Hardening the installation to share it safely #269
-
I see encouragements and instructions to share the installation on the Internet. I want to do that and I have tested that I can get it working using no-ip.com, and I can. But before leaving these little servers on the Internet we should harden them against intrusion and takeover, and I don't see any advice on that beyond changing the default pi password. It may not be too big a problem if a hacker damages the Birdnetpi installation and deletes data. But if they take it over and add it to a botnet and use it for DDoS attacks or configure it as a spamming mailserver then that is a problem! We also don't want them to be able to acquire a base within our networks from which to explore and attack other machines on our network. Google found me this which is a reasonably good starting point: https://chrisapproved.com/blog/raspberry-pi-hardening.html A lot of it is applicable but it is not fully appropriate for Birdnetpi. Like other similar tutorials it tells you inactivate or delete the pi user, which you can't do if Birdnetpi has been installed as the pi user. It also advises on hardening nginx, but Birdnetpi uses Caddy instead of nginx. So there is scope for an FAQ or similar on hardening a Birdnetpi installation before sharing it on the Internet. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 4 replies
-
Hello @srchild A few notes on BirdNET-Pi security, especially in regards to the link for "Raspberry Pi Hardening"
I will try to add more thoughts as they come up. My best regards, |
Beta Was this translation helpful? Give feedback.
Hello @srchild
A few notes on BirdNET-Pi security, especially in regards to the link for "Raspberry Pi Hardening"
pi
username here instead of merely suggesting it.With that said, currently it is super easy to determine the user by simply looking at the file path on the "Currently Analyzing" image on the "Overview" page, among other places that would indicate the user.