<div dir="auto">Yup, and asking sysops to take on additional load to maintain everything. Several of us volunteer our tech resources but are limited in time to babysit their nodes. <div dir="auto"><br></div><div dir="auto">I do spend time developing client software and what realistically will happen is developers will just drop DX Cluster support before sucking away their time from improving other core functions of their software. Even if they did add password or encryption support. We're asking hams to update their software, most who are still running long out of support OSes and other software and refuse to update because it's too much of a bother. I still have users using 3-year old versions of my software, maybe older because we didn't add version reporting on server login until 2021. </div><div dir="auto"><br></div><div dir="auto">Matthew NR0Q </div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sun, Feb 26, 2023, 06:46 Kin <<a href="mailto:ea3cv@cronux.net">ea3cv@cronux.net</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang="ES" link="blue" vlink="purple" style="word-wrap:break-word"><div class="m_-8528676426889142038WordSection1"><p class="MsoNormal"><span style="font-size:12.0pt">But Matthew, that will only happen if the sysop just gives out passwords without a minimum of verification. We come back to the issue of the management of a node by the administrator.<u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:12.0pt"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-size:12.0pt">Kin EA3CV<u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:12.0pt"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-size:12.0pt"><u></u> <u></u></span></p><div style="border:none;border-top:solid #e1e1e1 1.0pt;padding:3.0pt 0cm 0cm 0cm"><p class="MsoNormal"><b>De:</b> Dxspider-support <<a href="mailto:dxspider-support-bounces@tobit.co.uk" target="_blank" rel="noreferrer">dxspider-support-bounces@tobit.co.uk</a>> <b>En nombre de </b>Matthew Chambers via Dxspider-support<br><b>Enviado el:</b> domingo, 26 de febrero de 2023 13:43<br><b>Para:</b> The DXSpider Support list <<a href="mailto:dxspider-support@tobit.co.uk" target="_blank" rel="noreferrer">dxspider-support@tobit.co.uk</a>><br><b>CC:</b> Matthew Chambers <<a href="mailto:mchambers@mchambersradio.com" target="_blank" rel="noreferrer">mchambers@mchambersradio.com</a>><br><b>Asunto:</b> Re: [Dxspider-support] Secure node to node connection proposal<u></u><u></u></p></div><p class="MsoNormal"><u></u> <u></u></p><div><p class="MsoNormal">I agree, it's not really going to slow down a bad actor who will create accounts with fake callsigns and throw away passwords anyways. And again just breaking all the clients currently in use.<u></u><u></u></p><div><p class="MsoNormal"><u></u> <u></u></p></div><div><p class="MsoNormal">Matthew NR0Q <u></u><u></u></p></div></div><p class="MsoNormal"><u></u> <u></u></p><div><div><p class="MsoNormal">On Sun, Feb 26, 2023, 06:38 Ian Maude via Dxspider-support <<a href="mailto:dxspider-support@tobit.co.uk" target="_blank" rel="noreferrer">dxspider-support@tobit.co.uk</a>> wrote:<u></u><u></u></p></div><blockquote style="border:none;border-left:solid #cccccc 1.0pt;padding:0cm 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm"><p class="MsoNormal">Personally I am totally and utterly against forcing users to have a password. I also do not see the point of having a password on node connections but, like users, if they want one, they can have one.<br><br>73 Ian<br><br>> On 26 Feb 2023, at 09:36, Mikel EA2CW via Dxspider-support <<a href="mailto:dxspider-support@tobit.co.uk" target="_blank" rel="noreferrer">dxspider-support@tobit.co.uk</a>> wrote:<br>> <br>> After a lot of hours with some sysops already here, I have wrote down a first proposal of the first -small- step we could take, rising a bit the node 2 node connections. Again, this is only a basic document to start, not an absolute and unique true.<br>> I expect to have an good open discussion among all us to define and agree the path to a better dx-cluster net.<br>> <br>> NODE<>NODE SECURE CONNECTION CRITERIA:<br>> <br>> 1. Unregistered users can connect and view spots, they cannot upload any info into the network.<br>> <br>> 2. Registered users can login, view and also upload spots, anns, etc.<br>> <br>> 3. All registered users must have a password. Registered users without password would not be acceptable.<br>> <br>> 4. All nodes to which the node is connected must meet the same requirements.<br>> <br>> 5. The connection between nodes must be between registered nodes and with password, that is:<br>> - set/spider [node]<br>> - set/reg <node><br>> - set/password <node><br>> - set/password <node> <password>.<br>> (The /spider/connect/<server> files must be modified so that the password is used).<br>> <br>> 6. If possible, the connection between nodes should be made via ssh or other secure mechanism. (Already testing a ssh tunneling protocol with success)<br>> <br>> 7. The connection to the RBN servers is optional from each server, but the received RBN spots will not be forwarded to other nodes.<br>> <br>> After -I hope- achieving an agreement, I would want to start a net where all the clusters connected meet the agreed conditions.<br>> I ask you the sysops whom already meet them or with this aim, to contact me and other partners in the same position for a -probably- slow but firm evolution.<br>> <br>> <br>> POSSIBLE NEXT STEPS IN THE FUTURE<br>> <br>> * A protocol should be designed within the dx-cluster standard to share hashed passwords between nodes, avoiding the need to register multiple times the same user in different nodes and reducing the maintenance tasks of each sysop. This information, i.e. (user:hash:origin_cluster) could be later be broadcasted around the net and/or being also distributed via config files as we already do, i.e. with bad IPs, and stored on each node.<br>> <br>> * The connections of identified nodes / users to any node should be made always using secured connections. No more telnet usr/pwd open transmissions should be allowed.<br>> <br>> * The secure connection system should be implemented as a part of the server programs (as telnet is now) avoiding the added complexity of creating tunnels between each pair of servers. This system could be used for secure connection between nodes as well as for connection and identification of users, who could continue to access in an insecure way -without the ability to upload information to the network. It would keep the connection system of the current client softwares unchanged.<br>> <br>> <br>> <br>> Hope we can discuss all this among us, securing the future of an open, safe and not hierarchically structured. This philosophy is IMHO the one that has kept alive the dxcluster network during so many years/decades.<br>> <br>> Thank you and 73 de Mikel EA2CW<br>> <br>> <br>> <br>> <br>> -- <br>> <a href="mailto:ea2cw@gautxori.com" target="_blank" rel="noreferrer">ea2cw@gautxori.com</a><br>> Bilbao, Bizkaia. IN83MG<br>> <a href="http://radio.gautxori.com" target="_blank" rel="noreferrer">http://radio.gautxori.com</a><br>> <a href="http://qrz.com/db/ea2cw" target="_blank" rel="noreferrer">http://qrz.com/db/ea2cw</a><br>> <a href="https://t.me/EA2CW" target="_blank" rel="noreferrer">https://t.me/EA2CW</a><br>> <br>> <br>> _______________________________________________<br>> Dxspider-support mailing list<br>> <a href="mailto:Dxspider-support@tobit.co.uk" target="_blank" rel="noreferrer">Dxspider-support@tobit.co.uk</a><br>> <a href="https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support" target="_blank" rel="noreferrer">https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support</a><br><br><br>_______________________________________________<br>Dxspider-support mailing list<br><a href="mailto:Dxspider-support@tobit.co.uk" target="_blank" rel="noreferrer">Dxspider-support@tobit.co.uk</a><br><a href="https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support" target="_blank" rel="noreferrer">https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support</a><u></u><u></u></p></blockquote></div><p class="MsoNormal"><u></u> <u></u></p><div><p class="MsoNormal"><em><span style="font-family:"Calibri",sans-serif">The content of this email is confidential and intended for the recipient specified in message only. It is strictly forbidden to share any part of this message with any third party, without a written consent of the sender. If you received this message by mistake, please reply to this message and follow with its deletion, so that we can ensure such a mistake does not occur in the future.</span></em><u></u><u></u></p></div><div><p class="MsoNormal"><br><em><span style="font-family:"Calibri",sans-serif">Please do not print this email unless it is necessary. Every unprinted email helps the environment.</span></em><u></u><u></u></p></div></div></div></blockquote></div>
<br>
<div><em>The content of this email is confidential and intended for the
recipient specified in message only. It is strictly forbidden to share
any part of this message with any third party, without a written consent
of the sender. If you received this message by mistake, please reply to
this message and follow with its deletion, so that we can ensure such a
mistake does not occur in the future.</em></div><div><em></em><em></em><br><em><em>Please do not print this email unless it is necessary. Every unprinted email helps the environment.</em></em></div>