<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
Wireguard is also a recent popular option. Someone also suggested
ZeroTier. SO many choices.<br>
<br>
--Bart<br>
<br>
<div class="moz-cite-prefix">On 2/20/2023 11:33 AM, Doug Kingston
wrote:<br>
</div>
<blockquote type="cite"
cite="mid:CAGPaoUtg0xoQY=2XUQ1NRiDxvYsWWJwsFNfHSjYB8akwFtH88A@mail.gmail.com">
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<div dir="ltr">
<div class="gmail_default" style="font-size:small">There claims
to be an OpenVPN client for Android available from the
Play Store.</div>
<div class="gmail_default" style="font-size:small"><a
href="https://play.google.com/store/apps/details?id=de.blinkt.openvpn&hl=en_US&gl=US"
moz-do-not-send="true">https://play.google.com/store/apps/details?id=de.blinkt.openvpn&hl=en_US&gl=US</a><br>
</div>
<div class="gmail_default" style="font-size:small"><br>
</div>
<div class="gmail_default" style="font-size:small">I have not
tried this but can check it out to confirm viability and
process.</div>
<div class="gmail_default" style="font-size:small"><br>
</div>
<div class="gmail_default" style="font-size:small">There also
appears to be iOS support.</div>
<div class="gmail_default" style="font-size:small"><br>
</div>
<div class="gmail_default" style="font-size:small">-Doug-</div>
</div>
<br>
<div class="gmail_quote">
<div dir="ltr" class="gmail_attr">On Mon, Feb 20, 2023 at 9:52
AM Bart Kus <<a href="mailto:me@bartk.us"
moz-do-not-send="true" class="moz-txt-link-freetext">me@bartk.us</a>>
wrote:<br>
</div>
<blockquote class="gmail_quote" style="margin:0px 0px 0px
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<div> For lack of any other guidance, this sounds good to me.
I'm definitely not a security professional though, so it
could be awful. No idea how it'll work with phones in the
field yet.<br>
<br>
I think we should tag both the public + mgmt networks, since
an untagged network can always have tags inserted by users
and gain access to the mgmt VLAN?<br>
<br>
I propose we use <a href="http://10.44.0.0/16"
target="_blank" moz-do-not-send="true">10.44.0.0/16</a>
for the mgmt space, with a VLAN number of 1044. Each site
can take a /24 from that /16.<br>
<br>
For sectors that carry public untagged, that must also for
some reason carry mgmt, maybe they can macsec? I dunno if
we can do that on RouterOS.<br>
<br>
Also no idea how the VRF and any route leaking are gonna
work. They've been problematic on VyOS, and always tricky
on RouterOS, but maybe that's just me holding them wrong.<br>
<br>
This may also be a good time to flip the cell sites to
mostly bridge modems? Our R1 CPUs aren't very strong
though, so that may be a blocker.<br>
<br>
I'm about to install a switch at SnoDEM that should
definitely not be on the Internet, so I guess the mgmt VLAN
will start there.<br>
<br>
--Bart<br>
<br>
<div>On 2/15/2023 11:33 PM, Doug Kingston wrote:<br>
</div>
<blockquote type="cite">
<div dir="ltr">
<div class="gmail_default" style="font-size:small">I am
guessing that we will want some form of overlay admin
network potentially using VLANS and VPN access of some
form?</div>
<div class="gmail_default" style="font-size:small">I
have been working recently to get OpenVPN up and
running with various client platforms to Mikrotik
routers with some success.</div>
<div class="gmail_default" style="font-size:small"><br>
</div>
<div class="gmail_default" style="font-size:small">-Doug-</div>
</div>
<br>
<div class="gmail_quote">
<div dir="ltr" class="gmail_attr">On Sun, Feb 12, 2023
at 4:03 PM Bart Kus <<a href="mailto:me@bartk.us"
target="_blank" moz-do-not-send="true"
class="moz-txt-link-freetext">me@bartk.us</a>>
wrote:<br>
</div>
<blockquote class="gmail_quote" style="margin:0px 0px
0px 0.8ex;border-left:1px solid
rgb(204,204,204);padding-left:1ex">Hello,<br>
<br>
I'd like to kick off discussion about HamWAN security
with a relatively <br>
high level problem statement.<br>
<br>
We need to limit access to our control infrastructure
(routers, <br>
switches, modems, hypervisors, iLOs, etc) while still
allowing easy <br>
reliable access for amateur administrators to control
that <br>
infrastructure. We also need to support the case of a
person on a tower <br>
with a cell phone being able to easily login it to a
modem to get <br>
real-time signal readings for dish alignment.<br>
<br>
The current network is mostly a single flat OSPF
routing domain. We <br>
have a couple peering points, and some IPsec tunnels.
Our routers are <br>
mostly RouterOS flavor, which supports a pretty wide
set of <br>
capabilities. We may want to look at switching the
edge routers to VyOS <br>
though.<br>
<br>
What general high level design would be useful in
keeping access easy, <br>
while moving the control points out of public reach?<br>
<br>
--Bart<br>
<br>
_______________________________________________<br>
SecOps mailing list<br>
<a href="mailto:SecOps@hamwan.org" target="_blank"
moz-do-not-send="true" class="moz-txt-link-freetext">SecOps@hamwan.org</a><br>
<a
href="http://mail01.fmt.hamwan.net/mailman/listinfo/secops"
rel="noreferrer" target="_blank"
moz-do-not-send="true" class="moz-txt-link-freetext">http://mail01.fmt.hamwan.net/mailman/listinfo/secops</a><br>
</blockquote>
</div>
</blockquote>
<br>
</div>
</blockquote>
</div>
</blockquote>
<br>
</body>
</html>