It really is amazing how much computer games have evolved and how simple yet entertaining they were when they first came out. It was hard not to grin when I saw some of the games I totally forgot about. With a few safeguards in place, I got down to sampling some of the games I remember having as a kid. Things can turn into a house party if I go off to sleep, work, or on vacation. These devices have so many facets and hidden features, I simply can not trust what they will do without me keeping a watchful eye and controlling resource access. The RetroPie seems like a harmless devices, but it along with other devices on my home network get classified as untrusted. I was also pleased with the ability to set a firewall policy on the RetroPie so it would not communicate with anything. Once Webmin was installed I noticed that the RetroPie had a whopping 160 plus updates to run. sudo apt-get install perl libnet-ssleay-perl openssl libauthen-pam-perl libpam-runtime libio-pty-perl apt-show-versions python Here are the commands I ran from my SSH connection to the RetroPie. The defaults should be noted, so don’t connect your RetroPie directly to the internet. Out of the box it supports SMB and SSH as ways to transfer files. So I decided to install Webmin on it so I get a better view of the overall system. One of the things that I noticed was that the distro that RetroPie ran on was Debian. He provides a step by step that still works as of this writing, you can find it here It runs on a Raspberry Pi and provides an all inclusive interface to run the various console platforms. We need to go to the address bar and edit " to " and we will get our connection back.Peter Carcione made a youtube clip last year about Game Wizard’s adaptation of RetroPie, a game console emulator that plays video games from the early days of gaming. In the next screen, we choose the "No" button next to "Enable SSL?". Then on the "Webmin Configuration" screen, we select "SSL Encryption". We will also drop the SSL, since we get that from the tunnel. (how to make these changes should be another instructable).Īt this point we will just show how to set up the tunnel and to turn off external access to Webmin. If an attacker were to discover the second port, it is highly unlikely that they can discover the 256 byte (or greater) key. One can also use signed key access on the obscure port to make it even more difficult. It can be configured so that it appears to an attacker as a legitimate port and they can be occupied trying to break in there. One can further improve security by changing the SSH port to some obscure port number and setting up port 22 to act like a dummy port that does not allow logins. One can turn off external access to the Webmin port and only accept connections from inside the device through an SSH connection. Using tunneled connections greatly improves security for devices with interfaces directly on the Internet. The ports being used are not visible on any external interfaces. These are connections that go through the SSH connection and appear to come from the inside of the Raspberry Pi and the client computer. By trying to connect as shown in the following step we can determine that 192.168.5.73 is the device we want. Note in the image that we have devices at 192.168.5.73 and 192.168.5.101 that have port 22 open (Note is it easier to look for "closed: 0"). One can also open a command window and use the "ipconfig" command. This will show the assigned IP address and the subnet mask. Then we can click "Status" and then the "Details." button. In Windows we can go to the network connections and right mouse click on the connection to the subnet (Ethernet or wireless). If we are not sure of the subnet, there are several ways to find out what it is. I use Advanced Port ScannerĪs shown in the image, we can set it to scan port 22 at all the addresses in the subnet. A simple way to find the address is with a port scanner. We can't always access the DHCP server and even if we can, it can be complicated. If we have access to the DHCP server, we can look at the lease table to find the assigned address. There are a number of ways to discover the Raspberry Pi's address. To get connected with Putty one needs to know the IP address and port number of the Raspberry Pi.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |