ROS Resources: Documentation | Support | Discussion Forum | Index | Service Status | ros @ Robotics Stack Exchange
Ask Your Question

GreatSuccess's profile - activity

2016-02-01 11:31:31 -0500 received badge  Great Question (source)
2015-05-28 12:22:21 -0500 received badge  Taxonomist
2015-03-10 19:53:32 -0500 answered a question Including uic auto generated header files in .cpp file

I just encountered this when moving a package from catkin to rosbuild.

The solution I used was to add the line:

include_directories(include ${PROJECT_SOURCE_DIR}/build)

to the CMakeLists.txt

Then you'd be able to include your file as such:

#include "ui_form.h"
2014-02-04 04:07:31 -0500 received badge  Famous Question (source)
2013-12-04 18:20:53 -0500 received badge  Good Question (source)
2013-12-04 08:12:49 -0500 received badge  Notable Question (source)
2013-12-04 06:50:52 -0500 received badge  Popular Question (source)
2013-12-04 06:40:22 -0500 commented answer Security Vulnerabilities in ROS

A VPN would be fine for a single machine, but this approach could get clunky for weaker computers (i.e. running ROS on a RasberryPi, Beagleboard, Panda etc). This could also be troublesome for multi-robot systems.

2013-12-04 06:33:07 -0500 received badge  Scholar (source)
2013-12-04 06:32:55 -0500 received badge  Supporter (source)
2013-12-04 06:01:51 -0500 received badge  Nice Question (source)
2013-12-04 05:59:40 -0500 received badge  Student (source)
2013-12-04 05:52:06 -0500 asked a question Security Vulnerabilities in ROS

As far as I'm aware, when a ROS master starts up on a machine, it opens a port for any network machine to attach to. This means that any machine with a route to the ROS machine can freely ask that ROS master for anything it has control over, for example, setting up ROSTCP/UDP connections with nodes running under that master. From an exploiter's point of view, this means that one has access to many avenues of exploitation on a machine running ROS. In the worst case, if a node running with sufficient privilege can potentially allow for an exploiter to run arbitrary code on the ROS machine with administrative privileges. Even on your average case, an exploiter can ask to connect to a topic such as a velocity command on a ROS system connected to mechanical hardware and actually manipulate hardware.

Are there any security measures in place for preventing this kind of situation? If not, are there any plans for adding measures, for example: credentials, to future distros of ROS?