[aprssig] aprsis DOS in Poland, observation

Scott Miller scott at opentrac.org
Mon Sep 7 22:26:50 EDT 2020


On 9/7/2020 5:59 PM, spam8mybrain via aprssig wrote:
> We can't ever stop people from being evil; we can only make it more 
> trouble than it's worth to be evil.
>
> My proposal assumes throttling per connection, with a lower throttling 
> rate for the completely compromised passcode authentication than for 
> PKI authentication. That way, Scott's telemetry devices, which 
> shouldn't be sending packets very fast any way (more than 1 every 10 
> seconds average would be excessive for that use case) would still 
> work, while the more stringent PKI authentication (much harder to 
> forge) would have a higher throttling threshold.
The Tracker4 functions as a standalone IGate, so it needs to be able to 
handle all of a local RF network's traffic.

But I think you're on the right track; the old passcode scheme should be 
acceptable for low-rate inputs and anything higher needs a higher 
standard of authentication. Just don't assume that for every IGate it's 
a trivial thing to handle PKI. Coincidentally I'm working on 
incorporating mbed TLS into a Tracker4 relative and the memory footprint 
is something like 20-60 kB of RAM and 60-250 kB of flash, depending on 
the feature set. That makes it the largest software component in the 
device by a huge margin - and all because Chrome won't let you turn on 
the mic in a browser unless the page is served over an HTTPS connection. 
There's absolutely no functional requirement for encryption or 
authentication in this use case, but Google's security policy (which 
isn't really a bad idea 99% of the time) imposes such a burden on the 
client that it has to use a larger microcontroller.

Scott
N1VG



More information about the aprssig mailing list