Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

not able to access admin dashboard over public network #131

Open
paidforby opened this issue Apr 18, 2018 · 8 comments
Open

not able to access admin dashboard over public network #131

paidforby opened this issue Apr 18, 2018 · 8 comments

Comments

@paidforby
Copy link

After zeroconfiguration is complete and the node restarted, you are still unable to access the admin dashboard, https://github.com/sudomesh/peoplesopen-dash, with the default admin password. This problem is also seen when attempting access the admin dash prior to running makenode (on the standard branch of the firmware). Not sure if the problem is with the firmware or the dashboard. The following question come to mind. How does makenode set the admin password? How does the dashboard authenticate this password?

@paidforby
Copy link
Author

nevermind, just checked, it is working just fine over the private network. However, it is not accessible over the public network. I believed this is the case in both standard and zeroconf. Can we/should we make the admin dash accessible over the public SSID?

@paidforby paidforby changed the title zeroconf branch: not able to access admin dashboard without running makenode not able to access admin dashboard over public network Apr 18, 2018
@paidforby
Copy link
Author

I guess the main complaint is that is could get confusing if you type in the wrong IP address while on the public network. And of course, it may be an unnecessary security concern, especially if we add more features to the dash? I'll mark as an enhancement and leave it out of zeroconf for now, but would like to revisit it once we are working on improvements to the dashboard again.

@paidforby
Copy link
Author

also note for later, may also need to modify this file https://github.com/sudomesh/peoplesopen-dash/blob/master/src/config.js for the log in to work over the public network

@bennlich
Copy link
Collaborator

I think it makes sense not to allow access to the admin dashboard from the public SSID. It would be pretty easy to brute-force login if you could. Are there any use cases where this would be a useful feature (i.e. where the private network doesn't suffice)?

Could be cool to show some other info page though if someone on the public network points their browser to the default gateway address.

@paidforby
Copy link
Author

My theory is this:
Why even have a private network? It's sole use is to access the admin dashboard. It only causes confusion to node owners who don't realize you can't mesh over it. For all intents and purposes, it is impossible to run WPA2 on ad-hoc interfaces, meaning no private meshing anytime soon, see sudomesh/bugs#13.
Why would we even want private meshing? It runs counter to the values of the project and only gives node owners a false sense of security.
Finally, now with zeroconf extant, the private network one of few difference left between home nodes and extender node, see sudomesh/bugs#29. So why not just forget about the difference, extender nodes are just as much routers and home nodes, let's zeroconf them also.

Note: these are my opinions, I'd love to hear counter arguments.

@jhpoelen
Copy link
Contributor

+1 for dropping private network .

@bennlich
Copy link
Collaborator

Ahhh, interesting. Had not considered that option. So this would mean all node administration would occur through either a predetermined ethernet port, or through the public SSID. Is that right?

I guess you'd still have a WAN interface for digging tunnels, it just wouldn't be accessible from any of the node's wireless networks.

@paidforby
Copy link
Author

@bennlich yes, at first, we may want to make the admin dash accessible only through a specific ethernet port (I'd suggest port 3 on N600s). Then, later we can add access through the public network once we are more confident about the security and maybe have a more personalized log in screen (maybe a picture or name, so you can tell it's your node).

One valid argument I've heard in favor of keeping the private network is for IoT devices (e.g. Sir Alexas, and Madame Hue Bulbs) that you mostly likely don't want accessible via the mesh. My take on this, and private networks in general, is that peoplesopen nodes are intended to provide open access points that mesh physically or virtually, not personalized private networks for your home. If this is your use case and you don't already have a private home WiFi network, you can get any-old-off-the-shelf router and change the default network settings to set up a private WLAN. Additionally, if a new node owner needs help with this sort of set up during your peoplesopen node installation, they can ask a node whisperer or a PONI they'd (probably) be happy to help.

Oh, also if anyone needs "any-old-off-the-shelf router", we have a pile of Linksys WRT54Gs collecting dust.

I can also see dropping the private network as a motivating factor to make sure everyday use cases, like IoT stuff, Netflox, Hulus, etc., function properly over the public network.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants