element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • About Us
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Upcycle It
  • Challenges & Projects
  • Design Challenges
  • Upcycle It
  • More
  • Cancel
Upcycle It
Forum Security
  • Blog
  • Forum
  • Documents
  • Polls
  • Files
  • Events
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Actions
  • Share
  • More
  • Cancel
Forum Thread Details
  • State Suggested Answer
  • Replies 9 replies
  • Answers 6 answers
  • Subscribers 6 subscribers
  • Views 1786 views
  • Users 0 members are here
Related

Security

Workshopshed
Workshopshed over 8 years ago

Has anyone come across any interesting articles on securing the Edison?

  • Sign in to reply
  • Cancel

Top Replies

  • rsc
    rsc over 8 years ago +5
    I've got mine all locked up.
  • shabaz
    shabaz over 8 years ago in reply to Workshopshed +3
    Agree. The troublesome part of the solution is the human, compromising their computer by downloading cat videos etc : ) And then infecting all their machines!
  • Workshopshed
    Workshopshed over 8 years ago in reply to shabaz +3
    Or the director who walks through the front door with a virus on their laptop and connects up to the corporate network.
  • koudelad
    0 koudelad over 8 years ago

    I would say the rules will be pretty much the same as for any other GNU/Linux machine.

    Disabling unused services, user management, network security, physical security, ...

    Try googling for "linux security hardening".

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Reject Answer
    • Cancel
  • koudelad
    0 koudelad over 8 years ago in reply to koudelad

    I just remembered that a few years ago I followed these HOWTOs from the Linux Documentation Project.

    They seem to be quite old now, however, the principles remain the same.

     

    Security Quick-Start HOWTO for Linux

    Linux Security HOWTO

     

    I would also recommend buying a reliable and updatable router and choose wisely, what services (ports) to publish to the internet. Nothing provides 100 % network security, but almost all the consumer brands provide many vulnerabilities that are updated after a few months (happy scenario) or never (common scenario). The situation is the same as with cell phones - only the most expensive get support (until a new product is released).

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Reject Answer
    • Cancel
  • jasonwier92
    0 jasonwier92 over 8 years ago

    Agree on a good hardwall router/firewall, I like MikroTik, but they are not easy to setup if you are not used to them. Using IPTables on the Edison as a local firewall would be a good second layer of security (headache sometimes too). 

     

    If you are going to expose SSH, you need to block brute force attacks. SSHGuard is a good solution. It can watch your logs for SSH attacks and block the IP address.  Another good solution is to also run SSH on another port than the standard 22.  Like have it run on port 8002.  This can be done by editing the /etc/ssh/sshd_config file and set the port like: "Port 8002".  But if you do not need to expose SSH, that is best.

     

    If you are going to expose your web interface to the population of the earth and where ever else the Internet reaches, you could run HTTPS as it will not let people in the middle study your packets. 

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Reject Answer
    • Cancel
  • shabaz
    0 shabaz over 8 years ago in reply to jasonwier92

    Everything you've mentioned are good steps. Depending on the value of what needs to be protected overall (in the home or otherwise - not talking about just equipment value, but also information value) some additional steps may be needed. HTTPS doesn't prevent MITM, in fact many commercial products do just that, because they locally terminate and create a new session to the requested resource. This has some useful purposes (e.g. determining if the user is getting good performance from the network or not), but we can't assume that there are no people out there that will do this for bad purposes.

    Local firewalls are good, but at the end of the day home equipment has a tiny processor and could fall over if it was overwhelmed, so blocking all incoming ports on the external router or FW is a good idea if possible. We all thought SSH was fine but that heartbleed attack vulnerability was present for years : ( And it was easy, and extremely severe.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Verify Answer
    • Reject Answer
    • Cancel
  • koudelad
    0 koudelad over 8 years ago in reply to jasonwier92

    I also like Mikrotik devices. They now have a web interface called WebFig, which provides similar funcionality as Winbox, over web management interface. The first time setup is quite easy, as they embedded typical usage profiles, for example "Home AP". The truth is, there are still a few things to configure (disable services, remote access, set up NTP, ...). I installed three of the newer devices for home / office use and I am really happy about the way they work.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • Verify Answer
    • Reject Answer
    • Cancel
  • Workshopshed
    0 Workshopshed over 8 years ago in reply to shabaz

    One thing that a lot of people forget to do with HTTPS is validating the certificate that is sent to you. Browsers do that automatically but often you need to configure your API calls to do so. But if your machine is compromised then that man in the middle can be sitting on your machine reading everything.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • Verify Answer
    • Reject Answer
    • Cancel
  • rsc
    0 rsc over 8 years ago

    I've got mine all locked up.image

    • Cancel
    • Vote Up +5 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • shabaz
    0 shabaz over 8 years ago in reply to Workshopshed

    Agree. The troublesome part of the solution is the human, compromising their computer by downloading cat videos etc : )

    And then infecting all their machines!

    • Cancel
    • Vote Up +3 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
  • Workshopshed
    0 Workshopshed over 8 years ago in reply to shabaz

    Or the director who walks through the front door with a virus on their laptop and connects up to the corporate network.

    • Cancel
    • Vote Up +3 Vote Down
    • Sign in to reply
    • Verify Answer
    • Cancel
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube