This forum uses cookies
This forum makes use of cookies to store your login information if you are registered, and your last visit if you are not. Cookies are small text documents stored on your computer; the cookies set by this forum can only be used on this website and pose no security risk. Cookies on this forum also track the specific topics you have read and when you last read them. Please confirm whether you accept or reject these cookies being set.

A cookie will be stored in your browser regardless of choice to prevent you being asked this question again. You will be able to change your cookie settings at any time using the link in the footer.

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Openplotter network security on marina wifi
#5
A little more information.
I have the default 'openplotter' access point configured on the RPI4 on-board wifi adapter (with a non-default wifi passphrase of course). In addition, I stuck a wifi-dongle in the USB port and furnished wpa_supplicant.conf with the credentials of the marina wifi. This provides internet connectivity not only to the openplotter, but also to the wifi clients that are attached to the openplotter access point. So far, I was quite chaffed with this! However, because my signalk's udp nmea port was accessible from the entire wifi segment, I suddenly found values in my signalk database that must have come from some other boat, and hence I found out that my marina wifi did not isolate clients. I have already logged an issue with signalk to limit the interfaces that the nmea listeners register to. Strictly spoken, this is not an openplotter issue but a raspbian thing. However, openplotter owners might be at risk like I am.

I have looked into wpa_supplement.conf parameters, hoping I could specify client isolation here, but it does not seem to sit here.
Reply


Messages In This Thread
RE: Openplotter network security on marina wifi - by ironman - 2021-08-27, 11:50 AM

Forum Jump:


Users browsing this thread: 1 Guest(s)