[2024-feb-29] Sad news: Eric Layton aka Nocturnal Slacker aka vtel57 passed away on Feb 26th, shortly after hospitalization. He was one of our Wiki's most prominent admins. He will be missed.

Welcome to the Slackware Documentation Project

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
howtos:network_services:running_an_access_point_from_a_slackware_box [2016/10/23 08:18 (UTC)] – [6.1 Use Non Standard Ports] louigi600howtos:network_services:running_an_access_point_from_a_slackware_box [2016/10/28 07:40 (UTC)] – [6 Remote Administration] louigi600
Line 18: Line 18:
                  * AP/VLAN                  * AP/VLAN
                  * monitor                  * monitor
-AP need to be amongst the software interface modes.+AP needs to be among the software interface modes
 + 
 +Ok there is still some Wireless NICs that support hardware master mode but that's 3 against all the rest I'm not going to bother going into any detail with those 3 exceptions, google is your friend if you want to insist in the hardware master mode way
  
 ====== 3 Software Requirements ====== ====== 3 Software Requirements ======
Line 453: Line 455:
 You can dump dnsmasq's lease file to see the dhcp leases You can dump dnsmasq's lease file to see the dhcp leases
  
-  root@router:~# cat /run/dnsmasq/dnsmasq.leases +  root@router:~# cat /run/dnsmasq/br0.leases 
   1411875361 00:01:02:03:04:05 192.168.0.3 b3bo *   1411875361 00:01:02:03:04:05 192.168.0.3 b3bo *
   1411874427 0a:0b:0c:0d:0e:0f 192.168.0.4 printsrv *   1411874427 0a:0b:0c:0d:0e:0f 192.168.0.4 printsrv *
Line 509: Line 511:
 ====== 6 Remote Administration ====== ====== 6 Remote Administration ======
 I'm not advocating that allowing remote administration from your WAN connection is a good thing but there are times where it may be necessary so here are some tips for minimizing the risk of having your router suffering brute force attacks or other bad things happen to it. I'm not advocating that allowing remote administration from your WAN connection is a good thing but there are times where it may be necessary so here are some tips for minimizing the risk of having your router suffering brute force attacks or other bad things happen to it.
 +
 +I'm an old fashioned system administrator so for me remote administration is done via ssh, if you've added a nice web administration tool to your AP/Router keep in mind that running apache just for the sake of having remote web administration will expose you to a whole lot of security issues that need to be addressed and maintained over time. 
 +
 +  - use non standard ports
 +  - disallow password authentication
 +  - minimize your attack surfaces
 +Let me give you a little reasoning for the list.
  
 ===== 6.1 Use Non Standard Ports ===== ===== 6.1 Use Non Standard Ports =====
-If you've been doing stuff as described here you're going to need to have ssh access to your router, if not whatever you're going to use to do your remote administration make sure it's not going to run on the standard port for it. This at least makes it less obvious that you allow remote administration on your router.+Whatever is your remote administration tool of choice it'a good idea not to leave access to it from WAN on it's well known port, making it less obvious that you run such a service. If you do this there's a good chance that your AP/Router will never get unwanted attention
  
 ===== 6.2 Disallow Password Authentication ===== ===== 6.2 Disallow Password Authentication =====
-Allowing password authentication is a welcome for brute force attacks so avoid it wherever possible (ie for ssh administrations only allow authentication with keys).+Allowing password authentication is a welcome for brute force attacks so avoid it wherever possible (ie for ssh administrations only allow authentication with keys). If you're doing web based remote administration you could send in a key via get and then set a cookie or something like that along with password protected htaccess.
  
-===== 6.Avoid Running Remote Administration 24x7 =====+===== 6.3 Minimize Your Attack Surfaces ===== 
 +Your AP/Router should expose to the WAN connection nothing more then what is really needed. Scanning your own AP/Router and closing or disabling unnecessary services to WAN is something you should allays do so that you minimize the attack surfaces should you ever get unwanted attention. 
 + 
 +==== 6.3.1 Avoid Running Remote Administration 24x7 ====
 If you can have remote administration active only when you need it you're not leaving the attack surface available all the time but then you need an easy way to turn it on when you're away from home. If you can have remote administration active only when you need it you're not leaving the attack surface available all the time but then you need an easy way to turn it on when you're away from home.
-I've means of doing so: +I've two means of doing so: 
-  * If any family member is home it can be temporarily activated by pressing a specific button on the router itself. +  * If any family member is home it can be temporarily activated by pressing a specific button on the router itself (it's the second button under the blue led in the images below)
-  * If nobody is home I've modified a 200 line minimal web server (nweb) to temporarily allow remote administration is a specific url is requested (while still leaving no clue as to what may have happened when that url is requested because 403 is returned anyway and besides that also nweb is on a non standard port)+  * If nobody is home I've modified a 200 line minimal web server (nweb) to listen to requests on a non standard port and temporarily allow remote administration if a specific url is requested
 + 
 +Whichever way the temporary remote admin is enabled it also get's automatically turned off after some time (should you ever forget to turn it off once you're done). 
 + 
 +Nweb is a really basic webserver that only servers static html images and a few archive formats, it does not even allow directory listing. Besides that I have it parse and enable before serving the page ... so if you don't physically have the page that enables the remote administration a 403 is returned anyway leaving no clue as to waht was done in response to that request.
  
-Whichever way the temporary remote admin is enabled it also get's automatically turned off after some time. +If you're interested in nweb you can get it by googling "nweb tiny web server". You should hit github with something like nweb23.c with some 204 lines of C code. It should be easy for you to modify the source to match your needs.
-If you're interested in nweb you can get it by googling "nweb minimal web server" you should hit github with something like nweb23.c with some 204 lines of C code. It should be easy for you to modify the source to match your needs.+
    
  
 howtos:network_services:running_an_access_point_from_a_slackware_box ()