do it - eventually - it 
takes time for the wire to heat up enough to ignight the ground up match heads 
or whatever they coat it with.  SO you have this elaborate countdown - in your 
case run by the pi - it gets to zero - then nothing happens for 15 seconds 
while the ignitor heats up and eventually ignites.  Quite a letdown.

What I found worked was running very thick short cables from a car battery next 
to the rocket to alligator clips on the ignitor and a massive relay.  You want 
the ability to dump 100A into the ignitor for that 300-500 ms so that there's 
no heatup period.  In fact, we got it to where we could just use plain old thin 
bent copper wire, forget the ignitor completely the wire would glow cherry red 
and ignite the engine.

Ted

-Original Message-
From: PLUG  On Behalf Of Mark Phillips
Sent: Sunday, December 24, 2023 11:59 AM
To: Portland Linux Users Group 
Subject: [PLUG] Looking for some WiFi AP Security Advice

I am working on a project and need some security advice.

The project is a wireless model rocket launcher. It consists of a Raspberry Pi 
2 W (Debian Buster) connected to a daughter board with circuitry to control the 
current to ignite the igniter, a TP-Link Wifi AP, and a cell phone. There is a 
web site (apache and flask) running on the Pi that allows the user to control 
the circuits on the daughter board to launch the rocket.

The typical location for launching the rockets is in a large field far from any 
buildings or trees. Typically, there is no WiFi Internet connectivity and cell 
service is problematical. There are quite a few people attending the launch. 
There are also times when this launcher will be used in a more urban 
environment (like a high school field), so there may be WiFi and cell access to 
the Internet. I want to make the system "unattractive" to the high school 
students or anyone else who thinks it would be cool to hack the launcher during 
a launch.

I want to set up some sort of secure connection between the cell phone and the 
web site running on the Pi. My main concern is an attacker connecting to the 
web site and igniting the rocket while the user is connecting the wires to the 
igniter. Model rocket motors generate an exhaust gas with a temperature of 
~3,000 F. Also, the igniter needs 2-4 A dc for 300 - 500 msec to ignite the 
rocket motor.

I have put these security layers in place.
1. 16 character password to access the WiFi AP network 2. MAC address filtering 
on the WiFi AP 3. Self signed SSL cert for the web site 4. 16 character 
password to access the web site 5. Standard flask cookie security for CSRF 6. 8 
character code to enable the launcher (the equivalent to a physical launch key) 
7. A physical switch on the launcher that disables the ignition circuit - for 
use when attaching the igniter leads to the rocket engine. However, there is no 
guarantee that the user will use this switch everytime he/she loads a new 
rocket on the launcher. There is a timer attached to the switch so that when 
the switch is put in the "on" position, the igniter circuit will not be enabled 
for another 10 seconds...enough time to run like h*ll away from the 
launcher;)

I am not a security guru, so I am not really sure what my options are. Do you 
have any other suggestions on how I can make this system more secure?
Am I doing anything that is unnecessary?

Thanks!

Mark



Re: [PLUG] Looking for some WiFi AP Security Advice

2023-12-24 Thread Russell Senior
On Sun, Dec 24, 2023 at 11:59 AM Mark Phillips 
wrote:

> I am working on a project and need some security advice.
>
> The project is a wireless model rocket launcher. It consists of a Raspberry
> Pi 2 W (Debian Buster) connected to a daughter board with circuitry
> to control the current to ignite the igniter, a TP-Link Wifi AP, and a cell
> phone. There is a web site (apache and flask) running on the Pi that allows
> the user to control the circuits on the daughter board to launch the
> rocket.
>
> The typical location for launching the rockets is in a large field far from
> any buildings or trees. Typically, there is no WiFi Internet connectivity
> and cell service is problematical. There are quite a few people attending
> the launch. There are also times when this launcher will be used in a more
> urban environment (like a high school field), so there may be WiFi and cell
> access to the Internet. I want to make the system "unattractive" to the
> high school students or anyone else who thinks it would be cool to hack the
> launcher during a launch.
>
> I want to set up some sort of secure connection between the cell phone and
> the web site running on the Pi. My main concern is an attacker connecting
> to the web site and igniting the rocket while the user is connecting the
> wires to the igniter. Model rocket motors generate an exhaust gas with a
> temperature of ~3,000 F. Also, the igniter needs 2-4 A dc for 300 - 500
> msec to ignite the rocket motor.
>
> I have put these security layers in place.
> 1. 16 character password to access the WiFi AP network
> 2. MAC address filtering on the WiFi AP
>

This is useless. MAC addresses can be forged easily.


> 3. Self signed SSL cert for the web site
>

This only confirms to the client that they reached an authentic website.
And not really, since it is self-signed and there isn't a convenient way of
confirming it's valid. It doesn't prevent someone else from accessing the
website, only from pretending to be the website. If it were possible to
confirm the certificate was valid, then this could theoretically prevent
someone from becoming a man-in-the-middle and stealing the credentials that
are protecting the secrets in step 4 and 6.


> 4. 16 character password to access the web site
> 5. Standard flask cookie security for CSRF
> 6. 8 character code to enable the launcher (the equivalent to a physical
> launch key)
>

Consider some kind of temporary code, like a TOTP.


> 7. A physical switch on the launcher that disables the ignition circuit -
> for use when attaching the igniter leads to the rocket engine. However,
> there is no guarantee that the user will use this switch everytime he/she
> loads a new rocket on the launcher. [...]


If this is for a club activity, make sure they DO, EVERYTIME. Put it in the
Standard Operating Procedure.

I'd suggest something like a physical key switch, where the key necessary
to enable the launcher is physically attached to the person designated to
attach the igniter wires on a lanyard or something, that can only be
enabled by inserting that key from a safe distance.

I am not a security guru, so I am not really sure what my options are. Do
> you have any other suggestions on how I can make this system more secure?
> Am I doing anything that is unnecessary?
>

Yes: using a website to launch the rocket.

-- 
Russell Senior
russ...@personaltelco.net


[PLUG] Looking for some WiFi AP Security Advice

2023-12-24 Thread Mark Phillips
I am working on a project and need some security advice.

The project is a wireless model rocket launcher. It consists of a Raspberry
Pi 2 W (Debian Buster) connected to a daughter board with circuitry
to control the current to ignite the igniter, a TP-Link Wifi AP, and a cell
phone. There is a web site (apache and flask) running on the Pi that allows
the user to control the circuits on the daughter board to launch the
rocket.

The typical location for launching the rockets is in a large field far from
any buildings or trees. Typically, there is no WiFi Internet connectivity
and cell service is problematical. There are quite a few people attending
the launch. There are also times when this launcher will be used in a more
urban environment (like a high school field), so there may be WiFi and cell
access to the Internet. I want to make the system "unattractive" to the
high school students or anyone else who thinks it would be cool to hack the
launcher during a launch.

I want to set up some sort of secure connection between the cell phone and
the web site running on the Pi. My main concern is an attacker connecting
to the web site and igniting the rocket while the user is connecting the
wires to the igniter. Model rocket motors generate an exhaust gas with a
temperature of ~3,000 F. Also, the igniter needs 2-4 A dc for 300 - 500
msec to ignite the rocket motor.

I have put these security layers in place.
1. 16 character password to access the WiFi AP network
2. MAC address filtering on the WiFi AP
3. Self signed SSL cert for the web site
4. 16 character password to access the web site
5. Standard flask cookie security for CSRF
6. 8 character code to enable the launcher (the equivalent to a physical
launch key)
7. A physical switch on the launcher that disables the ignition circuit -
for use when attaching the igniter leads to the rocket engine. However,
there is no guarantee that the user will use this switch everytime he/she
loads a new rocket on the launcher. There is a timer attached to the switch
so that when the switch is put in the "on" position, the igniter circuit
will not be enabled for another 10 seconds...enough time to run like h*ll
away from the launcher;)

I am not a security guru, so I am not really sure what my options are. Do
you have any other suggestions on how I can make this system more secure?
Am I doing anything that is unnecessary?

Thanks!

Mark