Ohio Section Journal – The Technical Coordinator – March 2016 edition

One of the responsibilities of the Technical Coordinator in the Ohio Section is to submit something for the Section Journal. The Section Journal covers Amateur Radio related things happening in and around the ARRL Ohio Section. It is published by the Section Manager Scott – N8SY and articles are submitted by cabinet members.

Once my article is published in the Journal, I will also make it available on my site with a link to the published edition.

You can receive the Journal and other Ohio Section news by joining the mailing list Scott has setup. You do not need to be a member of the ARRL, Ohio Section, or even a ham to join the mailing list. Please sign up!

If you are an ARRL member and reside in the Ohio Section, update your mailing preferences to receive Ohio Section news in your inbox. Those residing outside the section will need to use the mailing list link above.
Updating your ARRL profile will deliver news from the section where you reside (if the leadership chooses to use this method).
Go to www.arrl.org and logon.
Click Edit your Profile.
You will be taken to the Edit Your Profile page. On the first tab Edit Info, verify your Email address is correct.
Click the Edit Email Subscriptions tab.
Check the News and information from your Division Director and Section Manager box.
Click Save.

Now without further ado…


Read the full edition at: http://n8sy2.blogspot.com/2016/03/march-edition-of-ohio-section-journal.html

THE TECHNICAL COORDINATOR
Jeff Kopcak – TC
k8jtk@arrl.net

DSCF5081 K8JTKHey Gang,

It’s been a busy month for yours truly. Things got started off with a drive down to Columbus with my dad N8ETP. We visited the Columbus Radio Enthusiasts Society (CRES) on February 16th. It was touch-and-go for a while due to the weather. Snow hit both areas the night before and hoped it would hold off for the meeting. It did. We made it there and back, no problem. It was our first meeting in Columbus and we couldn’t have had a better time. I was contacted by Steve – N8WL to troubleshoot an RFI issue he was experiencing. CRES_N8ETPWe got to talking and he invited me to come down and speak about, well, myself –what the Technical Coordinator does and projects I’ve worked on. The presentation consisted of: my history in Ham Radio and how I got to where I am, laid out the ARRL and Field Services structures, section level positions and the Ohio Section, my responsibilities as Technical Coordinator, and projects I’ve worked on. In addition gave some pointers for troubleshooting RFI problems. Our Section Manager was on hand and helped answer specific questions about the section. It was an informative meeting. CRES: http://www.w8zpf.net/, presentation: http://www.k8jtk.org/2016/02/16/about-the-arrl-ohio-section-technical-coordinator/

The following weekend I presented at the Mansfield Hamfest during the Digital Forum. Danny – W8DLB, who is in charge of the Hamfest, was at my NBEMS training session in Medina County and asked me to present it during the Digital Forum. The Digital Forum covered voice and text based digital modes. Duane -K8MDA demonstrated FreeDV. FreeDV is a mode used on HF for voice communication. It’s impressive because the bandwidth is about one-third of sideband! I gave a portion of my training session on Narrow Band Emergency Messaging using Fldigi.

K1NAt the LEARA meeting in Cleveland, I showed the video for the Navassa Island K1N DXpedition which happened in February of last year. A DXpedition is an expedition to a remote location, usually uninhabited, for the purposes of activating the location and making as many contacts as possible. Navassa was my first time trying to chase a “most wanted” entity for my log. I was able to log them twice. Bob Allphin – K4UEE has participated in many DXpeditions and has released the story of many on DVD. I had no idea what it took to put on a DXpedition of that magnitude. After seeing his DVD on Navassa, I now have a better idea. It is a phenomenal video that got rave reviews and comments at the meeting. The main video runs about 45 minutes. The wrap-up from the Dayton forum is included which has some great background details. These are great for club meetings, introducing newcomers to Ham Radio, and gifts. Purchasing the video helps supports future DXpeditions and supports other hams: http://t-rexsoftware.com/k4uee/dvds.htm

Last, and certainly not least, Ken – KG8DN instructor at Gilmour Academy in Gates Mills, Ohio has been in charge of the Gilmour Academy Radio Club – ND8GA for as long as I’ve known him. During the school year, organizations are in charge of running Convocation for a week. This is a gathering of the entire school for announcements, happenings, events, and entertainment. Ken asked me to speak at Convocation one morning. This was a different type of presentation than I was expecting. I figured I would be there to talk-up Ham Radio and get kids interested. Nope. It was more about life experiences with a little Ham Radio sprinkled in. Things students could relate to. I have to be honest this was more challenging than I anticipated. A lot of time was spent searching for topics that students would care about, relate to, and how those experiences got me to where I am now. There was a visual portion which included many pictures from my high school years. When looking back on friends and people I shared those experiences with, it make me wish I was back in that time. I’m sure I’ll feel the same way when I look back on today. The presentation turned out great and I have to thank Ken for all of his help. ND8GA: https://sites.google.com/a/gilmour.org/gilmour-amateur-radio-club/

Thank you to everyone for coming to my various appearances and the organizers for asking me to speak with your organizations.

ham_radio_for_makers_2_KB1WNRham_radio_for_makers_1_KB1WNRI received an email from a fellow Trustee of LEARA, Marv – W8AZO, asking if I had seen my name mentioned in a post on a website. I had not. What website did he find my name on? The IEEE website. Now, I know the fine folks over at IEEE (Institute of Electrical and Electronics Engineers) are wicked smart. Much smarter than I am. They come up with solutions to technical problems which usually turn into established standards. Additionally, they publish one-third of the world’s technical literature. Why the heck would they be talking about me? Stephen Cass – KB1WNR, Senior Editor for the IEEE Spectrum magazine wrote an article titled “Hands on: A Ham Radio for Makers.” He built an FM transceiver using an RS-UV3 transceiver board and Raspberry Pi to take advantage of digital modes. I was mentioned because Stephen used the instructions I posted to compile and run Fldigi on the Raspberry Pi. Super cool! ham_radio_for_makers_3_KB1WNRI emailed Stephen and thanked him for the plug. He was very appreciative of the well written instructions. His article may have glossed over some important points relevant to hams but the goal of the article was to draw others in from the wider community. The article will be in the March printed edition of IEEE Spectrum and should be available by the time you read this. It hasn’t hit the shelves in my local bookstore yet. Online version: http://spectrum.ieee.org/geek-life/hands-on/hands-on-a-ham-radio-for-makers

That is what ham radio and makers are all about. I wanted to figure out how to run Fldigi on the Raspberry Pi, came up with a way to do it, documented it thoroughly, and shared it online. Stephen came across my instructions and used them as part of his project to create something greater; perpetuating the cycle.

Thanks for reading and 73… de Jeff

Bridge a Remote Site Network with OpenVPN Access Server

Having access to your devices over the Internet is a requirement for any admin deploying a project. Instead of running to a remote site to administer devices (making changes, applying updates and patches), it’s easier to connect remotely and make changes. Remote access poses many issues and concerns.

Security

First and foremost is security. You always, always, ALWAYS want devices connected to the Internet behind a router with a built-in firewall (NAT router). A firewall filters traffic between two networks (your ISP and home for example) and will block attempts to connect to your internal (private) network.

Device manufacturers take security for granted. Little testing and auditing takes place because the analysis is expensive for throw-away devices. This is noted in many stories including Bug Exposes IP Cameras, Baby Monitors where simply clicking “OK” on the login dialog allowed access to the Internet connected video camera. It is trivial to find these devices on the Internet because of Shodan. Shodan is dubbed the “Internet of Things Search Engine.” If you’re not familiar, think of it as the Google for devices connected directly to the internet. These could be: web servers, printers, cameras, industrial machines, bitcoin mining… Putting devices behind a firewall minimizes the risk because anything trying to peer into the network would be blocked by the firewall.

This holds true for networks you don’t control (granted access on someone else’s network). Put your stuff behind a router/firewall so they can’t see your devices and you can’t be exploited by devices on the other network.

Port Forwarding is a popular technique to only allow traffic on a specific port to a device you specify in your firewall (router). This provides little security as it still allows a potentially vulnerable service to accept incoming connections from the Internet.

Choose a good router

Couple of tips for a good router:

  • You get what you pay for. Don’t opt for cheap.
  • Opt for ones that support third-party firmware like DD-WRT and Tomato or setup a dedicated computer running pfsense or Untangle. These have proven to be more secure than stock firmware in addition to offering a more complete feature set.
  • Stick with popular models as found on Amazon, Newegg, or other tech store. They’re more likely to be reliable, well updated models.
  • Look for ones that accept USB cellular modem dongles for installations that have no accessible network connection like a remote site.

Virtual Private Network

The preferred way to connect to a remote network is to use a VPN. A VPN connects to a private network securely over the Internet. It allows the user to exchange data, use services, and connect to devices as if they were directly connected to that network. An open-source project that implements VPN technologies security is OpenVPN. OpenVPN is an application that allows for secure point-to-point communication. There are many implementations of OpenVPN including using it in many third-party router firmware (mentioned above). OpenVPN Access Server is one of the many implementations and the one used for this project.

This project was inspired by Hak5 1921 – Access Internal Networks with Reverse VPN Connections. As an Amateur Radio operator into the newer computer and digital technologies, more devices are located at remote sites.

This setup consists of:

  1. A remote network behind a firewall where devices exist you want to access. This will be a Linux server on the remote network that will act as the gateway and persistently connected to the bridge. This could be a full desktop computer purposed for something else or Raspberry Pi. Also on the same network will be a Windows machine.
  2. An unsecure/unknown network, AKA the Internet.
  3. A private server that will act as the bridge between the remote network and a device you choose.
  4. A device in a separate location that will connect to the cloud server and will be able to access the remote network. I will use a Windows machine to act as a ‘home’ computer.

This setup works in nearly all cases because the only device receiving incoming connections is the bridge server in the cloud. Firewalls block incoming connections by default. Very few block connections originating inside the network out to the Internet (egress). If a device along the way filters by content, connection attempts will be blocked. Many corporate networks are doing this kind of filtering. Otherwise the traffic looks the same as secure web traffic on port 443. No port forwarding is used.

Hosting

I recommend using an infrastructure hosting provider for the bridge server. This can cost anywhere from $5-$15 per month. The device can be anywhere on the public Internet. It must accept multiple connections on different ports but only by a couple users at a time are needed. Minimal configuration is more than sufficient. Bandwidth, latency, and up-time of all points in this setup effect reliability. My personal recommendations for infrastructure hosting providers are: Rackspace and DigitalOcean.

IP addressing

All remote networks and the home user networks cannot overlap in address space. That is they need to be differently numbered. For example, typically home networks have addressing as 192.168.1.x. The remote site(s) can’t have the same numbering (192.168.1.x). It must be different. I suggest making the remote site different enough to not cause conflict with any home users’ networks. Remote sites as 192.168.25.x, 192.168.26.x, and 192.168.27.x would work fine when the home users’ networks is addressed 192.168.0.x, 192.168.1.x, 192.168.2.x, and so on (except 25-27). Similarly addressed networks create routing conflicts and the packets will not reach the correct network.

Downsides

Cost.

In addition to hosting, a downside to using OpenVPN Access Server is licensing. While OpenVPN is Open-Source Software and OpenVPN Access Server is free, the license allows for only two concurrent tunnel connections at any one time. This means the remote site counts as one connection and the home device the second. If a second person (third device) needed access to the remote network, they would get a message saying ‘Access Server has reached its concurrent connections limit.’ The first person would need to disconnect first before the second could connect otherwise current connections will begin to be booted. Additionally, connecting two or more remote sites and a home user is not possible without purchasing licenses or running an additional bridge server. Additional licenses can be purchased for “$9.60 License Fee Per Client Connection Per Year. Support & Updates included. 10 Client minimum purchase.” $96 per year.

An alternative to OpenVPN Access Server is to setup your own (roll your own) OpenVPN server which is free. I hope to do an OVPN server setup at some point in the future.

Assumptions

This guide is step-by-step in nature, meant for beginners, with brief explanations of the steps. It will help to have an understanding of Linux commands and scripting. Capitalization is important in Linux! Understanding of basic networking concepts including determining network prefixes and CIDR notation is also required.

Program versions

I used a Windows 7 64 bit PC for configuration (and Home PC). Applications and versions used in this writeup:

  • OpenVPN Access Server 2.0.24
  • Putty 0.67
  • Ubuntu 14.04 x64 (bridge and remote servers)
  • Filezilla 3.16.0