[Dxspider-support] Spider Nodes used by ROS to auto-spot

Henk Remijn PA5KT pa5kt at remijn.net
Fri Jul 9 08:31:31 BST 2010


  I did send sysops of clusters below an email to make them aware and to 
ask if they could enable better security.

Henk

Op 09-07-2010 4:56, VK3AMA schreef:
> While researching ROS cluster spots arriving at HamSpots.net via the 
> Cluster, I have discovered how the ROS software is auto-spotting to a 
> list of nodes that may be of concern to the Node Sysops.
>
> The following Spider Node addresses are hard-coded in the software.
>
> dxc.us6iq.com
> dxc.ham.hr
> 9a0dxc.hamradio.hr
> remo3.renet.ru
> cluster.sk4bw.net
> ax25.org
> sk3w.se
> sector7.nu
> sm7gvf.dyndns.org
>
> ROS software establishes a connection at startup using your callsign 
> and varies which node it connects to, not always the same node.
>
> When a qso is logged  a spot is auto generated (there is no option in 
> ROS to turn this off that I could find) and the text of the spot is 
> changed based on another hard-coded list of messages. This is 
> obviously done to give the impression that the spot is sent from a 
> human (unlike the past flooding of the network, same text and same 
> node). No where in the ROS FAQ or User Guide is this behaviour 
> documented.
>
> I ran ROS in RX mode today, after a callsign was decoded, I hit the 
> log button and it sent a spot to the cluster without permission with 
> my name and call thanking the other station for the QSO.
>
> A quick review of recent ROS spots shows the same nodes being used and 
> similar style comments.
>
> What other surprises are hidden in this software?
>
> de Laurie, VK3AMA
>
>
> _______________________________________________
> Dxspider-support mailing list
> Dxspider-support at dxcluster.org
> http://mailman.tobit.co.uk/mailman/listinfo/dxspider-support
>


-- 
Henk Remijn PA5KT
email: pa5kt at remijn.net
www: www.pa5kt.com




More information about the Dxspider-support mailing list