jks
About
- Username
- jks
- Joined
- Visits
- 36,244
- Last Active
- Roles
- Member, Administrator, Moderator
- Points
- 639
Reactions
-
IP address blacklist seemingly doesn't [true only for proxied Kiwis, fixed in v1.336]
Okay, today's v1.336 release now applies the ip blacklist to incoming connections made via the proxy. Because the filtering in done in the Kiwi server instead of iptables a Kiwi log entry is made when the blacklist filter hits. iptables is still used for non-proxy connections for performance reasons.
The "ipt" shell alias now automatically includes the "-v" argument so you can see the packet counter for the iptable filtering rules. I.e. an incrementing packet count means the blacklist filter has been hit. Use "iptz" or "iptc" to clear the counters. These aliases can be used on the admin page console tab. -
v1.354 SECURITY IMPROVEMENTS: Debian root password no longer unset/blank
Beginning with the v1.354 release the system makes a one-time check for the Debian Linux root account having no password set. And also the demo account named "debian" having the well-known default password ("temppwd") set or, alternatively, no password set. Note: these passwords are Linux passwords and are separate and distinct from the Kiwi admin password.
If either of these situations is found then the root and/or debian account passwords are changed as follows:- If your Kiwi admin password has been set (i.e. not blank) then this password will be used.
- If no Kiwi admin password has been set then the Kiwi serial number will be used (written on top of Kiwi PCB in white silkscreen box; also found on "network" tab of admin page and in the log messages).
The exact actions taken are shown in the Kiwi log the first time v1.354, or a later version, is run. Some examples:
If no further "SECURITY" messages appear then the root and debian passwords were okay and nothing was done.Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords..Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords.. Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "root" password is unset! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi admin password Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: "root" password set returned status=0 (OK) Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "debian" account password is set to the default! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi admin password Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: "debian" password set returned status=0 (OK)
These changes are necessary because Kiwis continue to be installed such that their ssh ports are accessible from the Internet with the root accounts having no password set. This makes them vulnerable to being found and infected by Internet viruses. This can happen if the Kiwi is behind a router but the ssh port is open though the router or if the Kiwi is directly connected to the Internet with a publicly routable address.Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords.. Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "root" password is unset! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi serial number (because Kiwi admin password unset)
It is possible you have intentionally made the root password unset/blank to ease administration when your ssh port is properly secured from Internet access (there are better ways to do this, see e.g. the ssh man page and the file /root/.ssh/authorized_keys). In that case this change will overwrite your unset/blank password and you will have to restore it (e.g. with "passwd -d root"). - If your Kiwi admin password has been set (i.e. not blank) then this password will be used.
-
v1.354 SECURITY IMPROVEMENTS: Debian root password no longer unset/blank
Beginning with the v1.354 release the system makes a one-time check for the Debian Linux root account having no password set. And also the demo account named "debian" having the well-known default password ("temppwd") set or, alternatively, no password set. Note: these passwords are Linux passwords and are separate and distinct from the Kiwi admin password.
If either of these situations is found then the root and/or debian account passwords are changed as follows:- If your Kiwi admin password has been set (i.e. not blank) then this password will be used.
- If no Kiwi admin password has been set then the Kiwi serial number will be used (written on top of Kiwi PCB in white silkscreen box; also found on "network" tab of admin page and in the log messages).
The exact actions taken are shown in the Kiwi log the first time v1.354, or a later version, is run. Some examples:
If no further "SECURITY" messages appear then the root and debian passwords were okay and nothing was done.Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords..Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords.. Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "root" password is unset! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi admin password Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: "root" password set returned status=0 (OK) Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "debian" account password is set to the default! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi admin password Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: "debian" password set returned status=0 (OK)
These changes are necessary because Kiwis continue to be installed such that their ssh ports are accessible from the Internet with the root accounts having no password set. This makes them vulnerable to being found and infected by Internet viruses. This can happen if the Kiwi is behind a router but the ssh port is open though the router or if the Kiwi is directly connected to the Internet with a publicly routable address.Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords.. Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "root" password is unset! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi serial number (because Kiwi admin password unset)
It is possible you have intentionally made the root password unset/blank to ease administration when your ssh port is properly secured from Internet access (there are better ways to do this, see e.g. the ssh man page and the file /root/.ssh/authorized_keys). In that case this change will overwrite your unset/blank password and you will have to restore it (e.g. with "passwd -d root"). - If your Kiwi admin password has been set (i.e. not blank) then this password will be used.
-
v1.354 SECURITY IMPROVEMENTS: Debian root password no longer unset/blank
Beginning with the v1.354 release the system makes a one-time check for the Debian Linux root account having no password set. And also the demo account named "debian" having the well-known default password ("temppwd") set or, alternatively, no password set. Note: these passwords are Linux passwords and are separate and distinct from the Kiwi admin password.
If either of these situations is found then the root and/or debian account passwords are changed as follows:- If your Kiwi admin password has been set (i.e. not blank) then this password will be used.
- If no Kiwi admin password has been set then the Kiwi serial number will be used (written on top of Kiwi PCB in white silkscreen box; also found on "network" tab of admin page and in the log messages).
The exact actions taken are shown in the Kiwi log the first time v1.354, or a later version, is run. Some examples:
If no further "SECURITY" messages appear then the root and debian passwords were okay and nothing was done.Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords..Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords.. Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "root" password is unset! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi admin password Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: "root" password set returned status=0 (OK) Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "debian" account password is set to the default! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi admin password Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: "debian" password set returned status=0 (OK)
These changes are necessary because Kiwis continue to be installed such that their ssh ports are accessible from the Internet with the root accounts having no password set. This makes them vulnerable to being found and infected by Internet viruses. This can happen if the Kiwi is behind a router but the ssh port is open though the router or if the Kiwi is directly connected to the Internet with a publicly routable address.Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: One-time check of Linux passwords.. Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: WARNING Linux "root" password is unset! Nov 28 20:25:01 kiwisdr kiwid[12888]: 00:00:37.951 .... SECURITY: Setting it to Kiwi serial number (because Kiwi admin password unset)
It is possible you have intentionally made the root password unset/blank to ease administration when your ssh port is properly secured from Internet access (there are better ways to do this, see e.g. the ssh man page and the file /root/.ssh/authorized_keys). In that case this change will overwrite your unset/blank password and you will have to restore it (e.g. with "passwd -d root"). - If your Kiwi admin password has been set (i.e. not blank) then this password will be used.
-
v1.352: new time station extension (timecode decoder)
After sitting on the "back burner" for almost 3 years the timecode extension is now available. It's useable but incomplete, has missing features and many known bugs.
It's also more of a curiosity than anything really useful. But that can be said to a varying degree about the entire project I suppose. I did it because it was fun. Something that has been in short supply lately.






