jks
About
- Username
- jks
- Joined
- Visits
- 32,324
- Last Active
- Roles
- Member, Administrator, Moderator
- Points
- 331
Reactions
-
new ADC overflow logic (S-meter "OV" indicator) [added in v1.315, improved in v1.357,358]
Alright, v1.357 is out with an S-meter OV averaging adjustment slider on the admin config tab.
Remember that the averaging is defined as as threshold count of per-sample ADC overflow events for every 64k ADC samples. So when the slider is set to 1k (the default) it means that the OV indicator will only light if there have been >= 1k ADV OVs during the 64k period. Note that the 1k OV events don't have to be consecutive. It's a threshold over a fixed interval. -
new ADC overflow logic (S-meter "OV" indicator) [added in v1.315, improved in v1.357,358]
Alright, v1.357 is out with an S-meter OV averaging adjustment slider on the admin config tab.
Remember that the averaging is defined as as threshold count of per-sample ADC overflow events for every 64k ADC samples. So when the slider is set to 1k (the default) it means that the OV indicator will only light if there have been >= 1k ADV OVs during the 64k period. Note that the 1k OV events don't have to be consecutive. It's a threshold over a fixed interval. -
IP address blacklist seemingly doesn't [true only for proxied Kiwis, fixed in v1.336]
Okay, today's v1.336 release now applies the ip blacklist to incoming connections made via the proxy. Because the filtering in done in the Kiwi server instead of iptables a Kiwi log entry is made when the blacklist filter hits. iptables is still used for non-proxy connections for performance reasons.
The "ipt" shell alias now automatically includes the "-v" argument so you can see the packet counter for the iptable filtering rules. I.e. an incrementing packet count means the blacklist filter has been hit. Use "iptz" or "iptc" to clear the counters. These aliases can be used on the admin page console tab. -
v1.354 SECURITY IMPROVEMENTS: Debian root password no longer unset/blank
Beginning with the v1.354 release the system makes a one-time check for the Debian Linux root account having no password set. And also the demo account named "debian" having the well-known default password ("temppwd") set or, alternatively, no password set. Note: these passwords are Linux passwords and are separate and distinct from the Kiwi admin password.
If either of these situations is found then the root and/or debian account passwords are changed as follows:- If your Kiwi admin password has been set (i.e. not blank) then this password will be used.
- If no Kiwi admin password has been set then the Kiwi serial number will be used (written on top of Kiwi PCB in white silkscreen box; also found on "network" tab of admin page and in the log messages).
The exact actions taken are shown in the Kiwi log the first time v1.354, or a later version, is run. Some examples:
If no further "SECURITY" messages appear then the root and debian passwords were okay and nothing was done.Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords..
Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords.. Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "root" password is unset! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi admin password Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: "root" password set returned status=0 (OK) Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "debian" account password is set to the default! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi admin password Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: "debian" password set returned status=0 (OK)
These changes are necessary because Kiwis continue to be installed such that their ssh ports are accessible from the Internet with the root accounts having no password set. This makes them vulnerable to being found and infected by Internet viruses. This can happen if the Kiwi is behind a router but the ssh port is open though the router or if the Kiwi is directly connected to the Internet with a publicly routable address.Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords.. Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "root" password is unset! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi serial number (because Kiwi admin password unset)
It is possible you have intentionally made the root password unset/blank to ease administration when your ssh port is properly secured from Internet access (there are better ways to do this, see e.g. the ssh man page and the file /root/.ssh/authorized_keys). In that case this change will overwrite your unset/blank password and you will have to restore it (e.g. with "passwd -d root"). - If your Kiwi admin password has been set (i.e. not blank) then this password will be used.
-
v1.354 SECURITY IMPROVEMENTS: Debian root password no longer unset/blank
Beginning with the v1.354 release the system makes a one-time check for the Debian Linux root account having no password set. And also the demo account named "debian" having the well-known default password ("temppwd") set or, alternatively, no password set. Note: these passwords are Linux passwords and are separate and distinct from the Kiwi admin password.
If either of these situations is found then the root and/or debian account passwords are changed as follows:- If your Kiwi admin password has been set (i.e. not blank) then this password will be used.
- If no Kiwi admin password has been set then the Kiwi serial number will be used (written on top of Kiwi PCB in white silkscreen box; also found on "network" tab of admin page and in the log messages).
The exact actions taken are shown in the Kiwi log the first time v1.354, or a later version, is run. Some examples:
If no further "SECURITY" messages appear then the root and debian passwords were okay and nothing was done.Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords..
Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords.. Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "root" password is unset! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi admin password Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: "root" password set returned status=0 (OK) Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "debian" account password is set to the default! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi admin password Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: "debian" password set returned status=0 (OK)
These changes are necessary because Kiwis continue to be installed such that their ssh ports are accessible from the Internet with the root accounts having no password set. This makes them vulnerable to being found and infected by Internet viruses. This can happen if the Kiwi is behind a router but the ssh port is open though the router or if the Kiwi is directly connected to the Internet with a publicly routable address.Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords.. Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "root" password is unset! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi serial number (because Kiwi admin password unset)
It is possible you have intentionally made the root password unset/blank to ease administration when your ssh port is properly secured from Internet access (there are better ways to do this, see e.g. the ssh man page and the file /root/.ssh/authorized_keys). In that case this change will overwrite your unset/blank password and you will have to restore it (e.g. with "passwd -d root"). - If your Kiwi admin password has been set (i.e. not blank) then this password will be used.