<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body>
    Please have mercy on us embedded implementers! PKI support would be
    fine, as long as there's some other solution available for devices
    that don't have the resources for asymmetric cryptography. A
    pre-shared key, maybe, with any required crypto functions based on
    something with low computational requirements like XXTEA.<br>
    <br>
    Scott<br>
    N1VG<br>
    <br>
    <div class="moz-cite-prefix">On 9/5/2020 10:07 AM, Mobilinkd LLC
      wrote:<br>
    </div>
    <blockquote type="cite"
cite="mid:CAEox9HFyGTVbqQ87uM+wJuf9YM9kDf0oSAZpSqAmJyjH7s+5WQ@mail.gmail.com">
      <meta http-equiv="content-type" content="text/html; charset=UTF-8">
      <div dir="ltr">
        <div>Would it be worthwhile discussing whether to use PKI for
          APRS-IS authentication?<br>
        </div>
        <div><br>
        </div>
        <div>I just discovered that there is a registered X.509
          extension for ham radio callsigns and that we already have a
          CA in LOTW.</div>
        <div><br>
        </div>
        <div><a
href="https://perens.com/2019/07/02/yes-it-is-legal-to-use-cryptographic-signature-on-amateur-radio-and-thats-important/"
            moz-do-not-send="true">https://perens.com/2019/07/02/yes-it-is-legal-to-use-cryptographic-signature-on-amateur-radio-and-thats-important/</a></div>
        <div><br>
        </div>
        <div>
          <div dir="ltr" class="gmail_signature"
            data-smartmail="gmail_signature">Kind Regards,<br>
            <br>
            Rob Riggs WX9O<br>
            Mobilinkd LLC<br>
          </div>
        </div>
        <br>
      </div>
      <br>
      <div class="gmail_quote">
        <div dir="ltr" class="gmail_attr">On Sat, Sep 5, 2020 at 6:15 AM
          Heikki Hannikainen <<a href="mailto:hessu@hes.iki.fi"
            moz-do-not-send="true">hessu@hes.iki.fi</a>> wrote:<br>
        </div>
        <blockquote class="gmail_quote" style="margin:0px 0px 0px
          0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">On
          Fri, 4 Sep 2020, Bill Vodall wrote:<br>
          <br>
          > Is aprs-is under a Denial of Services attack by jankesi
          and others?<br>
          > Looks like multiple packets arriving every second.<br>
          <br>
          The packet rate during the DOS abuse event last night was some
          1500-1700 <br>
          packets per second at peak.<br>
          <br>
          <a
href="https://www.dropbox.com/s/tztvaup286vzwnb/aprsfi-polish-abuse-20200904-traffic.png?dl=0"
            rel="noreferrer" target="_blank" moz-do-not-send="true">https://www.dropbox.com/s/tztvaup286vzwnb/aprsfi-polish-abuse-20200904-traffic.png?dl=0</a><br>
          <br>
          Some APRS-IS clients on the full feed could not take this
          traffic (too <br>
          slow to process, or too slow network, buffers fill up) and got
          <br>
          disconnected. As a network traffic rate, it was only around
          1.4 Mbit/s sec <br>
          though. Due to a bug, the two APRS-IS data aggregator aprsc
          instances at <br>
          <a href="http://aprs.fi" rel="noreferrer" target="_blank"
            moz-do-not-send="true">aprs.fi</a> crashed too, leaving <a
            href="http://aprs.fi" rel="noreferrer" target="_blank"
            moz-do-not-send="true">aprs.fi</a> without a data feed.<br>
          <br>
          This is how it looked on the map, screen shot courtesy of
          Mateusz Szyper <br>
          on the <a href="http://aprs.fi" rel="noreferrer"
            target="_blank" moz-do-not-send="true">aprs.fi</a>
          discussion group:<br>
          <br>
          <a
href="https://www.dropbox.com/s/5wbjtttkkw1munh/aprs-polish-abuse-20200904-map.jpg?dl=0"
            rel="noreferrer" target="_blank" moz-do-not-send="true">https://www.dropbox.com/s/5wbjtttkkw1munh/aprs-polish-abuse-20200904-map.jpg?dl=0</a><br>
          <br>
          And here are a few sample packets, showing what the randomly
          generated <br>
          packets looked like. The coordinates are random, in Poland,
          with the <br>
          clear intention of polluting the map fully.<br>
          <br>
          2020-09-04 19:48:27 EEST:
          CI37PA>APDR16,WIDE3-3,qAC,SQ6KPO-1:=5031.68N\01844.35EZ
          jeszcze nie dojrzalem.<br>
          2020-09-04 19:48:46 EEST:
          CI371PY-3>APDR16,WIDE3-3,qAC,SQ6KPO-1:=5248.72N/01933.83EX
          sie draznic z ludzmi.<br>
          2020-09-04 19:45:58 EEST:
          CI37PA-21>APDR16,WIDE3-3,qAC,SQ6KPO-1:=5411.38N\01600.85E-2
          Jebane kurwy cebulaki.<br>
          2020-09-04 19:48:56 EEST:
          CI37PA-20>APDR16,WIDE3-3,qAC,SQ6KPO-1:=5051.97N/01543.24Eb
          masz, masz.<br>
          2020-09-04 19:49:26 EEST:
          CI37PA-88>APDR16,WIDE3-3,qAC,SQ6KPO-1:=5002.85N/02147.17Ec
          pomarancza kurwo niebieska.<br>
          <br>
          Here's more, each source callsign emitted packets at random
          coordinates <br>
          with comments from some pool of (obscene) text, so you can
          just pick one <br>
          call and watch:<br>
          <br>
          <a href="https://aprs.fi/?c=raw&limit=&call=CI37PA-9"
            rel="noreferrer" target="_blank" moz-do-not-send="true">https://aprs.fi/?c=raw&limit=&call=CI37PA-9</a><br>
          <br>
          I haven't looked at a large data set yet; these samples were
          from a very <br>
          small set of a thousand packets that I took a quick look at
          now. These <br>
          packets were injected using an igate call of SQ6KPO-1 but
          there's no <br>
          reason why that could not be a random call in the future.
          Also, it would <br>
          be *very* unlikely that SQ6KPO is the callsign of the person
          doing this <br>
          abuse - it is more likely that the intention is to abuse him
          by using his <br>
          callsign.<br>
          <br>
          It's easy to write a client to do this kind of abuse, and easy
          to improve <br>
          it (make more things random), and after that it's quite
          difficult to fully <br>
          filter.<br>
          <br>
          This is just to describe what happened, and what you should
          expect to see <br>
          in the future. We've been lucky to have very little abuse and
          DOS attacks <br>
          so far.<br>
          <br>
             - Hessu<br>
          <br>
          <br>
          _______________________________________________<br>
          aprssig mailing list<br>
          <a href="mailto:aprssig@lists.tapr.org" target="_blank"
            moz-do-not-send="true">aprssig@lists.tapr.org</a><br>
          <a
            href="http://lists.tapr.org/mailman/listinfo/aprssig_lists.tapr.org"
            rel="noreferrer" target="_blank" moz-do-not-send="true">http://lists.tapr.org/mailman/listinfo/aprssig_lists.tapr.org</a><br>
        </blockquote>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <pre class="moz-quote-pre" wrap="">_______________________________________________
aprssig mailing list
<a class="moz-txt-link-abbreviated" href="mailto:aprssig@lists.tapr.org">aprssig@lists.tapr.org</a>
<a class="moz-txt-link-freetext" href="http://lists.tapr.org/mailman/listinfo/aprssig_lists.tapr.org">http://lists.tapr.org/mailman/listinfo/aprssig_lists.tapr.org</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>