<
From version < 2.3 >
edited by Xiaoling
on 2022/05/12 14:15
To version < 3.1 >
edited by Xiaoling
on 2022/05/27 10:23
>
Change comment: Uploaded new attachment "image-20220527102348-1.png", version {1}

Summary

Details

Page properties
Content
... ... @@ -7,10 +7,10 @@
7 7  
8 8  Remote.it for remote access is available in the latest Dragino firmware for gateway. For security concern, the remote.it only available base on end user demand.
9 9  
10 -(% class="mark" %)**Important Notice:**
10 +(% style="color:red" %)**Important Notice:**
11 11  
12 -* (% class="mark" %)**Remote.it access will give full control of your device to remote support.**
13 -* (% class="mark" %)**The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**
12 +(% style="color:red" %)* **Remote.it access will give full control of your device to remote support.**
13 +~* **The Remote.it allow Dragino Support to remote access to the device, If user want to access himself, it need to sign up for an remote.it account.**
14 14  
15 15  For how to use remoteit, please see : [[Remoteit user instruction for Dragino Gateway>>url:https://www.dragino.com/downloads/index.php?dir=LoRa_Gateway/&file=Dragino-Remoteit_User_Manual.pdf]].
16 16  
... ... @@ -19,10 +19,10 @@
19 19  
20 20  Reverse SSH for remote access is available in the latest Dragino firmware for gateway. For security concern, the RSSH only available base on end user demand.
21 21  
22 -(% class="mark" %)**Important Notice:**
22 +(% style="color:red" %)**Important Notice:**
23 23  
24 -* (% class="mark" %)**RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
25 -* (% class="mark" %)**This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
24 +(% style="color:red" %)* **RSSH access will give full control of your device to remote support. Please remove sensitivity info before perform this**
25 +~* **This RSSH allow Dragino Support to remote access to the device, If user want to access himself, he need to set up the RSSH server himself.**
26 26  
27 27  Below gateway support reverse SSH access:
28 28  
... ... @@ -70,36 +70,46 @@
70 70  1. Give a free port to the user and ask them to configure RSSH page in the gateway.
71 71  1. In your server or other machine, you will able to access to the end user device by below command:
72 72  
73 -{{{ $ ssh -p <End User Host Port> root@<Host Address>
74 -}}}
73 +(% class="box" %)
74 +(((
75 +$ ssh   -p <End User Host Port>   root@<Host Address>
76 +)))
75 75  
78 +(((
76 76  (% class="mark" %)**Remote RSSH Access allow the gateway to connect to SSH server as well. This will create risk to the RSSH server. Please make sure the account use for Gateway Access has the lowest access right.**
80 +)))
77 77  
78 78  
79 79  ==== 2.1.2.1 Note for set up RSSH server ====
80 80  
81 -* If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port.
85 +If gateway reboot or the connection is incidentely close by end node. The port in SSH server will still be occupy for a long time. Administrator can use below commands to release the port.
82 82  
83 -{{{[root@iZt4n22vqvm7ajogrfiif6Z ~]# lsof -i :9102 --> check the port 9102 process status (change 9102 to the actually port for your gateway.
84 -COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
85 -sshd 21430 sshuser 15u IPv4 47567059 0t0 TCP localhost:bacula-fd (LISTEN)
86 -[root@iZt4n22vqvm7ajogrfiif6Z ~]# kill 21430 --> Kill PID of this process.
87 -[root@iZt4n22vqvm7ajogrfiif6Z ~]# lsof -i :9102
88 -[root@iZt4n22vqvm7ajogrfiif6Z ~]#
89 -}}}
87 +(% class="box" %)
88 +(((
89 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102 ~-~-> check the port 9102 process status (change 9102 to the actually port for your gateway.
90 +COMMAND   PID    USER   FD   TYPE   DEVICE SIZE/OFF NODE NAME
91 +sshd    21430 sshuser   15u  IPv4 47567059      0t0  TCP localhost:bacula-fd (LISTEN)
92 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# kill 21430   ~-~-> Kill PID of this process.
93 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]# lsof -i :9102        
94 +[root@iZt4n22vqvm7ajogrfiif6Z ~~]#
95 +)))
90 90  
97 +
91 91  == 2.2 For Firmware Version higher than lgw~-~-build-v5.4.1618196981-20210412-1111 ==
92 92  
93 93  Below gateway support reverse SSH access:
94 94  
95 -{{{ Firmware Version >lgw--build-v5.4.1618196981-20210412-1111 Firmware Download
96 - LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
97 - LG02, OLG02
98 - LG308, DLOS8
99 - LPS8
100 - LIG16
101 -}}}
102 +(% class="box" %)
103 +(((
104 +Firmware Version >lgw~-~-build-v5.4.1618196981-20210412-1111 Firmware Download
105 +LG01N, OLG01N (Note: LG01-P LG01-S doesn't support)
106 +LG02, OLG02
107 +LG308, DLOS8
108 +LPS8
109 +LIG16
110 +)))
102 102  
112 +
103 103  === 2.2.1 End User Guide to use SSH access ===
104 104  
105 105  ==== 2.2.1.1 Install the SSH service for server ====
... ... @@ -112,6 +112,7 @@
112 112  
113 113  git clone rssh-server
114 114  
125 +
115 115  2).cd rssh-server; sudo make ~-~--> to Generate the execute file:rssh_serv
116 116  
117 117  [[image:https://wiki.dragino.com/images/thumb/e/e3/Generate_the_execute_file.png/500px-Generate_the_execute_file.png||height="103" width="500"]]
... ... @@ -120,21 +120,27 @@
120 120  
121 121  **Debug** :
122 122  
123 -{{{ if you git fail. --> sudo: git: command not found.
124 - please install git. --> yum install git -y or apt-get install git -y.
125 -}}}
134 +(% class="box" %)
135 +(((
136 +if you git fail.  ~-~->    (% class="mark" %)**sudo: git: command not found.**(%%)
137 +please install git.  ~-~->    (% class="mark" %)**yum install git -y  or  apt-get install git -y. **
138 +)))
126 126  
127 -{{{ if you make error 127,it lack of gcc.
128 - please install gcc. -->yum install gcc.
129 -}}}
140 +(% class="box" %)
141 +(((
142 +if you make error 127,it** (% class="mark" %)lack of gcc.(%%)**
143 +please install gcc.    ~-~->(% class="mark" %)**yum install gcc.**
144 +)))
130 130  
131 131  [[image:https://wiki.dragino.com/images/d/d7/Lack_of_gcc.png||height="174" width="434"]]
132 132  
133 133  lack of gcc
134 134  
135 -{{{ if you make a fatal error : sqlite3.h,it lack of sqlite3.
136 - please insatell sqlite3.
137 -}}}
150 +(% class="box" %)
151 +(((
152 +if you make a fatal error : sqlite3.h,it (% class="mark" %)**lack of sqlite3.**(%%)
153 +please insatell **sqlite3**.
154 +)))
138 138  
139 139  [[image:https://wiki.dragino.com/images/thumb/9/93/Lack_of_sqlite3.png/500px-Lack_of_sqlite3.png||height="137" width="500"]]
140 140  
... ... @@ -142,25 +142,28 @@
142 142  
143 143  How to install Sqlit3
144 144  
145 -{{{ Step1:Download the SQLit3 installation package
146 - sudo wget
147 - Step2:tar the SQLit3 installation package
162 +(% class="box" %)
163 +(((
164 +Step1: Download the SQLit3 installation package
165 + sudo wget [[https:~~/~~/www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz>>url:https://www.sqlite.org/2021/sqlite-autoconf-3350400.tar.gz]]
166 +Step2: tar the SQLit3 installation package
148 148   sudo tar -zxvf sqlite-autoconf-3350300.tar.gz
149 - Step3:Generate the makefile
168 +Step3: Generate the makefile
150 150   cd sqlite-autoconf-3350300/;./configure
151 - Step4:Compile makefile
170 +Step4: Compile makefile
152 152   sudo make
153 - Step5:Install makefile
172 +Step5: Install makefile
154 154   sudo make install
155 - Check:
156 - cd /usr/local/bin;ls -al --> Check to see if there is a file for sqlite3
157 - cd sqlite-autoconf-3350300/;./sqlite3 test.db --> Test whether the sqlite3 was installed successfully
158 - debug:
174 +Check:
175 + cd /usr/local/bin;ls -al                             ~-~->    Check to see if there is a file for sqlite3
176 + cd sqlite-autoconf-3350300/;./sqlite3 test.db        ~-~->    Test whether the sqlite3 was installed successfully
177 +debug:
159 159   If you get the imformation that is SQLite header and source version mismatch, when you execute./sqlite3 test.db.
160 160   Please execute the command /sbin/ldconfig.
161 161   After that execute the command ./sqlite3 test.db again.
162 -}}}
181 +)))
163 163  
183 +
164 164  ===== 2.2.1.1.2 Step 2 :Install and run the RSS service =====
165 165  
166 166  1):intall database for /var/rsshdb.sqlite3 and Server development port for 3721(The default is 3721)
... ... @@ -167,10 +167,12 @@
167 167  
168 168  user must enter the root account and run the following commands
169 169  
170 -{{{ $ ./create_sqlite3_db.sh
171 - $ ./rssh_serv -p 3721 2>&1 &
172 - $ ps -ef | grep rssh_serv check 3721 port
173 -}}}
190 +(% class="box" %)
191 +(((
192 + $ ./create_sqlite3_db.sh
193 + $ ./rssh_serv -p  3721 2>&1 &
194 + $ ps -ef | grep rssh_serv check 3721 port
195 +)))
174 174  
175 175  [[image:https://wiki.dragino.com/images/thumb/c/cb/Intall_database_and_server_development_port.png/500px-Intall_database_and_server_development_port.png||height="70" width="500"]]
176 176  
... ... @@ -178,40 +178,47 @@
178 178  
179 179  **Debug:**
180 180  
181 -{{{ Check /var/rsshdb.sqlite3 --> ls /var/rsshdb.sqlite3
182 - Check ls /var/rsshdb.sqlite3 --> sudo chmod 777 rssh_serv
183 -}}}
203 +(% class="box" %)
204 +(((
205 +Check /var/rsshdb.sqlite3 ~-~->(% class="mark" %)** ls /var/rsshdb.sqlite3**(%%)
206 +Check ls /var/rsshdb.sqlite3 ~-~-> (% class="mark" %)**sudo chmod 777 rssh_serv**
207 +)))
184 184  
185 -{{{ if fail to open dpvlry or to bind to it
186 - please kill rssh_serv,and run ./rssh_serv -p 3721 2>&1 & again
187 -}}}
209 +(% class="box" %)
210 +(((
211 +if** fail to open dpvlry or to bind to it**
212 +please kill rssh_serv,and run (% class="mark" %)** ./rssh_serv -p  3721 2>&1 &** (%%) again
213 +)))
188 188  
215 +
189 189  ===== 2.2.1.1.3 Step 3 :Create a minimal SSH user (reverse SSH proxy for the gateway) =====
190 190  
191 -1):sudo useradd XXXXX (custom user name)
218 +1):(% class="mark" %)**sudo useradd XXXXX**(%%) (custom user name)
192 192  
193 -2):sudo passwd xxxxxx
220 +2):(% class="mark" %)**sudo passwd xxxxxx**
194 194  
195 -3):cp /bin/bash /bin/rbash
222 +3):(% class="mark" %)**cp /bin/bash /bin/rbash**
196 196  
197 -4):sudo nano /etc/passwd ~-~-> Change /bin/bash to /bin/rbash
224 +4):(% class="mark" %)**sudo nano /etc/passwd**(%%) ~-~-> Change /bin/bash to /bin/rbash
198 198  
199 -5):sudo nano /home/xxxxx/.bashrc **empty it,and input export PATH=$HOME/bin**
226 +5):(% class="mark" %)**sudo nano /home/xxxxx/.bashrc**(%%) **empty it,and input export PATH=$HOME/bin**
200 200  
201 -6):sudo nano /home/xxxxx/.bash_profile **empty it,and input export PATH=$HOME/bin**
228 +6):(% class="mark" %)**sudo nano /home/xxxxx/.bash_profile**(%%) **empty it,and input export PATH=$HOME/bin**
202 202  
203 203  **Now user "XXXXX" is the user with limited permissions of the current system**
204 204  
232 +
205 205  === 2.2.2 How does user get the gateway to connect to a user's private server ===
206 206  
207 207  ===== 2.2.2.1 Step1: Come bace the gateway web UI for get the gateway Public key =====
208 208  
209 -1)in the system ~-~-> Remote Mgmt/span>
237 +1)in the system ~-~-> (% class="mark" %)**Remote Mgmt/span>**
210 210  
211 211  [[image:https://wiki.dragino.com/images/thumb/8/8f/Remote_Mgmt.png/500px-Remote_Mgmt.png||height="367" width="500"]]
212 212  
213 213  Remote Mgmt
214 214  
243 +
215 215  ===== 2.2.2.2 Step2: Authorization server =====
216 216  
217 217  copy the Gateway Publickey into user's private server "/home/XXXXX/.ssh/authorized_keys" file.
... ... @@ -220,6 +220,7 @@
220 220  
221 221  Publickey
222 222  
252 +
223 223  ===== 2.2.2.3 Step3: connecte private server =====
224 224  
225 225  in the gateway web UI
... ... @@ -228,14 +228,17 @@
228 228  
229 229  gateway web UI
230 230  
231 -{{{Connection Type : If user's least privileged user with private server uses a password, select Public Key
232 -Note:if user's least privileged user no uses a password,choose from both is fine
233 -Login ID : Input user name "eg : "XXXXX"
234 -Host Address : Input user's private server address
235 -Connect at Startupt: : Choose to enable connect once device is powered.
261 +(% class="box" %)
262 +(((
263 +(% class="mark" %)**Connection Type **(%%) : If user's least privileged user with private server uses a password, select (% class="mark" %)**Public Key**(%%)
264 +**Note:if user's least privileged user no uses a password,choose from both is fine**
265 +(% class="mark" %)**Login ID**(%%)             : Input user name "eg : "XXXXX"
266 +(% class="mark" %)**Host Address**(%%)         : Input user's private server address
267 +(% class="mark" %)**Connect at Startupt**(%%): Choose to enable connect once device is powered.
236 236  Click Save and then Connect
237 -}}}
269 +)))
238 238  
271 +
239 239  ===== 2.2.2.4 Step 4 :Cheak is fine =====
240 240  
241 241  Rssh Host connection Ok
... ... @@ -244,9 +244,10 @@
244 244  
245 245  Rssh Host connection Ok
246 246  
280 +
247 247  user can use common ps | grep ssh to check it in the gateway.
248 248  
249 -[[image:https://wiki.dragino.com/images/thumb/a/ad/Check_the_gateway.png/500px-Check_the_gateway.png||height="47" width="500"]]
283 +[[image:https://wiki.dragino.com/images/thumb/a/ad/Check_the_gateway.png/500px-Check_the_gateway.png]]
250 250  
251 251  Check the gateway
252 252  
... ... @@ -257,8 +257,10 @@
257 257  
258 258  **Debug:**
259 259  
260 -{{{ check: sudo ls /home/xxxxx/.ssh/authorizedkey
261 -}}}
294 +(% class="box" %)
295 +(((
296 + check: sudo ls /home/xxxxx/.ssh/authorizedkey
297 +)))
262 262  
263 263  === 2.2.3 How to Ser up a Reverse SSH access ===
264 264  
... ... @@ -268,11 +268,11 @@
268 268  
269 269  Loging server
270 270  
307 +
271 271  ==== 2.2.3.2 Step2:access the gateway ====
272 272  
273 273  $ cd rssh-server/
274 274  
275 -
276 276  Check the gateway linking to the server $ ./connect-gw.sh -l
277 277  
278 278  [[image:https://wiki.dragino.com/images/thumb/e/ee/Check_gateway_link_server.png/500px-Check_gateway_link_server.png||height="157" width="500"]]
image-20220527102348-1.png
Author
... ... @@ -1,0 +1,1 @@
1 +XWiki.Xiaoling
Size
... ... @@ -1,0 +1,1 @@
1 +52.6 KB
Content
Copyright ©2010-2024 Dragino Technology Co., LTD. All rights reserved
Dragino Wiki v2.0