On Wed, 25 Jun 2014, Tom Hayward wrote:

On Wed, Jun 25, 2014 at 7:32 AM, Eric H. Christensen
<[email protected]> wrote:
Also, it appears that the server supports EXPORT cipher suites.  I'd recommend 
just supporting HIGH ciphers.

Thinking a little more outside the box, how about supporting null
cipher, for those users coming from from ham RF networks? By
supporting HIGH and eNULL, the browser gets to choose. Most browsers
will choose HIGH, unless the ham has specifically configured their
browser not to allow encryption.

In principle I'm in favor of the NULL cipher.  I hung out on the OpenSSH list for a year 
or more trying to get them to put the NULL encryption back in, specifically to support 
ham networks.  What I got back from the developers was something like:  "Tell your 
government to not use such stupid rules for radio!" or similar.  In the end all I 
could do was split off the NULL patches from the High Performance Computing monster 
patch, and the HPC guy said he would maintain it as a separate patch from now on.  That's 
SSH though, not SSL, but same principles apply.


How is this secure compared to plain text http?

1) The remote server is authenticated (not currently the case, because
Curt did not tell us which self-signed cert to expect. Maybe he could
send a PGP-signed message to let us know what key to expect on the
server, or get his cert signed by one of the free, trusted CAs like
StartCom)

Really necessary?  Seriously, it's a Wiki password that's at risk here, and 
perhaps a few Wiki pages, that can be reconstructed if they're mangled.  If an 
account gets compromised, let me know and I'll fix things up.

I'm all for security when it's truly necessary, but let's go easy here.  No 
personal data is on this site, not credit card info, nothing.


2) You can turn on SSL client authentication and use it in lieu of
passwords. There's a MediaWiki extension for this:
http://www.mediawiki.org/wiki/Extension:SSL_authentication, and the
ARRL signs certificates, free (free wold-wide, regardless of
membership), that can be trusted more than a CAPTCHA.

Again, I wanted a simple way to get to https.  I don't have unlimited time to 
play with the server, plus would like to get back to doing releases and/or code 
development.  The ARRL certificates sound wonderful, but there's a bunch of 
work I'd need to do, plus each ham would have to go through the process to get 
their own certificate.  I kind'a doubt that will get done just for a wiki 
login.  The people who would win out are the ones that have already gone 
through the process for other reasons, like contest logging.

Let's table this discussion for a while.  I need to implement automated backups 
of the list config, list archives, mysql dump, server configs, and wiki 
configs.  Right now that's my #1 priority for the server.  Also need to push 
out another stable Xastir release, whether or not we do the map cleanups that 
were suggested previously.

Oh yea, and the reverse DNS doesn't work yet so some of the list emails can't 
go out, to servers that check such.  I've submitted a trouble-ticket to 
cloudatcost but so far there's been no movement on it.  I would apologize to 
those that aren't getting the list emails, but they won't get this message 
either!

--
Curt, WE7U.        http://wetnet.net/~we7u
APRS Client Capabilities:  http://wetnet.net/~we7u/aprs_capabilities.html
_______________________________________________
Xastir mailing list
[email protected]
http://xastir.org/mailman/listinfo/xastir

Reply via email to