Skip to main content
Skip table of contents

Support Center

Open a support ticket

Important

Questions? Just send us a Support Ticket! Email us at the following address: support@blastwave.com.

Support updates

Host Agent

Date

Description and document link

26th January 2023

GPG key expiry on Ubuntu and Debian Host Agent installations

Connectivity requirements

CLIENT CONNECTIVITY REQUIREMENTS
  1. Allow outbound access to the following domains. Whitelist these on your firewall as necessary or if you use an SSL web proxy then bypass them from the proxy:

    auth.blastwave.io and lighthouse.blastwave.io on TCP port 443.

  2. Outbound UDP ports to all required destinations.

  3. Resolution of DNS requests must be supported by the network.

  4. If you use DNS over HTTPS, ensure it is configured in your OS and not in your browser to allow the BlastShield Client to use its associated DNS server.

  5. Ensure that the timezone is correctly set on your computer for your location and that the clock is set accurately.

  6. Orchestrator access requires IPv6 support in the OS of the host running the desktop client, so make sure there is no Windows group policy disabling IPv6 in the registry.

AGENT CONNECTIVITY REQUIREMENTS
  1. Outbound UDP ports to all required destinations.

  2. Resolution of DNS requests must be supported by the network.

GATEWAY CONNECTIVITY REQUIREMENTS
  1. Outbound UDP ports to all required destinations.

  2. Resolution of DNS requests must be supported by the network.

CLOUD HOSTED ORCHESTRATOR CONNECTIVITY REQUIREMENTS
  1. Allow outbound access to the lighthouse.blastwave.io domain.

  2. Allow UDP Port 12345 inbound to the Orchestrator on your firewall.

  3. Resolution of DNS requests must be supported by the network.

ON PREMISE ORCHESTRATOR CONNECTIVITY REQUIREMENTS

On premise, non-airgapped Orchestrator

  1. Allow outbound access to the lighthouse.blastwave.io domain.

  2. Allow UDP Port 12345 inbound to the Orchestrator on your firewall.

  3. Resolution of DNS requests must be supported by the network.

On premise, fully airgapped Orchestrator

  1. Allow UDP Port 12345 inbound from the local network to the Orchestrator.

Supported operating systems

CLIENT

BlastShield™ Client supported operating systems

Operating System

Supported Versions

Linux

Debian based distributions: Debian 10 / Ubuntu 18.04 LTS and onward. RPM based distributions: CentOS 7 and onward. ARM: All permutations on arm32, arm64 and x86_64.

Windows

Windows Server 2012 and onward. Windows 10 and onward.

macOS

macOS 10.13 and onward.

MOBILE CLIENT

BlastShield™ Mobile Client supported operating systems

Operating System

Supported Versions

iOS

iOS 13 or later

Android

Android 7 or later

MOBILE AUTHENTICATOR

BlastShield™ Mobile Authenticator supported operating systems

Operating System

Supported Versions

iOS

iOS 13 or later

Android

Android 7 or later

HOST AGENT

BlastShield™ Agent supported operating systems

Operating System

Supported Versions

Linux

Debian based distributions: Debian 10 / Ubuntu 18.04 LTS and onward. RPM based distributions: CentOS 7 and onward. ARM: All permutations on arm32, arm64 and x86_64.

Windows

Windows Server 2012 and onward. Windows 10 and onward.

macOS

macOS 10.13 and onward.

Virtual Machine vCPU and memory requirements

GATEWAY

Gateway VM requirements

Parameter

Value

vCPUs

2

RAM

4GB

ORCHESTRATOR

Orchestrator VM requirements

Parameter

Value

vCPUs

2

RAM

8GB

Gateway and Orchestrator hardware requirements

GATEWAY

x86 Gateway hardware requirements

Parameter

Value

CPU

Minimum Intel Atom with AES-NI support or Intel Celeron with AES-NI support. Note that more powerful CPUs with AES-NI support such as Core i3 or Xeon are also supported.

RAM

Minimum 4GB

HDD/SSD

Minimum 8GB

NICs

Most NICs made by Intel, Broadcom and Mellanox are supported.

Note 1: a USB interface is required to connect the boot media.

Note 2: size the appropriate number of NICs for your Gateway application.

ORCHESTRATOR

x86 Orchestrator hardware requirements

Parameter

Value

CPU

Minimum Intel Atom with AES-NI support or Intel Celeron with AES-NI support. Note that more powerful CPUs with AES-NI support such as Core i3 or Xeon are also supported.

RAM

Minimum 8GB

HDD/SSD

Minimum 64GB

NICs

One NIC is required. Most NICs made by Intel, Broadcom and Mellanox are supported.

Note: a USB interface is required to connect the boot media.

Commonly asked troubleshooting questions

If you encounter difficulties when using BlastShield™, please check out the following common issues and resolutions.

REMOTE ACCESS TROUBLESHOOTING

How do I register to join a BlastShield™ network?

If you have received a registration URL then use this method to register: Step 2 - Register with your BlastShield™ Network

If you have not received a registration URL, then contact us here: https://www.blastwave.com/contact

The authentication process on the Desktop Client does not start or display the QR code.

This behavior can indicate that your firewall or web proxy is blocking outbound traffic. Please check the following:

  1. Allow outbound access to the following domains. Whitelist these on your firewall as necessary or if you use an SSL web proxy then bypass them from the proxy:

    auth.blastwave.io and lighthouse.blastwave.io on TCP port 443.

  2. Outbound UDP ports to all required destinations.

  3. Resolution of DNS requests must be supported by the network.

  4. If you use DNS over HTTPS, ensure it is configured in your OS and not in your browser to allow the BlastShield Client to use its associated DNS server.

  5. Ensure that the timezone is correctly set on your computer for your location and that the clock is set accurately.

  6. Orchestrator access requires IPv6 support in the OS of the host running the desktop client, so make sure there is no Windows group policy disabling IPv6 in the registry.

If you have verified that the outbound traffic is allowed on your network, please check on your computer that your host AV or endpoint security software is not blocking the BlastShield™ Client from running.

Failed to create private key in secure enclave

If you see the "Failed to create private key in secure enclave" warning in the BlastShield Mobile Authenticator app, it commonly means that there is no screen lock configured on the mobile device (i.e. no passcode and no face id/touch id).

To resolve this, make sure that the screen lock is enabled on the phone.

The Desktop Client displays a certificate error

If, when starting the connection process, you see an error message on the Desktop client indicating it failed to connect to the authentication server due to a problem with the server certificate: -

This indicates that there may be an SSL web proxy or similar device inspecting the traffic. The following domains must be bypassed from the proxy:

auth.blastwave.io and lighthouse.blastwave.io

The authentication step using the Mobile Authenticator app stops working.

If the authentication step used to work for a user, but subsequently stops working, this can be due to an invalid or missing key. If a key has become invalid then an authentication reset of the user is required. The user should be sent the new invitation URL to register with.

Also, if a user has changed mobile device, then an authentication reset of the user will be required. The user should be sent the new invitation URL to register with.

An authentication reset should be performed on the BlastShield™ Orchestrator by the Administrator. You can learn how to reset user authentication here: reset user authentication.

You can connect to the Orchestrator, but not to any of your Agents or Endpoints.

The BlastShield™ solution is zero-trust, so you will require a policy to allow access to the Agents on your protected servers.

  1. You can learn about Policies here.

  2. You can learn about Groups here.

  3. Learn how to configure policy here.

Your Desktop Client connects to the BlastShield Network but you cannot connect to the Orchestrator.

Check the following on the host running the BlastShield™ Desktop Client.

  1. Ensure that the timezone is correctly set on your computer for your location.

  2. Verify that the system clock is accurate. An incorrect setting may cause connection errors in the Client.

COMMONLY ASKED ADMINISTRATIVE QUESTIONS

How is the Overlay IP addressing defined?

Users, endpoints and Host Agents are each allocated a unique protected IP address from the overlay subnet by the Orchestrator when they are created. The overlay IP address is used to connect to a node in the BlastShield™ encrypted overlay. The default network for the subnet is 172.16.0.0/16 and if you want to use a different network prefix, you can change this on the Orchestrator.

The Orchestrator will always have the first IP address in the overlay subnet, so in the case of the default configuration, this will be 172.16.0.1. Endpoints and Host Agents will be allocated the next available address after the Orchestrator address as they are created. Users will be allocated an IP address in the 172.16.128.1 subnet for the default settings.

You can set your own IP address instread of the system suggested address, but the address must be in the protected overlay and it must not duplicate an existing IP address.

See the following article for details on changing the default network prefix: Changing the network prefix on the Orchestrator.

Where are log files stored?

  1. Log files for the Client may be viewed in the Desktop Client GUI by clicking on the 'Logs' button at the bottom left off the Connection Status window. 

  2. Event logs for all nodes (Users, Host Agents, Endpoints and Gateways) may be viewed from the Orchestrator and may be exported to a syslog server.

  3. Connection logs may only be viewed if they are exported and viewed from a syslog server.

  4. Agent and Client log files may also be examined from the host OS as follows:

OS type

Log location

Windows

\Program Files\BlastShield Client\bs-noded.log

\Program Files\BlastShield Agent\bs-noded.log

macOS

/var/log/blastshield/bs-noded.log

Linux

journalctl -u blastshield

How do I upgrade the Host Agent?

The Host Agent may be upgraded directly from the Orchestrator, which you can learn about here. This is the recommended method.

For Host Agents which are on Release 1.2 or lower, the Agent is upgraded by installing the latest version of the Agent software onto the server and you can learn how to do this here.

How is the Gateway upgraded?

The majority of Gateways are upgraded from the Orchestrator. The exception to this is a container based Gateway, much must be upgraded by by modifying the container to use a newer image.

You can read the Gateway upgrade process here.

GATEWAY AND ENDPOINT COMMON QUESTIONS AND TROUBLESHOOTING

What are the BlastShield™ Gateway hardware requirements?

The Gateway requires an x86 based hardware platform with the following minimum specifications:

Parameter

Value

CPU

Minimum Intel Atom with AES-NI support or Intel Celeron with AES-NI support. Note that more powerful CPUs with AES-NI support such as Core i3 or Xeon are also supported.

RAM

Minimum 4GB

HDD/SSD

Minimum 8GB

NICs

Most NICs made by Intel, Broadcom and Mellanox are supported.

Note 1: a USB interface is required to connect the boot media.

Note 2: size the appropriate number of NICs for your Gateway application.

What is the 'Send Default Gateway' option in the Endpoint configuration for?

If the 'Send Default Gateway' checkbox is ticked, then a default gateway address will be sent in the. DHCP offer from the BlastShield Gateway to its protected Endpoints.

The BlastShield Gateway will use 172.16.255.254 as the default gateway (if the standard prefix is being used).

The default gateway configuration can be enabled for Endpoint devices which require a default gateway IP address in their IP configuration and for configuring the Enhanced Gateway Endpoint connectivity feature.

Why does an Apple Mac Endpoint not respond to DNS-based queries?

Apple have implemented the DHCP functionality on the Mac such that if a default gateway is not sent in the DHCP offer then it discards the sent DNS entry, but it does accept the IP address.

The BlastShield Gateway allocates the protected IP address to the Mac endpoint by a DHCP offer but it does not include a default gateway address in the offer.

To learn how to work around this, watch the following video or read the steps below.

  1. Go to the Orchestrator, and click on the Endpoints menu on the left.

  2. Find the endpoint configuration for the Mac endpoint in question and click on it.

  3. In the Endpoint Settings tab, check the "Send DHCP default gateway" option for the Mac endpoint.

  4. This will ensure that a default gateway address is sent in the DHCP offer to the Mac computer and will ensure the Mac does not discard the offered DNS name.

  5. Click "Save Changes".

Why doesn't the Anydesk client connect to an endpoint over the BlastShield network?

Anydesk is a remote connectivity app which connects a remote user to a host computer and routes the connection via Anydesk’s SaaS cloud. Since the SaaS cloud is outside of the BlastShield Network, then BlastShield™ will not send packets to it. Clients such as Microsoft Remote Desktop will work as an alternative, since they use a peer-to-peer connectivity.

Release notes

Firmware Version 1.9 Release Notes

Firmware Version 1.8 Release Notes

Firmware Version 1.7 Release Notes

Firmware Version 1.6 Release Notes

Firmware Version 1.5 Release Notes

Firmware Version 1.4 Release Notes

Firmware Version 1.3 Release Notes

Firmware Version 1.2 Release Notes

Firmware Version 1.1 Release Notes

End User License Agreement (EULA)

View the BlastWave End User License Agreement (EULA).

EULA
image-20250627-222812.png

Page 1

image-20250627-222840.png

Page 2

image-20250627-222852.png

Page 3

image-20250627-222901.png

Page 4

image-20250627-222928.png

Page 5

image-20250627-222937.png

Page 6

GPG key expiry on Ubuntu and Debian Host Agent installations

Date: 26th January 2023

Components affected:

Previous installations of the Debian Host Agent and Ubuntu Host Agent. New installations from today are not affected.

Description of problem:

Already installed Host Agents on Ubuntu or Debian will be faced with the following error while running apt update:

CODE
W: An error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: https://dl.blastwave.io/ubuntu focal InRelease: The following signatures were invalid: EXPKEYSIG E3978E66D4BFDB63 BlastWave, Inc. <support@blastwave.io> 

Recommended fix

To fix this, fetch the GPG key again:

  1. From the host where the Agent is installed:

    sudo curl https://dl.blastwave.io/ubuntu/blastwave.gpg -o /usr/share/keyrings/blastwave.gpg

  2. Once you have downloaded the new key, then you can install a package with the GPG key that BlastWave will update ahead of time to make sure there's no need for more manual updates:

    sudo apt update && sudo apt install blastwave-keyring

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.