I recently acquired a 2007 Coachman Freelander Motorhome and wanted to put a AREDN node on it that could connect to anyone in the US. What equipment would be recommended. I've watched the ARDEN in the Park video and was thinking of a similar setup, just mobile. As for mounting the node on the antenna of the RV, this one came with an Omni TV Antenna so there is no mast that I have to raise to get a signal. So no where to mount the AREDN Node, except maybe on the ladder in the back.
Also on a very important side note, why does this site not go to HTTPS mode when signing in the users? My password Vault warned me that it wasn't in secure mode when filling in my secure credentials.
As for getting to this site from the AREDN mesh network. I didn't know you could get to the Internet from AREDN. Since that is possible, then I would still want the login process encrypted as passwords should never be in the clear text. It could be setup where the authentication process went to tls mode but the content on the site wasn't. Or you could make the front end of the site have a redirector that looks where you are coming from and takes you to the secure version when you are coming from the internet but unsecured if from AREDN, except for the login process.
Thanks,
Ben (K6BKD)
2) SSL/TLS: great question. I agree and will check with the team on this.
Thanks,
K5DLQ - Darryl
As a security guy I'm very pro TLS and say no site should ever be unencrypted.
As a ham, there is some argument to leaving the site unencrypted (especially since it's got useful info for mesh) incase someone needs to get on over the mesh.
Going encryption only on AREDN would be much how Google is no longer useable by HAM's on the mesh since you can no longer disable encryption. A real shame considering how useful Google is.
neophyte re: current Internet security issues. I've been reading USC Title 47, Part 97 at very random intervals along with the occasional FCC Responses to Proposed Rule Makings that reference 'encryption'. Recent close readings of Part 97 coupled with various FCC responses, primarily the denials, to Proposed rule makings trying to change Part 97 to allow encryption makes it clear that Amateurs have always been encouraged by the FCC to make use of available published algorithms to ensure reliability, non-repudiation and security for Public Service and Public Safety traffic we convey between Served Agency sites as well as what we originate as tasked to by Served Agencies, over Amateur Freqs. What Part 97 does forbid, along with the pecuniary and conduct prohibitions, is for us to 'encode' traffic that we originate in order to obfuscate the message (communication) or it's points of origin & delivery. I don't think the words 'encryption' or 'encrypt' are ever used in Part 97. Every time someone files a Proposed Rule Making that Amateurs be allowed to "encrypt" data on Amateur frequencies, the denial of that proposal includes the language "... because it is not necessary". It is my belief that the FCC really doesn't care what traffic goes through AREDN on Amateur freqs so long as the source (node), destination (node) and callsign of the responsible Amateur is readily discernable for every packet, in English, during every RF hop on Amateur freqs? Nothing in Part 97 that I can find requires the contents of a digital multimedia packet payload to be readily discernable by anybody. It is however our responsibility to ensure it does not contain otherwise proscribed communications. The longstanding belief that Part 97 forbids "encryption" on Amateur Freqs has to be viewed in the context of; "can the FCC (or anyone else who cares, using appropriate equipment and publicly available software) discern where (which AREDN node) any given tcp or udp packet originated, which AREDN node it is going to on this hop and under whose license authority it is being transmitted?" What Part 97 tells us not to do is muck about with the payloads of packets we move. One of the reasons I believe AREDN technology has so much appeal to Emergency Managers is that data streams originating at one location will reliably arrive where they are sent to unchanged. This is a sincere request for you to explain how, where and why AREDN traffic will be violating Part 97 transporting packets between an Amateur or a Served Agency Employee (including duly authorized Volunteers) and a public Internet web site (like Google) that is using published security algorithms and RFC defined protocols to protect communications with clients? I agree that every Amateur has to make their own decisions about this issue. It helps me to read Part 97 at least yearly - what I think it means definitely changes with every reading. Thank you again Conrad for your ongoing contributions to AREDN. 73, ...dan wl7coo
Then, I'd probably put up another NanoStation with AirOS in bridge client AP mode to connect into the campground's wifi and connect it on the WAN port of the AirRouter. These antennas would be right next to the HF Antenna, DirectTV, 2m/70cm, and other antennas... :)
Joe AE6XE
we we should all have a picture of your RV roof...
Keith
I have a NanoStation permanently mounted to the forward looking bar of my luggage rack. Normally, the NanoStation has about a 60 degree beamwidth in the horizontal direction and single digits in the vertical direction. However, since mine is mounted horizontally, that single digit vertical is now single digit in the horizontal direction. This results in the node needing very precise aiming at whatever other node it is trying to reach. So, if you can, mount the NanoStation vertically if at all possible.
For a picture of the node, go to my Bug Report:
http://www.aredn.org/content/bug-report
73, Mark
97.113 Prohibited transmissions.
(a) No amateur station shall transmit:
(4) ... messages encoded for the purpose of obscuring their meaning...
We also need to watch the restrictions placed on us by 97.115 concerning third party communications.
http://www.arrl.org/part-97-text
I would expect it to be easier to just keep power levels to part 15 limits, and then do whatever you want with regard to encryption and third party traffic.
Dan Meyer / n0kfb
If I am on the mesh and navigate to WebEOC (which forces the use of encryption), my "Part 97" purpose in using a TLS (encrypted) connection is NOT to obscure, but, to use a valuable service that is only available over a TLS connection.
Therefore my intent is to access a service, not to obscure the meaning.
My $0.02 worth
I don't mean to put words in WebEOC mouth, but I can tell you when I use HTTPS on a server my purpose is to "obscure and secure the communications channel from eavesdroppers"
To my knowledge nothing stops someone from having a gateway server to decrypt WebEOC at the PoP(Point of Prescence) and then push it to the mesh decrypted.
One could consider making the argument that the primary "purpose" of https in these cases is to "ensure the integrity/authenticity of the data"
Ferinstance, if I ask another ham on VHF for a pre-arranged "code word" to authenticate that he is who he says he is, would that violate part 97?
Just some thoughts. I suppose until someone gets a positive response from the FCC its all academic.
The Petition RM-11699 you reference and the FCC's Order Denying it, DA 13-1918 do focus clearly on the issue of Amateurs 'encrypting' traffic and thereby possibly eroding (according to the ARRL) the 'self policing' capability and nature of Amateur Communications. At the same time it deftly avoids saying we can or can not handle traffic originating from and delivered to Served Governmental Agencies within the United States.
I agree with you that denying or limiting the security of Internet interactive Amateur Communications today is a certain invitation for dysfunction and warrants a much closer focus than it has received so far , by *all* involved Agencies.
See DA 13-1918 III. Discussion, 6. and footnote 21 related thereto.
This kind of language is reminiscent of the position I attempted to describe in my previous message in this thread.
Might there be a 'presumptive conclusion' by the FCC that handling Emergency and Public Service Traffic originated (and as appropriate, encrypted) by a Served Governmental Agency in the U.S. which is delivered by Amateurs to the same said agency in the U.S. is not perceived by the FCC as violating Part 97?
This has been an ongoing discussion all along so establishing a separate thread seems appropriate .
Eventually somebody in the FCC will more clearly address the issue.
That is, if DHS or FEMA hasn't already broached the subject with them and the FCC's silence has meaning in and of itself.
The extent to which the FCC has relied, almost exclusively, on ARRL for legislative input regarding Amateur Broadband Multi Media Communications has been an open question for more than a decade. Involvement by Served Agency's, at all levels of Government, might be forthcoming, if solicited by the FCC, and might make a difference now.
Sort of does make one 'WannaCry'.... not to mention giving pause to wonder if a really good Janit0r or 'Chemotherapy' might help speed up the process?
AREDN technology is vastly superior to all 3 of those non solutions and will have a much larger and longer lasting impact on Amateur Radio.
73
...dan wl7coo
I'd like to see a thread continued on this topic. Since the FCC relies on ARRL input, we need a focused effort to educate our Section and Division leaders on AREDN, the usefulness of secure protocols, and the fact that the source and destination call-signs are available. EmComm is in a new era, and we need to get caught up. AREDN is the arguably the first hot technological advance Amateur Radio has seen since SDR a decade ago. Building on the work of giants.
With the articles in June QST and March CQ, plus presentations at all major Hamfests, including the classes at Dayton, this is the year of AREDN. I'll be making the case to Arizona Section Manager Rick K7RAP in a couple of weeks. If anyone has an "ammo" document, I'd love to present it. Else I'll take what I've gleaned here.
Charlie KØTAN
ckotan at gmail
Andre, K6AH
If you have to access sites that force https and you are that kind of person concerned about all that.. an option would be to access those sites using a proxy. You'd connect over RF to the http side of the proxy, it connects over non RF using https to google or any other https forcing site.
Key words:
Transparent squid proxy.... https to http proxy
Ben, I will clue you in as to what works for me on the back of our 40' three-axle toyhauler. I installed a receiver hitch on the back, if it is a motorhome, you may already have one. I bought a receiver flag holder that will take up to a 2-1/2" flag pole. I mount my antenna on a 4' military pole, raise it and add another, and do that until I have 20' of sections, set it in the mount and tighten the two bolts, rotate if needed. Works perfect every time! I usually run a dual bander on top, and a cell phone repeater yagi under that. Starting in the spring, I will be adding AREDN.