Thanks: 0
Ergebnis 1 bis 7 von 7
-
24.08.2018, 21:44 #1
- Registriert seit
- 06.07.2013
- Beiträge
- 24
- Thanks (gegeben)
- 0
- Thanks (bekommen)
- 4
- Total Downloaded
- 2,73 MB
- Total Downloaded
- 2,73 MB
What is the kill command for the OpenWebif
Anybody knows what the kill command is for Openwebif?
I want to kill the webinterface via a cronjobVU+duo4k openATV 6.4 sat+cable | Vu+duo2 openATV 6.4 1TB HDD sat+cable
Zgemma-star H9.2S SE openATV 6.4 sat+cable + android sat+cable
Zgemma-star H9.2H SE openATV 6.4 sat+cable +android sat+cable
Wavefrontier T90. Titanium TQS Universal quad LNB's
-
Advertising
-
25.08.2018, 00:00 #2
- Registriert seit
- 02.01.2017
- Ort
- Slovakia
- Beiträge
- 1.460
- Thanks (gegeben)
- 91
- Thanks (bekommen)
- 418
- Total Downloaded
- 323,0 KB
- Total Downloaded
- 323,0 KB
Box 1:Vu+ Zero 4KBox 2:Vu+ Solo SE V2Box 3:Formuer F4-TURBOWhat do you mean by the kill ? Kill the process or disable user-login in OpenWebif ? Why you need to do ?
Why not set a password to access the OpenWebif interface ?
Why do not you just open OpenWebif over OpenATV MENU to disable it ? Press the MENU button on your remote control and then navigate to :
Settings > System > Network > OpenWebif > Enabled : Yes / No
OpenWebif is part of the Enigma2 (such as the plugin). Disabling or enabling the enigma2 plugins via the linux-shell (or via the crontab) is too complicated.
It might be possible to block / allow the port directly via linux-shell (or crontab) on which OpenWebif runs (default http port = 80). But I do not know if it would work with this method. For example, with the iptables (tools for managing kernel packet filtering capabilities). Must be installed in OpenATV from feed server: opkg update && opkg install iptables
Man page of IPTABLES
linux - Script to Block and Unblock a Port - Stack OverflowGeändert von s3n0 (25.08.2018 um 00:59 Uhr)
-
25.08.2018, 08:05 #3
- Registriert seit
- 06.07.2013
- Beiträge
- 24
- Thanks (gegeben)
- 0
- Thanks (bekommen)
- 4
- Total Downloaded
- 2,73 MB
- Total Downloaded
- 2,73 MB
ThemenstarterI would like to disable it, so thats never can be started, only when it's necessary.
A friend of mine has some unwanted activity on his receiver, and no, the web interface is not shared on the www.
Maybe he has some problems with phishing mail and that some people are sniffing around on his network, i don't know.
I have already blocked ftp, ssh and telnet acces via cron.
And the web interface is the only connecton possible that i kknow.
But if it's not possible what i ask, , then the simplest way is to disable it ore delete it.
Not everybody is using the web interce, he isn't anyway.VU+duo4k openATV 6.4 sat+cable | Vu+duo2 openATV 6.4 1TB HDD sat+cable
Zgemma-star H9.2S SE openATV 6.4 sat+cable + android sat+cable
Zgemma-star H9.2H SE openATV 6.4 sat+cable +android sat+cable
Wavefrontier T90. Titanium TQS Universal quad LNB's
-
25.08.2018, 08:32 #4
- Registriert seit
- 24.06.2013
- Ort
- Österreich
- Beiträge
- 5.023
- Thanks (gegeben)
- 835
- Thanks (bekommen)
- 1489
- Total Downloaded
- 15,72 MB
- Total Downloaded
- 15,72 MB
Box 1:Zgemma H9.TwinBox 2:Edision Optimuss OS1+Box 3:Golden Interstar XPEED LX1Box 4:SpycatBox 5:AX HD60You can disable OpenWebinterface in menue.
______________________
Hans
TV - Hisense Ulra HD
Eutelsat 13°E und Astra 19,2°E Unicable-Matrix mit Wide-LNB
-
25.08.2018, 10:17 #5
- Registriert seit
- 02.01.2017
- Ort
- Slovakia
- Beiträge
- 1.460
- Thanks (gegeben)
- 91
- Thanks (bekommen)
- 418
- Total Downloaded
- 323,0 KB
- Total Downloaded
- 323,0 KB
Box 1:Vu+ Zero 4KBox 2:Vu+ Solo SE V2Box 3:Formuer F4-TURBOI have already answered. You can permanently disable the OpenWebif plugin in the OpenATV MENU (see my post above).
There is also the option of permanently uninstalling the OpenWebif plugin from the system through OPKG package manager:
Code:opkg update opkg list-installed | grep webif opkg remove --autoremove enigma2-plugin-extensions-openwebif
-
25.08.2018, 10:35 #6
- Registriert seit
- 15.06.2013
- Beiträge
- 2.359
- Thanks (gegeben)
- 287
- Thanks (bekommen)
- 1399
- Total Downloaded
- 1,32 MB
- Total Downloaded
- 1,32 MB
Box 1:hd51Box 2:vuduo4kseBox 3:und noch 20-30 andereThere might be more ports open on the box. Check with netstat.
Nevertheless as long as you don’t forward any port from the router to your box only local network can be a threat. So think twice what you are doing with your devices in your LAN and which devices you allow to enter your LAN.
By the way: The boxes will never be 99% save. They use old kernels without latest security updates. So if someone skilled is in your LAN and wants to hack your box he will do it.hd51, vuduo4se,....
-
25.08.2018, 14:40 #7
- Registriert seit
- 02.01.2017
- Ort
- Slovakia
- Beiträge
- 1.460
- Thanks (gegeben)
- 91
- Thanks (bekommen)
- 418
- Total Downloaded
- 323,0 KB
- Total Downloaded
- 323,0 KB
Box 1:Vu+ Zero 4KBox 2:Vu+ Solo SE V2Box 3:Formuer F4-TURBOExactly. Indeed, if a skiller is in the network, he can get into the box with an ordinary DNS attack (redirecting the update server to his PC, for example, from which he then downloads the "Trojan horse"). The ways to attack are countless. Some more complicated, some less complex. It really depends only on the skills of the attacker.
Just close all network communication (especially ports 20-23, 80, ...) and allow up to one network port per remote card-share: P. Then the set top box will be safe.
In my opinion, the best network policy is in the firewall style - to block all ports + communication protocols + incoming and outgoing connections, and only allow what exactly the set top box user needs.
Or, disable the network completely (disconnect the LAN cable and disable WiFi). And connect the internet to the set top box only once in a month - due to the firmware upgrade. But this is only applicable if the set top box is only used for DVB-S (satellite signal). So when the Internet is not required (IPTV, YouTube, etc.).
Lesezeichen