TE
TechEcho
AccueilTop 24hRécentsMeilleursQuestionsPrésentationsEmplois
GitHubTwitter
Accueil

TechEcho

Une plateforme d'actualités technologiques construite avec Next.js, fournissant des nouvelles et discussions technologiques mondiales.

GitHubTwitter

Accueil

AccueilRécentsMeilleursQuestionsPrésentationsEmplois

Ressources

HackerNews APIHackerNews OriginalNext.js

© 2025 TechEcho. Tous droits réservés.

Starlink User Terminal Teardown

293 pointspar walterbellil y a 1 jour

10 comments

jwrallieil y a 1 jour
&gt; During device initialization, if the system identifies itself as a user terminal, the initialization script automatically writes 41 SSH public keys into &#x2F;root&#x2F;.ssh&#x2F;authorized_keys. Notably, port 22 on the UTA remains open to the local network at all times.<p>Forty-one? So who does <i>not</i> have root access to &quot;your&quot; user terminal?
评论 #43934024 未加载
评论 #43934146 未加载
评论 #43934197 未加载
评论 #43939293 未加载
评论 #43933954 未加载
评论 #43934776 未加载
评论 #43934644 未加载
评论 #43939918 未加载
评论 #43935703 未加载
评论 #43935153 未加载
latchkeyil y a 1 jour
Discussions on similar submissions:<p><i>Teardown of the SpaceX Starlink User Terminal</i> <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25277171">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=25277171</a> (December 2, 2020 — 158 points, 138 comments)
purpleideail y a 1 jour
Post the 41 public keys, we can see which devs use them probably.
walterbellil y a 1 jour
<a href="https:&#x2F;&#x2F;web.archive.org&#x2F;www.darknavy.org&#x2F;blog&#x2F;a_first_glimpse_of_the_starlink_user_ternimal&#x2F;" rel="nofollow">https:&#x2F;&#x2F;web.archive.org&#x2F;www.darknavy.org&#x2F;blog&#x2F;a_first_glimps...</a>
nine_kil y a 1 jour
Dear author, please consider fixing the typo in the title, it currently reads &quot;Ternimal&quot;.
评论 #43934852 未加载
londons_exploreil y a 1 jour
I&#x27;m surprised to hear all packets are processed in userspace...<p>If one is doing 1Gbps of traffic which is 100 byte UDP packets, that&#x27;s a million packets per second you&#x27;re gonna need to process.<p>A 1Ghz CPU only then gets 1000 cycles to process each one...<p>Very doable, but certainly not easy unless your engineers like hand coding assembly and having to think about every lookup table trick in the book...
评论 #43933929 未加载
评论 #43934590 未加载
评论 #43933935 未加载
评论 #43934134 未加载
评论 #43935681 未加载
account-5il y a environ 22 heures
How do you even get into doing this sort of thing? Reverse engineering stuff is hard and all trolling is either really expensive, or old and no longer developed; with a few exceptions, I&#x27;m sure.
评论 #43939596 未加载
评论 #43940744 未加载
alextousssil y a 1 jour
I’m interested in how to secure the firmware from reverse-engineering in a product. Is there somewhere an introduction to the techniques used by SpaceX there?
评论 #43936833 未加载
评论 #43939560 未加载
评论 #43939254 未加载
brepppil y a 1 jour
&gt; DARKNAVY built a basic QEMU-based emulation environment for the Rev3 firmware<p>Anyone has links to resources about how to emulate a firmware that connects to external devices (GPS here), any ready solutions?
评论 #43935400 未加载
numpad0il y a environ 23 heures
Is this based on a shared code base with their rockets!? That&#x27;s cool!
评论 #43939224 未加载
评论 #43939035 未加载