<div dir="ltr"><div class="gmail_default" style="font-family:tahoma,sans-serif;font-size:small">Brian,<br><br></div><div class="gmail_default" style="font-family:tahoma,sans-serif;font-size:small"> Is your Allstar server behind a router or directly on the Internet? Any server that is directly on the Internet and does not have any forward firewall protection should have the firewall in the hamvoip code turned on (enabled) This can be done in the /usr/local/etc/allstar.env file by setting the firewall to "enabled" and rebooting. When enabled the necessary Allstar ports are allowed but everything else is blocked. Adjustments to rules (if you know what you are doing!) can be made in the rules in the /etc/openvpn/firewall file.<br><br></div><div class="gmail_default" style="font-family:tahoma,sans-serif;font-size:small">The majority of Allstar users are nat'ed behind a router and should not need to use the built-in firewall. By default it is disabled.<br></div><div class="gmail_default" style="font-family:tahoma,sans-serif;font-size:small"><div dir="ltr"><div class="gmail_default" style="font-family:tahoma,sans-serif;font-size:small"><br clear="all"></div><div><div class="m_-2253482306991005635gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div><b><font size="4">73 Doug<br></font></b></div><b><font size="4">WA3DSP<br></font></b></div><b><font size="4"><a href="http://www.crompton.com/hamradio" target="_blank">http://www.crompton.com/<wbr>hamradio</a><br></font></b></div></div></div>
</div>
<br><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Tue, Jan 30, 2018 at 11:30 AM, "Brian Marshall via arm-allstar" <span dir="ltr"><<a href="mailto:arm-allstar@hamvoip.org" target="_blank">arm-allstar@hamvoip.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Hi All,<div><br></div><div>Are any of you aware of active exploits in the wild for these nodes? Our node got compromised last night and started saturating a 1Gig link. I was working at the time so I was not able to investigate, I had to shut it down. I will throw a packet sniffer on it tonight and see what it's trying to get too. Just thought I'd give a shout out to the thread to see if anyone else is being targeted or is aware of exploits for hamvoip, echolink or allstar.</div><div><br></div><div>Thanks in advance for any help you can offer.<span class="HOEnZb"><font color="#888888"><br clear="all"><div><br></div>-- <br><div class="m_-8486085710973629916gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div></div>Brian Marshall<br>KE0LTD<br><span><a href="https://pgp.mit.edu/pks/lookup?op=get&search=0x100AB721E04E2412" target="_blank">@pgp.mit.edu</a></span><br><a href="https://www.linkedin.com/in/bmarshallbri" target="_blank">https://www.linkedin.com/in/<wbr>bmarshallbri</a><br></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</font></span></div></div>
<br>______________________________<wbr>_________________<br>
<br>
arm-allstar mailing list<br>
<a href="mailto:arm-allstar@hamvoip.org">arm-allstar@hamvoip.org</a><br>
<a href="http://lists.hamvoip.org/cgi-bin/mailman/listinfo/arm-allstar" rel="noreferrer" target="_blank">http://lists.hamvoip.org/cgi-<wbr>bin/mailman/listinfo/arm-<wbr>allstar</a><br>
<br>
Visit the BBB and RPi2/3 web page - <a href="http://hamvoip.org" rel="noreferrer" target="_blank">http://hamvoip.org</a><br></blockquote></div><br></div>