[Dxspider-support] Node verification

Lists lists at g1fef.co.uk
Mon Feb 10 14:51:21 GMT 2025


Ok, but I don’t see how it protects any better than enforcing passwords which is already implemented in DXSpider at least. Not all cluster software even support passwords, if they did then we could have a reasonably secure network.

Either way it would require work on (at least some) software, and judging by the poor sysadmin on keeping nodes up to date with the latest software version I think it would be very difficult to actually implement.

Chris - G1FEF



> On 10 Feb 2025, at 14:45, Mike McCarthy, W1NR via Dxspider-support <dxspider-support at tobit.co.uk> wrote:
> 
> Yes, but only node connections. The latest spoofing is most likely a rouge node connecting to another node with some other valid callsign that is registered as a node connection. Then it can inject whatever it wants into the network. Currently, we have no checking other than password and IP block list for any node connections.
> 
> Nodes need DNS for users to connect.
> 
> 
> On 2/10/2025 9:35 AM, Lists via Dxspider-support wrote:
>> What you are talking about is implementing a whitelist of IPs that are permitted to connect to a node based on A records in DNS, right?
>> So when the end user registers with you they give you their hostname, this is stored locally with callsign linked to hostname.
>> Then when someone connects with the callsign the hostname is looked up and if the IP doesn't match the IP of the session don't allow access.
>> Did I understand correctly?
>> Chris - G1FEF
> 
> 
> -- 
> 73 de Mike, W1NR
> 
> THAT was the equation. EXISTENCE!... SURVIVAL... must cancel out... programming!
> 
> - Ruk -
> 
> 
> _______________________________________________
> Dxspider-support mailing list
> Dxspider-support at tobit.co.uk
> https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support




More information about the Dxspider-support mailing list