Security is a broad term and a broad subject.
Have to admit that I’ve become a little rusty, but I used to work in network security for an ISP and my first question with something like a base station would be, “Can I exploit any service on this device and use that as a bridgehead into the network?”
Anything that forwards any traffic into a network must be considered a potential security risk until proven otherwise. With regard to NTRIP, can traffic be spoofed and shaped, for example? A quick look online suggests it could be:
https://repository.tudelft.nl/islandora/object/uuid:78653abb-7d82-40e7-971d-3a726696b2e2/datastream/OBJ/download
This doesn’t represent an obvious risk to your network, but it does open possibilities for hijacking autonomous systems which is “interesting”.
One very obvious thing that needs stating is that anyone using remote SSH must change the default passwords immediately! If some idle script kiddie notices that port 2101 is open alongside port 22, then they could try logging into your base station pi with the default credentials and if they work, our “hacker” now has root access to a Linux box on your network. I cannot overstate just how bad that is
So best practice would probably be:
- Change all passwords before you connect anything to your network.
- Only port forward any services you actually need external access to. It’s probably best not to make the http front end publicly accessible, but rather use a VPN to connect to a client on the inside of your firewall and use a browser on that client to view the page locally.
Basically minimise the number of ports you forward on your firewall.
“For me the VPN isn’t so much about security or privacy as it is about making it easier to reach my base station.”
You don’t need a VPN to reach your base station over the internet. Maybe I’m misunderstanding something, but isn’t it just a case of forwarding port 2101 to your base station?
I do agree with you on RTK2go though. I’ve fought hard to get my BS registered with them so that I can share it with the locals, but now I am wondering whether this does compromise security. It’s far more secure to just keep it all private and give your WAN IP to people you know.
“Modern network design, for good or bad, means everything on our side of the router is unreachable from the internet”
Again, I may be misunderstanding you here, but pretty much any TCP/IP service can be shared over the internet via NAT / port forwarding. This is the whole point of NAT, with it, you can share tens of thousands of devices and services from a single public IP using IPv4.
IP6 means that every device can have its own unique IP, but with a bit of port forwarding on your firewall you can share whatever you want with over the internet with v4.
I do completely agree with you that VPNs are the way forward with AOG base station hosting, in fact VPNs will soon become ubiquitous. The very first thing I do every day for work is fire up my works laptop and connect to the VPN as this means that I am effectively (logically) sat at my desk in the company offices, securely connected to the company network whilst I am physically sat, unshaven, on my sofa in my underpants.
VPNs are what make secure home working possible.