Difference between revisions of "OpenSSH Install"

From WebOS Internals
Jump to navigation Jump to search
m
(since this page is deprecated, redirecting to Application:OpenSSH)
 
(4 intermediate revisions by 2 users not shown)
Line 1: Line 1:
==Install OpenSSH==
+
#REDIRECT [[Application:OpenSSH]]
<pre><nowiki>
 
ipkg-opt install openssh
 
</nowiki></pre>
 
Note that the default configuration of OpenSSH does '''not''' enable SFTP.  Since SCP just uses basic SSH, that works.
 
 
 
==Kill the OpenSSH daemon automatically started by ipkg==
 
<pre><nowiki>
 
killall sshd
 
</nowiki></pre>
 
 
 
==Mount the file system as readwrite==
 
<pre><nowiki>
 
mount -o remount,rw /
 
</nowiki></pre>
 
 
 
==Install an upstart event for the OpenSSH daemon==
 
<pre><nowiki>
 
cd /etc/event.d/
 
wget http://gitorious.org/webos-internals/bootstrap/blobs/raw/master/etc/event.d/optware-openssh
 
</nowiki></pre>
 
 
 
==[Optional step]  Connecting to your pre over 3G (EVDO, UMTS) or WiFi==
 
Generally, most seem to think that's a bad idea.
 
Take a look at the script /etc/event.d/optware-openssh. Notice that it automatically modifies the firewalls rules to enable incoming SSH on port 222 over WiFi (interface eth0) connections only. Follow the directions in the script to enable SSH on all interfaces (including your 3G interface), if you wish.
 
 
 
Look at the script starting openssh:
 
<pre><nowiki>cat /etc/event.d/optware-openssh</nowiki></pre>
 
 
 
==Start the OpenSSH daemon for testing==
 
<pre><nowiki>
 
initctl start optware-openssh
 
</nowiki></pre>
 
 
 
==Obtain the IP address of your Pre==
 
Look for the "inet addr://Your.IP.Address//" to get the ip address for your WIFI connection:
 
<pre><nowiki>
 
ifconfig eth0
 
</nowiki></pre>
 
 
 
To get the ip address for your 3G (EVDO, UMTS) connection:
 
<pre><nowiki>
 
ifconfig ppp0
 
</nowiki></pre>
 
 
 
Alternatively, you can install the Preware application "What is my IP?" for a convenient GUI to lookup IPs on all your interfaces.
 
==Test your SSH installation==
 
'''DO NOT CLOSE YOUR TELNET SESSION YET.  DO THIS IN A NEW WINDOW ''' From a remote system SSH to your Pre using //your// username and port 222. For example, from a Linux desktop you would run.
 
<pre><nowiki>
 
ssh -p 222 PRE-USERNAME@YOUR-PRE-IP-ADDR
 
</nowiki></pre>
 
From a Windows desktop we recommend using [http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY].
 
 
 
Logout when done with "exit".
 
 
 
==Remount the file system as readonly==
 
<pre><nowiki>
 
mount -o remount,ro /
 
</nowiki></pre>
 
 
 
==Reboot your device==
 
reboot
 
Confirm that you can still access it after it boots using SSH.
 
 
 
==Once you are able to ssh in, disable dev mode.==
 
Dev Mode enabled opens the firewall up -- not a safe position to be in.  Unless you mess up and NEED to telnet or novacom in again, keep dev mode off.
 
 
 
= Return to the [[Next_steps | Next Steps ]] page.=
 
 
 
= Credits:=
 
* Upstart Dropbear script and general cleanup from [http://blogs.gurulabs.com/dax/ Dax Kelson]
 
* Sudo recipe from greg963 at Precentral.net
 
* Original SSH process is based on dreadchicken's work
 
* Sargun for the original Telnet process
 
* zinge for validation of the process
 
 
 
= See also=
 
* http://www.nslu2-linux.org/wiki/Optware/HomePage
 
* [[optware-cross-compilation | Optware Cross Compilation]]
 

Latest revision as of 14:08, 25 July 2011