KA1RBI
Member
The OP25 Group is aware of multiple hack attempts occurring on servers running OP25 on public facing IP addresses, typically on TCP port 8080.
The HTTP web server code in OP25 has not undergone any security-hardening or vulnerability review and is not intended for public web-facing applications, as noted (several times) in the various OP25 README files; for example:
Also it should be noted that just because the server may not be "advertised" has no bearing on this. Hackers have methods of locating such open ports with ease.
Users are strongly cautioned to apply external security measures (firewalling, etc). for these servers. The OP25 Group cannot be responsible for any damage or loss of data caused by failure to adhere to these warnings...
Max
The HTTP web server code in OP25 has not undergone any security-hardening or vulnerability review and is not intended for public web-facing applications, as noted (several times) in the various OP25 README files; for example:
*WARNING*: there is no security or encryption. Be careful when using "0.0.0.0"
as the listening address since anyone with access to the network can connect.
Also it should be noted that just because the server may not be "advertised" has no bearing on this. Hackers have methods of locating such open ports with ease.
Users are strongly cautioned to apply external security measures (firewalling, etc). for these servers. The OP25 Group cannot be responsible for any damage or loss of data caused by failure to adhere to these warnings...
Max