On Jun 24, 2010, at 1:36 PM, ra3apw wrote:

We can assume that a weak place in security is an air interface of local
repeater (at confidence links between Gateways).

Therefore:
- authentication can work locally on a concrete repeater
- authentication takes place only at process of registration
- It is not required distribute authentication data base on all network
- It is not required send keys over the air.


If the database is not available at all repeaters, then the user must re-register at each repeater they want to use. Some users travel both frequently and randomly between repeaters (Today I am in Moscow, tomorrow in Paris, the next day in Atlanta) - pre-registration becomes burdensome to the point of making the system unusable.

For me, the callsign of the station is the registration, no other registration of RF units should be required.

For realisation of authentication - the simple mechanism is used that
does not demand PGP and its administrations.

- secret K value in the hidden memory of radio
- secret K value used by the authentication module
- only radio owner and repeater owner know K value
- K value cannot be read from radio but can be rewrite by special
software


Current radios have no way of storing or modifying the K value, so would require an external device. How is the K value communicated to the repeater? If on air, then it is no longer secret and can be used by the "man-in-the-middle" pirating the callsign.

Radio and repeater should have a software authentication module which
provides performance of D-Star Authentication Algorihm.
Function of authentication can be switch on/off in radio and repeater
according local law.


In practical terms, in places where no law exists, it is unlikely to implemented (or switched on) -- users in these locations visiting other locations where it is in use will need to register at each repeater. Also, in some countries, such as the US, Amateur Radio is used to support disaster and humanitarian response -- the operators bring their radios with them, but would not be able to use local repeaters if not part of the authentication system.

Many of us do not see the need or want such a system. We know there will be some abuses, but we aren't talking national security here, its a hobby, we deal with the abuses when they arise. The solution really becomes one where the local repeater operator turns networking on and off to individual repeaters or the entire network based on observed abuse. E.g. if a bunch of abuse is coming from repeater XYZ then as administrator I block repeater XYZ from relaying through my repeater or reflector until the keeper of repeater XYZ resolves her local issue. Better yet, the keeper of repeater XYZ turns off networking until the local issue is resolved.

I propose that it is the responsible of the local repeater licensee to insure their repeater is in compliance and not a responsibility of the network.

This is why we need a gateway design with open interfaces (if not open source) to permit the addition of traffic filters and services.




John D. Hays
Amateur Radio Station K7VE
PO Box 1223
Edmonds, WA 98020-1223 VOIP/SIP: [email protected]
Phone: 206-801-0820
801-790-0950

Reply via email to