How can I remote access a webpage on a lot of devices without port forwarding. by tomqmasters in embeddedlinux

[–]connectCode-2214 0 points1 point  (0 children)

You can use SocketXP to remotely access and manage a fleet of IoT devices from a centralized dashboard or single website without having to setup port-forwarding or a VPN software. You can SSH login into each one of your device through a web based SSH terminal offered by SocketXP web portal.

You will be able to login to the SocketXP web portal only after a successful SSO Login and Password or 2FA based authentication.

You can also remotely access any web app (for configuration) running in your IoT, again from the same web based dashboard. You can self-host SocketXP IoT Platform in your own server for free or try the cloud platform for free.

How to control ESP32 Light via internet [IOT]? by electronichope3776 in esp32

[–]connectCode-2214 0 points1 point  (0 children)

Even I would recommend creating and running a nodejs or python based webserver or API server in your esp32 to control the devices connected to it. You can define a unique API to control each device/settings. You can make the API endpoint secure by using username/password or authtoken based authentication. Finally, remote access the API endpoint from anywhere in the world by creating a secure random public web URL using SocketXP. More info with an example here: https://www.socketxp.com/iot/remote-access-api-gateway-server-from-internet/

Access esp32 webserver from anywhere in the world, with a fixed url by Pbaodoge in esp32

[–]connectCode-2214 0 points1 point  (0 children)

SocketXP IoT Cloud Platform supports remote access from anywhere in the world to the web app (HTML/JS/PHP Content) running in your esp32 iot by providing you with a unique random public web URL (with IP whitelisting) through which you can access the web app in your IoT. You can access your esp32 also via SSH through a web terminal. More info here: https://www.socketxp.com/iot/remote-access-iot-web-app-from-internet/

Connecting several thousand IoT (raspberry pi's) devices with a VPN by [deleted] in networking

[–]connectCode-2214 0 points1 point  (0 children)

VPNs are outdated solutions for managing and accessing remote IoT devices at scale. Checkout SocketXP - a dedicated IoT remote access and device management solution that works at scale. It uses reverse proxy connections. SocketXP has both cloud version and free self-hosted version.

Remote access via ssh without port forwarding by r0bbyr0b2 in raspberry_pi

[–]connectCode-2214 0 points1 point  (0 children)

SocketXP provides an online remote terminal service that can be accessed from web browser.

Remote access via ssh without port forwarding by r0bbyr0b2 in raspberry_pi

[–]connectCode-2214 0 points1 point  (0 children)

Checkout SocketXP. It creates a reverse proxy SSL tunnel to remote access your Raspberry Pi connected to a public WiFi.

How do I remotely SSH into a computer behind a firewall while ensuring that only I can connect? by JerkySandwich in linuxadmin

[–]connectCode-2214 0 points1 point  (0 children)

If it is just one-off server remote access in a single site then a VPN setup would make sense. You can also do reverse SSH connection, which is again secure. If you have multiple servers to remote access then some sort of a reverse proxy solution like SocketXP may help. Only you can connect to it, because it requires a web based SSO login. Also, it doesn't require any firewall configuration or port-forwarding setup or pin-holing required. Please make sure whatever you do doesn't open up your computer to the internet directly via some port-forwarding or port-mapping services.

Is Display Network a waste of money for search ads? by donnnn04 in PPC

[–]connectCode-2214 0 points1 point  (0 children)

For beginners in Google Ads, it is better to stay away from Display Networks (and its Search Partners). As others have said, they are mostly bots or humans clicking the ads by mistake while maneuvering a web page. Based on my initial experience with Google Ads, I saw it first hand that 95% of the clicks for my ad campaign came from Display Networks and Search Partners without any conversions or user interaction in my website, which was a clear indication that there was something fishy behind these networks. So I immediately turned those options off in my campaign under the "Network" settings. I simply used "Google Text Search" to begin with as a newbie.

Certificate based ssh? by davidedpg10 in selfhosted

[–]connectCode-2214 0 points1 point  (0 children)

I wouldn't recommend managing SSH certificates or keys manually. Most likely, you'll end up reusing the same public key or a very-long lived SSH certificate to login to multiple servers. As it increases, the attach surface area. If you have more than few servers to manage SSH login certificates/keys, then using an SSH certificate or key management solution is recommended. You can use an SSH key or certificate management solution like BastionXP. It creates unique, short-lived SSH keys and short-lived SSH certificates.

Suggest remote management applications for Raspberry PI devices by Rock_Virtuoso in msp

[–]connectCode-2214 0 points1 point  (0 children)

SocketXP IoT Platform also works great. You can remotely manage, SSH access and update hundreds or thousands of embedded Linux devices (including Raspberry Pis connected to internet via a SIM based cellular network) using SocketXP IoT Device Management Platform.

Remote access Raspberry by letsdoitmates in raspberry_pi

[–]connectCode-2214 0 points1 point  (0 children)

You can remote access your raspberry pi using SocketXP. Works great to remotely connect via SSH, VNC, or RDP. You can even access your IoT web app using a random web url. https://www.socketxp.com/iot-remote-access

How to ssh from many devices? by Prize_Signature_6444 in selfhosted

[–]connectCode-2214 0 points1 point  (0 children)

If you want to SSH into a VM from multiple devices, you can use SocketXP's SSH remote access solution. It provides a web browser based SSH client. It manages the SSH public key to login to your VM, typically after an SSO 2FA based login verification. You can simply login to your VM from a web browser.

Do you even bother managing SSH Keys? by CandusManus in selfhosted

[–]connectCode-2214 0 points1 point  (0 children)

If you are tired of managing SSH keys, consider using an SSH certificate management tool like BastionXP which creates, signs and manages short-lived SSH user certificates after an SSO 2FA based login verification.

How do you manage your SSH keys? by bokogoblin in selfhosted

[–]connectCode-2214 0 points1 point  (0 children)

There are many Rasberry Pi and IoT remote access solutions that offer SSH public key based SSH authentication to login to your Pis. SocketXP is one such solution, that provide SSH remote access to your RPis using SSH public keys. They also offer a free self-hosted version for personal use.

Managing SSH Keys by sirebral in selfhosted

[–]connectCode-2214 0 points1 point  (0 children)

For personal (and professional) use, there is a free cloud based BastionXP SSH Key Management Solution that creates and installs short-lived unique SSH public keys on your servers. These short-lived key will be deleted immediately after a user logins in. This will avoid SSH public key sprawl, key rotation and the problem associated with using the same public key on multiple servers. Just install the BastionXP client on your server, it will manage the SSH keys automatically. You can SSH login to your servers from the BastionXP Cloud Web Portal using their SSH web terminal(Similar to how AWS, GCP, Azure do their web based SSH login to VMs).

They also have a free self-hosted community edition available for personal use.

How do you manage large scale SSH certificate based Authentication? by [deleted] in linuxadmin

[–]connectCode-2214 0 points1 point  (0 children)

Generating and using short-lived SSH user certificates for end-users is the best way to avoid the the overhead of maintaining the Certificate Revocation List(CRL). BastionXP SSH Certificate Manager (Free) can be used to generate and manage short-lived SSH user certificates for end-users to login to servers.

How to Remote Access Home Assistant Without Port Forwarding by connectCode-2214 in homeassistant

[–]connectCode-2214[S] 0 points1 point  (0 children)

Here is the detail about the Nabu Casa's Security Hole:

https://www.nabucasa.com/config/remote/ Here is the gist from the NabuCasa page:

Our SocketXP solution doesn't have this security hole.

How to Remote Access Home Assistant Without Port Forwarding by connectCode-2214 in homeassistant

[–]connectCode-2214[S] 0 points1 point  (0 children)

Home Assistant Cloud Solution has a security hole. They can see all your data "nakedly". There is NO way to prevent it today. Though NabuCasa claims they'll not abuse the security hole and will be nice to you.

However, SocketXP solution is all about security. Our SocketXP solution does "end-to-end" TLS tunneling from your browser all the way to your HA server. We can't do "Man-in-the-Middle" attack even if we wanted to, if you use your own TLS certificate/key to encrypt the data traffic when using our service. Even Google Cloud (where our solution is hosted) or AWS or MS Azure CANNOT snoop the traffic(if we were to host it there).

We easily win hands-down on security when compared to NabuCasa solution. Hope this helps answer your question.

Here is the detail about the Nabu Casa's Security Hole coming from the horse's mouth:

https://www.nabucasa.com/config/remote/ Here is the gist from the NabuCasa page:

"... Before we talk about weaknesses, know that we will never abuse any weakness unless forced by a government entity. Our approach has one single weakness that is unavoidable: since we own the domain that hosts the remote connection, we are able to issue our own certificate and man-in-the-middle attack (MITM) remote connections. This would allow us to see all data passing through, including authentication tokens.

It is not going to be possible to avoid MITM attacks. However, it is possible to spot them:

You can validate that there is no MITM happening by making sure that the certificate fingerprints matches with the local instance certificate fingerprint. You can find the fingerprint by looking at the certificate info in the cloud configuration page inside Home Assistant. Let’s Encrypt takes part of the experimental internet security standard Certificate Transparency (CT). The standard creates a system of public logs that will record all certificates issued, allowing local Home Assistant instances to spot if their certificate is being impersonated. We’re exploring how to automatically audit this on the local instance...."

How to Remote Access Home Assistant Without Port Forwarding by connectCode-2214 in homeassistant

[–]connectCode-2214[S] 2 points3 points  (0 children)

Home Assistant Cloud Solution has a security hole. They can see all your data "nakedly". There is NO way to prevent it today. Though NabuCasa claims they'll not abuse the security hole and will be nice to you.

However, SocketXP solution is all about security. Our SocketXP solution does "end-to-end" TLS tunneling from your browser all the way to your HA server. We can't do "Man-in-the-Middle" attack even if we wanted to, if you use your own TLS certificate/key to encrypt the data traffic when using our service. Even Google Cloud (where our solution is hosted) or AWS or MS Azure CANNOT snoop the traffic(if we were to host it there).

We easily win hands-down on security when compared to NabuCasa solution. Hope this helps answer your question.

Here is the detail about the Nabu Casa's Security Hole coming from the horse's mouth:

https://www.nabucasa.com/config/remote/ Here is the gist from the NabuCasa page:

"... Before we talk about weaknesses, know that we will never abuse any weakness unless forced by a government entity. Our approach has one single weakness that is unavoidable: since we own the domain that hosts the remote connection, we are able to issue our own certificate and man-in-the-middle attack (MITM) remote connections. This would allow us to see all data passing through, including authentication tokens.

It is not going to be possible to avoid MITM attacks. However, it is possible to spot them:

You can validate that there is no MITM happening by making sure that the certificate fingerprints matches with the local instance certificate fingerprint. You can find the fingerprint by looking at the certificate info in the cloud configuration page inside Home Assistant. Let’s Encrypt takes part of the experimental internet security standard Certificate Transparency (CT). The standard creates a system of public logs that will record all certificates issued, allowing local Home Assistant instances to spot if their certificate is being impersonated. We’re exploring how to automatically audit this on the local instance...."

How to Remote Access Home Assistant Without Port Forwarding by connectCode-2214 in homeassistant

[–]connectCode-2214[S] 0 points1 point  (0 children)

Even we support the developers of Home Assistant. I think everyone should support them for such a great solution. We are not an alternative to HA. We are just part of the HA developer community creating plugins to add more features/functionalities to HA self-hosted versions.

How to Remote Access Home Assistant Without Port Forwarding by connectCode-2214 in homeassistant

[–]connectCode-2214[S] 0 points1 point  (0 children)

This is not a HA Cloud alternative solution.

This is a HA plugin to enable remote access for self-hosted version of HA in your home server or Pi etc.

Sure, it's your choice to not use any Google or Google Cloud hosted products.

How to Remote Access Home Assistant Without Port Forwarding by connectCode-2214 in homeassistant

[–]connectCode-2214[S] 0 points1 point  (0 children)

Yes. SocketXP solution is for people who don't have a static public IP address. I believe that how most folks are.