Plan is as follows:

Serial numbers are of the form:

YYYYBBNNNNN

* YYYY is four digit year. For example; 2018
* BB is two digit batch. For example; 00, 01, 02, etc
* NNNN is four digit sequence. For example; 0001, 0002, etc

First production batch is 2018010001 - 2018010120.

That would be 10 digits. Not the most secure, and pretty predictable, but better than a simple “OVMS”.

I’m asking if the software they have can generate random characters. If it can, then will add four random letters onto the end.

Regards, Mark.

On 4 Mar 2018, at 11:23 AM, Greg D. <gregd2350@gmail.com> wrote:

Hi Mark,

WPA2 PSK passphrases for WiFi need to be at least 8 characters.  Do the serial numbers have leading zeros?

Greg


Mark Webb-Johnson wrote:

They’ll do pretty much whatever we ask them to do.

To try to formalise this, so everyone can see, I’ve created a production/qc/production_notes.txt file with the production notes that will be given to the China side. This should document all the production and QC steps they should do.

What I have at the moment is:

********************************************************************************
** TOOLS
********************************************************************************

1] DB9 CAN Bus QC tool

   DB9 Female with:
    * Pins 2, 4, and 6 connected (all CAN-L signals)
    * Pins 5, 7, and 8 connected (all CAN-H signals)
    * R120 between pins 2 and 5
    * External 12V power connector
      * GND on pin 3
      * +12V on pin 9

********************************************************************************
** PRODUCTION STEPS
********************************************************************************

1] Default wifi AP and module passwords

   OVMS> config set wifi.ap OVMS <serialnumber>
   OVMS> config set password module <serialnumber>

   Where <serialnumber> is the serial number from the label on the enclosure.

I think that should set both the module default and auto wifi AP passwords to the serial number of the module. That will be on a label on the underside of the module.

You are correct: this is a connected car, with possibly disastrous consequences should somebody malicious gain access. Best to err on the side of caution.

Regards, Mark.

On 3 Mar 2018, at 4:07 AM, Michael Balzer <dexter@expeedo.de> wrote:

Mark,

Am 26.02.2018 um 07:28 schrieb Mark Webb-Johnson:

I’ve asked the China side. Specifically:

  1. Can you print serial number stickers for these modules? I can provide design - and we can print a large batch.
  2. Then, during manufacturing, have one step to enter serial number as password into module, like:
    1. Flash
    2. Connect terminal
    3. QC checks
    4. New step to type: config set wifi.ap OVMS <serialnumber>

Just to double check: so we won't set the module password, only the AP pass phrase?

Has setting the module password any drawbacks?

I'm asking because I assume the SMS channel -as soon as implemented- will also provide command access, which would be open by default as well without a module password.

Setting the module password would secure the webserver as well.

Regards,
Michael

-- 
Michael Balzer * Helkenberger Weg 9 * D-58256 Ennepetal
Fon 02333 / 833 5735 * Handy 0176 / 206 989 26
_______________________________________________
OvmsDev mailing list
OvmsDev@lists.teslaclub.hk
http://lists.teslaclub.hk/mailman/listinfo/ovmsdev



_______________________________________________
OvmsDev mailing list
OvmsDev@lists.teslaclub.hk
http://lists.teslaclub.hk/mailman/listinfo/ovmsdev

_______________________________________________
OvmsDev mailing list
OvmsDev@lists.teslaclub.hk
http://lists.teslaclub.hk/mailman/listinfo/ovmsdev