<
From version < 14.1 >
edited by Xiaoling
on 2022/05/27 11:10
To version < 20.1 >
edited by Xiaoling
on 2022/07/14 15:06
>
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -1,28 +1,32 @@
1 - **Contents:**
1 + **Table of Contents:**
2 2  
3 3  {{toc/}}
4 4  
5 5  
6 -= 1. Use Remote.it service =
7 7  
7 += **1.  Use Remote.it service** =
8 +
9 +
8 8  Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
9 9  
10 10  (% style="color:red" %)**Important Notice:**
11 11  
12 -(% style="color:red" %)* **Remote.it access will give full control of your device to remote support.**
13 -~* **The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**
14 +* (% style="color:red" %)**Remote.it access will give full control of your device to remote support.**
15 +* (% style="color:red" %)**The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**
14 14  
15 15  For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
16 16  
17 17  
18 -= 2. RSSH Introduction =
19 19  
21 += **2.  RSSH Introduction** =
22 +
23 +
20 20  Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
21 21  
22 22  (% style="color:red" %)**Important Notice:**
23 23  
24 -(% style="color:red" %)* **RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
25 -~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
28 +* (% style="color:red" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
29 +* (% style="color:red" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
26 26  
27 27  Below gateway support reverse SSH access:
28 28  
... ... @@ -34,10 +34,15 @@
34 34  * LIG16
35 35  * MS14 series if installed with the same firmware.
36 36  
37 -== 2.1 For Firmware Version lower than lgw~-~-build-v5.4.1616478814-20210323-1355 ==
38 38  
39 -=== 2.1.1 End User Guide to use SSH access ===
40 40  
43 +
44 +== **2.1  For Firmware Version lower than lgw~-~-build-v5.4.1616478814-20210323-1355** ==
45 +
46 +
47 +=== **2.1.1  End User Guide to use SSH access** ===
48 +
49 +
41 41  Go to this the Reverse SSH page as below:
42 42  
43 43  [[image:image-20220527102348-1.png]]
... ... @@ -49,11 +49,12 @@
49 49  
50 50  Connection OK.
51 51  
52 -* (% style="color:#4f81bd" %)**Login ID**(%%): Input (% style="color:#4f81bd" %)**sshuser**
53 -* (% style="color:#4f81bd" %)**Host Address**(%%): Input** (% style="color:#4f81bd" %)support.dragino.com(%%)**
54 -* (% style="color:#4f81bd" %)**Host Port**(%%): Please email to support @ dragino.com to get a valid host port.
61 +
62 +* (% style="color:#4f81bd" %)**Login ID**(%%):  Input (% style="color:#4f81bd" %)**sshuser**
63 +* (% style="color:#4f81bd" %)**Host Address**(%%):  Input** (% style="color:#4f81bd" %)support.dragino.com(%%)**
64 +* (% style="color:#4f81bd" %)**Host Port**(%%):  Please email to support @ dragino.com to get a valid host port.
55 55  * (% style="color:#4f81bd" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered.
56 -* (% style="color:#4f81bd" %)**Network Keys:**(%%)Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
66 +* (% style="color:#4f81bd" %)**Network Keys:          **(%%)Click the Generate keys to generate the keys and download / mail it to Dragino support so Dragino can prepare the remote access to
57 57  
58 58  (((
59 59  After doing above, please download and mail the public keys to Dragino support and wait for our mail for the valid host port. Input the valid host port got from our support and click connect so we can remote access to your gateway.
... ... @@ -60,8 +60,10 @@
60 60  )))
61 61  
62 62  
63 -=== 2.1.2 How to Ser up a Reverse SSH access ===
64 64  
74 +=== **2.1.2  How to Ser up a Reverse SSH access** ===
75 +
76 +
65 65  Advance administrator can config a SSH server to provide support their end user themselves. Instruction is as below:
66 66  
67 67  1. Prepare a Linux server with public IP. The gateways need to be able to create SSH connection to this server. We recommend to use a server that performs no other function than to support the RSSH access, and to have no additional accounts active, and no access from the Internet that uses ID/password authentication.
... ... @@ -72,7 +72,7 @@
72 72  
73 73  (% class="box" %)
74 74  (((
75 -$ ssh   -p <End User Host Port>   root@<Host Address>
87 +**$ ssh   -p <End User Host Port>   root@<Host Address>**
76 76  )))
77 77  
78 78  (((
... ... @@ -80,50 +80,56 @@
80 80  )))
81 81  
82 82  
83 -==== 2.1.2.1 Note for set up RSSH server ====
84 84  
96 +==== **2.1.2.1  Note for set up RSSH server** ====
97 +
85 85  If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port.
86 86  
87 87  (% class="box" %)
88 88  (((
89 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
102 +**[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
90 90  COMMAND   PID    USER   FD   TYPE   DEVICE SIZE/OFF NODE NAME
91 91  sshd    21430 sshuser   15u  IPv4 47567059      0t0  TCP localhost:bacula-fd (LISTEN)
92 92  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430   ~-~-> Kill PID of this process.
93 93  [root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102        
94 -[root@iZt4n22vqvm7ajogrfiif6Z ~~]#
107 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#**
95 95  )))
96 96  
97 97  
98 -== 2.2 For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111 ==
111 +== **2.2  For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111** ==
99 99  
113 +
100 100  Below gateway support reverse SSH access:
101 101  
102 102  (% class="box" %)
103 103  (((
104 -Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
118 +**Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
105 105  LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
106 106  LG02, OLG02
107 107  LG308, DLOS8
108 108  LPS8
109 -LIG16
123 +LIG16**
110 110  )))
111 111  
112 112  
113 -=== 2.2.1 End User Guide to use SSH access ===
114 114  
115 -==== 2.2.1.1 Install the SSH service for server ====
128 +=== **2.2.1  End User Guide to use SSH access** ===
116 116  
117 -===== 2.2.1.1.1 Step 1:Download the SSH service code =====
118 118  
119 -1).git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
131 +==== **2.2.1. Install the SSH service for server** ====
120 120  
133 +
134 +===== (% style="color:blue" %)**Step 1 : Download the SSH service code**(%%) =====
135 +
136 +
137 +**1).  **git clone [[https:~~/~~/github.com/dragino/rssh-server.git>>url:https://github.com/dragino/rssh-server.git]] rssh-server
138 +
121 121  [[image:image-20220527105447-1.png]]
122 122  
123 123  git clone rssh-server
124 124  
125 125  
126 -2).cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
144 +**2). ** cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
127 127  
128 128  [[image:image-20220527105511-2.png]]
129 129  
... ... @@ -134,14 +134,14 @@
134 134  
135 135  (% class="box" %)
136 136  (((
137 -if you git fail.  ~-~->    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
138 -please install git.  ~-~->  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
155 +**if you git fail.  ~-~->**    (% style="color:#4f81bd" %)**sudo: git: command not found.**(%%)
156 +**please install git.  ~-~->**  (% style="color:#4f81bd" %)**yum install git -y  or  apt-get install git -y.**
139 139  )))
140 140  
141 141  (% class="box" %)
142 142  (((
143 -if you make error 127,it** (% style="color:#4f81bd" %)lack of gcc.(%%)**
144 -please install gcc.    ~-~->(% style="color:#4f81bd" %)**yum install gcc.**
161 +**if you make error 127,it (% style="color:#4f81bd" %)lack of gcc.(%%)**
162 +**please install gcc.    ~-~-> (% style="color:#4f81bd" %)yum install gcc.(%%)**
145 145  )))
146 146  
147 147  [[image:image-20220527105856-3.png]]
... ... @@ -148,10 +148,11 @@
148 148  
149 149  lack of gcc
150 150  
169 +
151 151  (% class="box" %)
152 152  (((
153 -if you make a fatal error : sqlite3.h,it (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
154 -please insatell (% style="color:#4f81bd" %)**sqlite3**.
172 +**if you make a fatal error : sqlite3.h,it** (% style="color:#4f81bd" %)**lack of sqlite3.**(%%)
173 +**please insatell (% style="color:#4f81bd" %)sqlite3(%%)**(% style="color:#4f81bd" %).
155 155  )))
156 156  
157 157  [[image:image-20220527105918-4.png]]
... ... @@ -159,24 +159,30 @@
159 159  lack of sqlite3
160 160  
161 161  
162 -How to install Sqlit3
181 +(% style="color:blue" %)**How to install Sqlit3:**
163 163  
164 164  (% class="box" %)
165 165  (((
166 -Step1: Download the SQLit3 installation package
185 +(% style="color:#037691" %)**Step1:**(%%) Download the SQLit3 installation package
167 167   sudo wget [[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]
168 -Step2: tar the SQLit3 installation package
187 +
188 +(% style="color:#037691" %)**Step2:**(%%) tar the SQLit3 installation package
169 169   sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
170 -Step3: Generate the makefile
190 +
191 +(% style="color:#037691" %)**Step3:**(%%) Generate the makefile
171 171   cd sqlite-autoconf-3350300/;./configure
172 -Step4: Compile makefile
193 +
194 +(% style="color:#037691" %)**Step4:**(%%) Compile makefile
173 173   sudo make
174 -Step5: Install makefile
196 +
197 +(% style="color:#037691" %)**Step5: **(%%)Install makefile
175 175   sudo make install
176 -Check:
177 - cd /usr/local/bin;ls -al                             ~-~->    Check to see if there is a file for sqlite3
178 - cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
179 -debug:
199 +
200 +(% style="color:#037691" %)**Check:**(%%)
201 + cd /usr/local/bin;ls -al  ~-~->    Check to see if there is a file for sqlite3
202 + cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->  Test whether the sqlite3 was installed successfully
203 +
204 +(% style="color:#037691" %)**debug:**(%%)
180 180   If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
181 181   Please execute the command /sbin/ldconfig.
182 182   After that execute the command ./sqlite3 test.db again.
... ... @@ -183,17 +183,19 @@
183 183  )))
184 184  
185 185  
186 -===== 2.2.1.1.2 Step 2 :Install and run the RSS service =====
187 187  
188 -1): intall database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
212 +===== (% style="color:blue" %)**Step 2 : Install and run the RSS service**(%%) =====
189 189  
214 +
215 +**1):**  intall database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
216 +
190 190  user must enter the root account and run the following commands
191 191  
192 192  (% class="box" %)
193 193  (((
194 - $ ./create_sqlite3_db.sh
221 +**~ $ ./create_sqlite3_db.sh
195 195   $ ./rssh_serv -p  3721 2>&1 &
196 - $ ps -ef | grep rssh_serv check 3721 port
223 + $ ps -ef | grep rssh_serv check 3721 port**
197 197  )))
198 198  
199 199  [[image:image-20220527110436-6.png]]
... ... @@ -200,51 +200,60 @@
200 200  
201 201  intall database and server development port
202 202  
230 +
203 203  **Debug:**
204 204  
205 205  (% class="box" %)
206 206  (((
207 -Check /var/rsshdb.sqlite3 ~-~->(% style="color:#4f81bd" %)** ls /var/rsshdb.sqlite3**(%%)
208 -Check ls /var/rsshdb.sqlite3 ~-~-> (% style="color:#4f81bd" %)**sudo chmod 777 rssh_serv**
235 +**Check /var/rsshdb.sqlite3  ~-~->(% style="color:#4f81bd" %)  ls /var/rsshdb.sqlite3(%%)**
236 +**Check ls /var/rsshdb.sqlite3 ~-~->**  (% style="color:#4f81bd" %)**sudo chmod 777 rssh_serv**
209 209  )))
210 210  
211 211  (% class="box" %)
212 212  (((
213 -if** fail to open dpvlry or to bind to it**
214 -please kill rssh_serv,and run (% style="color:#4f81bd" %)** ./rssh_serv -p  3721 2>&1 &** (%%) again
241 +**if fail to open dpvlry or to bind to it**
242 +**please kill rssh_serv,and run (% style="color:#4f81bd" %) ./rssh_serv -p  3721 2>&1 &(%%)**(% style="color:#4f81bd" %) (%%)** again**
215 215  )))
216 216  
217 217  
218 -===== 2.2.1.1.3 Step 3 :Create a minimal SSH user (reverse SSH proxy for the gateway) =====
219 219  
220 -**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** (custom user name)
247 +===== (% style="color:blue" %)**Step 3 : Create a minimal SSH user (reverse SSH proxy for the gateway)**(%%) =====
221 221  
249 +
250 +**1): (% style="color:#4f81bd" %)sudo useradd XXXXX(%%)** **(custom user name)**
251 +
222 222  **2):** (% style="color:#4f81bd" %)**sudo passwd xxxxxx**
223 223  
224 224  **3):** (% style="color:#4f81bd" %)**cp /bin/bash /bin/rbash**
225 225  
226 -**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash
256 +**4):** (% style="color:#4f81bd" %)**sudo nano /etc/passwd**(%%)  ** ~-~-> Change /bin/bash to /bin/rbash**
227 227  
228 228  **5):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin**
229 229  
230 230  **6):** (% style="color:#4f81bd" %)**sudo nano /home/xxxxx/.bash_profile**(%%) **empty it,and input export PATH=$HOME/bin**
231 231  
232 -**Now user "XXXXX" is the user with limited permissions of the current system**
233 233  
263 +(% style="color:red" %)**Now user "XXXXX" is the user with limited permissions of the current system**
234 234  
235 -=== 2.2.2 How does user get the gateway to connect to a user's private server ===
236 236  
237 -===== 2.2.2.1 Step1: Come bace the gateway web UI for get the gateway Public key =====
238 238  
239 -1) in the system ~-~-> (% style="color:#4f81bd" %)**Remote Mgmt/span>**
267 +=== **2.2.2  How does user get the gateway to connect to a user's private server** ===
240 240  
269 +
270 +===== (% style="color:blue" %)**Step 1 : Come bace the gateway web UI for get the gateway Public key**(%%) =====
271 +
272 +
273 +**1) in the system ~-~->** (% style="color:#4f81bd" %)**Remote Mgmt**
274 +
241 241  [[image:image-20220527110531-7.png]]
242 242  
243 243  Remote Mgmt
244 244  
245 245  
246 -===== **2.2.2.2 Step2: Authorization server** =====
247 247  
281 +===== (% style="color:blue" %)**Step 2 : Authorization server**(%%) =====
282 +
283 +
248 248  copy the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
249 249  
250 250  [[image:image-20220527110625-8.png]]
... ... @@ -252,8 +252,10 @@
252 252  Publickey
253 253  
254 254  
255 -===== **2.2.2.3 Step3: connecte private server** =====
256 256  
292 +===== (% style="color:blue" %)**Step 3 : connecte private server**(%%) =====
293 +
294 +
257 257  in the gateway web UI
258 258  
259 259  [[image:image-20220527110700-9.png]]
... ... @@ -260,22 +260,25 @@
260 260  
261 261  gateway web UI
262 262  
301 +
263 263  (% class="box" %)
264 264  (((
265 -(% style="color:#4f81bd" %)**Connection Type **(%%) : If user's least privileged user with private server uses a password, select (% style="color:#4f81bd" %)**Public Key**(%%)
266 -**Note:if user's least privileged user no uses a password,choose from both is fine**
267 -(% style="color:#4f81bd" %)**Login ID**(%%)             : Input user name "eg : "XXXXX"
268 -(% style="color:#4f81bd" %)**Host Address**(%%)         : Input user's private server address
269 -(% style="color:#4f81bd" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered.
270 -Click Save and then Connect
304 +(% style="color:#4f81bd" %)**Connection Type **(%%) **If user's least privileged user with private server uses a password, select** (% style="color:#4f81bd" %)**Public Key**(%%)
305 +(% style="color:red" %)**Note: if user's least privileged user no uses a password,choose from both is fine**(%%)
306 +(% style="color:#4f81bd" %)**Login ID**(%%) :  ** Input user name "eg : "XXXXX"**
307 +(% style="color:#4f81bd" %)**Host Address**(%%)  :  ** Input user's private server address**
308 +(% style="color:#4f81bd" %)**Connect at Startupt **(%%):  ** Choose to enable connect once device is powered.**
309 +**Click Save and then Connect**
271 271  )))
272 272  
273 273  
274 -===== **2.2.2.4 Step 4 :Cheak is fine** =====
275 275  
314 +===== (% style="color:blue" %)**Step 4 : Cheak is fine**(%%) =====
315 +
316 +
276 276  Rssh Host connection Ok
277 277  
278 -[[image:https://wiki.dragino.com/images/thumb/6/6f/Rssh_Host_connection_Ok.png/500px-Rssh_Host_connection_Ok.png||height="225" width="500"]]
319 +[[image:image-20220527111009-10.png]]
279 279  
280 280  Rssh Host connection Ok
281 281  
... ... @@ -282,44 +282,59 @@
282 282  
283 283  user can use common ps | grep ssh to check it in the gateway.
284 284  
285 -[[image:https://wiki.dragino.com/images/thumb/a/ad/Check_the_gateway.png/500px-Check_the_gateway.png]]
326 +[[image:image-20220527111041-11.png]]
286 286  
287 287  Check the gateway
288 288  
289 289  
290 -===== 2.2.2.5 Step5:Create an authorization key file =====
291 291  
292 -1):sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey
332 +===== (% style="color:blue" %)**Step 5 : Create an authorization key file**(%%) =====
293 293  
334 +
335 +**1):**  **sudo mkdir /home/xxxxx/.ssh; sudo touch /home/xxxxx/.ssh/authorizedkey**
336 +
337 +
294 294  **Debug:**
295 295  
296 296  (% class="box" %)
297 297  (((
298 - check: sudo ls /home/xxxxx/.ssh/authorizedkey
342 +**~ check: sudo ls /home/xxxxx/.ssh/authorizedkey**
299 299  )))
300 300  
301 -=== 2.2.3 How to Ser up a Reverse SSH access ===
302 302  
303 -==== 2.2.3.1 Step1: Log into the server system ====
304 304  
305 -[[image:https://wiki.dragino.com/images/thumb/2/26/Loging_server.png/500px-Loging_server.png||height="69" width="500"]]
347 +=== **2.2.3  How to Ser up a Reverse SSH access** ===
306 306  
349 +
350 +==== (% style="color:blue" %)**Step 1 : Log into the server system**(%%) ====
351 +
352 +
353 +[[image:image-20220527111145-12.png]]
354 +
307 307  Loging server
308 308  
309 309  
310 -==== 2.2.3.2 Step2:access the gateway ====
311 311  
312 -$ cd rssh-server/
359 +==== (% style="color:blue" %)**Step 2 : access the gateway**(%%) ====
313 313  
361 +
362 +(% class="box" %)
363 +(((
364 +**$ cd rssh-server/**
365 +)))
366 +
314 314  Check the gateway linking to the server $ ./connect-gw.sh -l
315 315  
316 -[[image:https://wiki.dragino.com/images/thumb/e/ee/Check_gateway_link_server.png/500px-Check_gateway_link_server.png||height="157" width="500"]]
369 +[[image:image-20220527111219-13.png]]
317 317  
318 318  Check the gateway linking to the server
319 319  
320 320  
374 +
321 321  access the gateway $ ./connect-gw.sh <GWID>
322 322  
323 -[[image:https://wiki.dragino.com/images/thumb/b/b7/Reverse_ssh_access_the_gateway1.png/500px-Reverse_ssh_access_the_gateway1.png||height="230" width="500"]]
377 +[[image:image-20220527111300-14.png]]
324 324  
325 325  reverse ssh access the gateway
380 +
381 +
image-20220527111041-11.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Xiaoling
Size
... ... @@ -1,0 +1,1 @@
1 +13.4 KB
Content
image-20220527111145-12.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Xiaoling
Size
... ... @@ -1,0 +1,1 @@
1 +6.3 KB
Content
image-20220527111219-13.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Xiaoling
Size
... ... @@ -1,0 +1,1 @@
1 +9.1 KB
Content
image-20220527111300-14.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Xiaoling
Size
... ... @@ -1,0 +1,1 @@
1 +28.6 KB
Content
Copyright ©2010-2022 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0