[secops] Initial problem statement
Bart Kus
me at bartk.us
Mon Feb 20 12:02:47 PST 2023
Wireguard is also a recent popular option. Someone also suggested
ZeroTier. SO many choices.
--Bart
On 2/20/2023 11:33 AM, Doug Kingston wrote:
> There claims to be an OpenVPN client for Android available from the
> Play Store.
> https://play.google.com/store/apps/details?id=de.blinkt.openvpn&hl=en_US&gl=US
> <https://play.google.com/store/apps/details?id=de.blinkt.openvpn&hl=en_US&gl=US>
>
> I have not tried this but can check it out to confirm viability and
> process.
>
> There also appears to be iOS support.
>
> -Doug-
>
> On Mon, Feb 20, 2023 at 9:52 AM Bart Kus <me at bartk.us> wrote:
>
> For lack of any other guidance, this sounds good to me. I'm
> definitely not a security professional though, so it could be
> awful. No idea how it'll work with phones in the field yet.
>
> I think we should tag both the public + mgmt networks, since an
> untagged network can always have tags inserted by users and gain
> access to the mgmt VLAN?
>
> I propose we use 10.44.0.0/16 <http://10.44.0.0/16> for the mgmt
> space, with a VLAN number of 1044. Each site can take a /24 from
> that /16.
>
> For sectors that carry public untagged, that must also for some
> reason carry mgmt, maybe they can macsec? I dunno if we can do
> that on RouterOS.
>
> Also no idea how the VRF and any route leaking are gonna work.
> They've been problematic on VyOS, and always tricky on RouterOS,
> but maybe that's just me holding them wrong.
>
> This may also be a good time to flip the cell sites to mostly
> bridge modems? Our R1 CPUs aren't very strong though, so that may
> be a blocker.
>
> I'm about to install a switch at SnoDEM that should definitely not
> be on the Internet, so I guess the mgmt VLAN will start there.
>
> --Bart
>
> On 2/15/2023 11:33 PM, Doug Kingston wrote:
>> I am guessing that we will want some form of overlay admin
>> network potentially using VLANS and VPN access of some form?
>> I have been working recently to get OpenVPN up and running with
>> various client platforms to Mikrotik routers with some success.
>>
>> -Doug-
>>
>> On Sun, Feb 12, 2023 at 4:03 PM Bart Kus <me at bartk.us> wrote:
>>
>> Hello,
>>
>> I'd like to kick off discussion about HamWAN security with a
>> relatively
>> high level problem statement.
>>
>> We need to limit access to our control infrastructure (routers,
>> switches, modems, hypervisors, iLOs, etc) while still
>> allowing easy
>> reliable access for amateur administrators to control that
>> infrastructure. We also need to support the case of a person
>> on a tower
>> with a cell phone being able to easily login it to a modem to
>> get
>> real-time signal readings for dish alignment.
>>
>> The current network is mostly a single flat OSPF routing
>> domain. We
>> have a couple peering points, and some IPsec tunnels. Our
>> routers are
>> mostly RouterOS flavor, which supports a pretty wide set of
>> capabilities. We may want to look at switching the edge
>> routers to VyOS
>> though.
>>
>> What general high level design would be useful in keeping
>> access easy,
>> while moving the control points out of public reach?
>>
>> --Bart
>>
>> _______________________________________________
>> SecOps mailing list
>> SecOps at hamwan.org
>> http://mail01.fmt.hamwan.net/mailman/listinfo/secops
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail01.fmt.hamwan.net/pipermail/secops/attachments/20230220/adbebb6f/attachment.html>
More information about the SecOps
mailing list