-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Check system security #8
Comments
Should be improved with current buildroot version from GIT: |
Upgrading to plutosdr-fw 0.32 could close the issue: https://github.com/analogdevicesinc/plutosdr-fw/releases/tag/v0.32 |
The develop branch now works with plutosdr-fw v0.32, so I finally had the time to try this out. Works flawlessly! # device_format_jffs2
# device_persistent_keys
# device_passwd The entered password remains after power-cycling the Pluto. A next security issue could be the iiod daemon. By default it seems to be enabled at any network interface. Any HNAP client is able change transceiver settings of a basestation when accessing iiod via the TAP device. iiod binds to tcp port 30431. Another open port is for the iperf3 server (5201), this is not an issue. The device is furthermore accessible via port 80 / www, but I do not see any security issue here.
|
* Renamed path to firmware overlay data * [#48] Show HNAP version in MOTD and website * [#8] Show motd warning in case root passwd is default * Redirect version checker to HNAP Github releases * Remove obsole png files in buildroot msd/img folder * Don't fail rm over nonexistant files * Re-Add information about libiio usage as we still support this * Fix version comparison for our version string format * Insert HNAP version to version.js instead of firmware version
device_persistent_keys
anddevice_passwd
The text was updated successfully, but these errors were encountered: