-
-
Notifications
You must be signed in to change notification settings - Fork 47
[BETA] More secure WiFi configuration #311
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
Hi @jscheidtmann Thank you for working on this! I think the overall plan is well thought out, but the final TODO about suggesting ethernet is not going to work as most PiFinders don't have the ethernet port exposed and many people don't have the cabling anyway. It's very true that ethernet would ultimately be more secure, but I don't think setting up wifi over a non-encrypted HTTP connection is much of a concern as it's not traversing the internet. To be intercepted, someone would need to be local to the person and sniffing traffic on the wifi network generated by the PiFinder. While such an attack is possible, being in the right place at the right time to pull this off would be exceedingly difficult and the payoff would be pretty minor. |
|
A really interesting option here would be to display a QR code with the PiFinder WiFi SSID/Password on the screen. Correctly typing a 20 char random password might be frustrating on a phone or tablet during initial set up. Here's an example using a QR code generator: |
|
hi @jscheidtmann I'm having doubts on the general approach here.
maybe @brickbots has some input here as well |
|
First note: The code only triggers, when "CHANGEME" is present in the SSID. We could make it triggering on "PiFinder-default-CHANGEME" only or some such. Brickbots wrote:
I know, I was suggesting to use ethernet during the build process to define e.g. client WiFi entries and avoid entering home wifi password over an twice unencrypted link (open wifi & http).
The http and not httpS is not a problem, as long as the WiFi itself is encrypted, which by default it is not. I am more concerned about entering the home WiFi password over an entirely unencrypted link. As we are addressing a pretty nerdy group of DIYs, that means they are usually also quite security concious, and this is especially so in Germany. I usually have no problem to use the Pi unencrypted, although people could make fun of you on a star party (I know some of those guys, who would). MRossel worte:
Good. That's in especially for star parties.
No, this long string is the WiFi password, which will be stored by your phone / tablet. The password that needs to be entered in the web is pifinder's (the unix user). This behavior is not changed.
|
|
Regarding the UI not coming up: |
|
Tested the functionality of this on a real PiFinder:
|
|
This PR closes #179 |
|
Note: It might be the case, that you can see a "PiFinder-CHANGEME(-ENCRYPTME)" in the WiFis of your phone or tablet. |
|
Functionality tested successfully. Please review |


PR for working on #179.
ends withcontains CHANGEME, change the SSID to "PiFinder-XYZAB", where XYZAB is a random string drawn from the character set 0-9a-zA-Z. also restart hostapd if in AP mode.If SSID was changed and no password is present, add WPA2 encryption to hostapd.conf, generate a 20 character random password (in that case also restart hostapd)Add entry "WiFi password" to menu system (near WiFi mode) to display the password in clear text on the PiFinder display, (if one is present in hostapd.conf).selectionentry box to AP web configuration