Linux - ServerThis forum is for the discussion of Linux Software used in a server related context.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
You might need to provide some additional information on how your home network is configured. Are you trying to connect to a physical or virtual machine? Since you are trying to use Autotunnel it appears you want to connect to VM via its host. If you are trying to connect to a VM is it using NAT or bridge configured network adapter?
You might need to provide some additional information on how your home network is configured. Are you trying to connect to a physical or virtual machine? Since you are trying to use Autotunnel it appears you want to connect to VM via its host. If you are trying to connect to a VM is it using NAT or bridge configured network adapter?
i would first troubleshoot this within the same system:
Code:
ssh localhost
if that worx then try it on another computer on the same network:
Code:
ssh 192.168.1.x
if that worx then try outside the network using sshd debug mode
Code:
sudo /usr/sbin/sshd -d -d -d # on the server
ssh -v -v -v user@host
and post the output.
did you forward port 22 within your routers configuration ? maybe posting your /etc/ssh/sshd_config mite also help.
sshd conf
Code:
sudo cat /etc/ssh/sshd_config
# $OpenBSD: sshd_config,v 1.97 2015/08/06 14:53:21 deraadt Exp $
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options override the
# default value.
default port is 22 yes??
the rest of it
Code:
#Port 22
#AddressFamily any
#ListenAddress 0.0.0.0
#ListenAddress ::
# The default requires explicit activation of protocol 1
#Protocol 2
# HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
#HostKey /etc/ssh/ssh_host_ecdsa_key
#HostKey /etc/ssh/ssh_host_ed25519_key
# Lifetime and size of ephemeral version 1 server key
#KeyRegenerationInterval 1h
#ServerKeyBits 1024
# Ciphers and keying
#RekeyLimit default none
# Logging
# obsoletes QuietMode and FascistLogging
#SyslogFacility AUTH
#LogLevel INFO
# Authentication:
#LoginGraceTime 2m
#PermitRootLogin prohibit-password
#StrictModes yes
#MaxAuthTries 6
#MaxSessions 10
#RSAAuthentication yes
#PubkeyAuthentication yes
# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2
# but this is overridden so installations will only check .ssh/authorized_keys
AuthorizedKeysFile .ssh/authorized_keys
#AuthorizedPrincipalsFile none
#AuthorizedKeysCommand none
#AuthorizedKeysCommandUser nobody
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
#RhostsRSAAuthentication no
# similar for protocol version 2
#HostbasedAuthentication no
# Change to yes if you don't trust ~/.ssh/known_hosts for
# RhostsRSAAuthentication and HostbasedAuthentication
#IgnoreUserKnownHosts no
# Don't read the user's ~/.rhosts and ~/.shosts files
#IgnoreRhosts yes
# To disable tunneled clear text passwords, change to no here!
#PasswordAuthentication yes
#PermitEmptyPasswords no
# Change to no to disable s/key passwords
ChallengeResponseAuthentication no
# Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
#KerberosGetAFSToken no
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via ChallengeResponseAuthentication may bypass
# the setting of "PermitRootLogin without-password".
# If you just want the PAM account and session checks to run without
# PAM authentication, then enable this but set PasswordAuthentication
# and ChallengeResponseAuthentication to 'no'.
UsePAM yes
#AllowAgentForwarding yes
#AllowTcpForwarding yes
#GatewayPorts no
#X11Forwarding no
#X11DisplayOffset 10
#X11UseLocalhost yes
#PermitTTY yes
PrintMotd no
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
UsePrivilegeSeparation sandbox # Default for new installations.
#PermitUserEnvironment no
#Compression delayed
#ClientAliveInterval 0
#ClientAliveCountMax 3
#UseDNS no
#PidFile /run/sshd.pid
#MaxStartups 10:30:100
#PermitTunnel no
#ChrootDirectory none
#VersionAddendum none
# no default banner path
#Banner none
# override default of no subsystems
Subsystem sftp /usr/libexec/sftp-server
# Example of overriding settings on a per-user basis
#Match User anoncvs
# X11Forwarding no
# AllowTcpForwarding no
# PermitTTY no
# ForceCommand cvs server
I'm getting wifi off a local coffee shop router
I'm eating PPJ right now don't want to type while sticky finger mode is ON
have you considered that the free wifi access point might be influencing or even blocking your attempts?
i'd try this first from the safety of your home (network), and only after that in the wild.
basically, it is possible.
what are you using to shh from your phone?
have you considered that the free wifi access point might be influencing or even blocking your attempts?
i'd try this first from the safety of your home (network), and only after that in the wild.
basically, it is possible.
what are you using to shh from your phone?
ab-so-lute-ly
was just in hope mode that someone might know how to get though that f**kin' thing
Don't bother with ssh. Install Airdroid on the phone. Run it, and it will give you an ip address to put into your laptop browser. When you do that, you'll get a popup on the phone asking permission to connect to the laptop. Tap ok and you have complete access to everything on the phone from the browser. You can transfer files either way, access your contacts, send and receive SMS messages from the laptop using a real keyboard, and pretty much anything else on the phone. No need to do anything with the router, it just works.
I have an iPhone that I could not get iTunes to see it, but I'd still charge. So no more connecting to iTunes to shove what ever I wanted into that iPhone.
But, I have this app that uses wifi and plays moves or music. So I started using that. Then one day it updated.
Taking that abiltiy out of it, now it doesn't do that N E More.
Now you're telling my about this app called AirDroid.
So from you. Yes YOU.
Here we have another example of -yes- it can be done.
If they can write an app that will allow a user to get through public wifi as such that you explained as well. Then what is there "secret" in how they got past that router, when I cannot, even when I use ssh or any other method?
If they can do it , then why can't I? (or even you)
-----------
OH OH OH
I just installed it.. wouldn't you know. I got to get an account with them?
AirDroid opens the connection from inside. You cannot get thru NAT router initiating connection from outside. This is the way viruses work, first they need to get into computer somehow, then they open a connection to the master.
Of course you need to open an account with them to use their DNS to find your phone. How do you think your phone would be found without?!
AirDroid opens the connection from inside. You cannot get thru NAT router initiating connection from outside. This is the way viruses work, first they need to get into computer somehow, then they open a connection to the master.
Of course you need to open an account with them to use their DNS to find your phone. How do you think your phone would be found without?!
no not really.. they already have my IP off my phone, that is just a step they put in there for other reasons.
they could remove that step and it'd still work.
as I am already looking at the ip address and port number to use. already.
created an account, typed in that ip : port info -> File Transferr -> AirDriod Web -> ..... timed out in my laptop webpage. NOTHING ... ooooooOOoOOOoooOOooohhh
takes back -> they could remove that step and it'd still work.
mod:
Code:
Search Results
Connect your computer to the Android hotspot wireless network you just created. The hotspot name should be something like AndroidAP. Open AirDroid on your device, go to Tools tab, and press Tethering. A new AirDroild url like “http://192.168.43.1:8888” will be displayed.
got a do more setup then just type in ip in addy bar?
And how they have the IP of your phone? When you move around the IP of your phone may change, how the computer in the coffee house is supposed to know what the new IP address is?
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.