![]() We will not be using a password login to access the router from afar, we will be using a key pair.Ĭonfiguring Your Browser to Connect to PuTTYĪt this point in the tutorial your server is up and running, your computer is connected to it, and only one step remains. You can change the remote port if you desire but the only benefit to doing so is that it marginally obfuscates the reason the port is open if anyone port scans you. There you need to check both Enable at Startup and Remote Access. Login to the web interface and the navigate to Administration –>SSH Daemon. Navigate to the web interface of your router, for our router-a Linksys WRT54G running Tomato-the address is. ![]() Open a web browser on a machine connected to your local network. Second, because you’re running your SSH server on your router (which likely consumes less power than a light bulb), you never have to leave your main computer on just for a lightweight SSH server. First, it used to be a huge pain to telnet into your router to manually install an SSH server and configure it. The moment somebody who speaks Mandarin Chinese comes in (the Wi-Fi sniffer) your pseudo-privacy is shattered.īoth Tomato and DD-WRT have built-in SSH servers. It’s as though you’re in a room filled with English-only speakers, talking into a phone speaking Mandarin Chinese. It’s so painfully easy that a motivated 12 year old with a laptop and a copy of Firesheep could snatch up your credentials for all manner of things. Anyone with a Wi-Fi device in the area can sniff your data. ![]() ![]() During the transmission from your computer to the greater internet your data is wide open. Data leaves your Wi-Fi modem, travels through the air unencrypted to the Wi-Fi node in the coffee shop, and then is passed on to the greater internet. Scenario one: You’re at a coffee shop using your laptop to browse the internet through their free Wi-Fi connection. Let’s lay out a couple different scenarios that involve you using the internet to illustrate the benefits of secure tunneling. You might be curious why you would even want to set up a secure tunnel from your devices to your home router and what benefits you would reap from such a project. ![]()
0 Comments
Leave a Reply. |