<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AB-WebLog.com&#187; router</title>
	<atom:link href="http://www.ab-weblog.com/en/tag/router/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.ab-weblog.com/en</link>
	<description>Andreas Breitschopp</description>
	<lastBuildDate>Wed, 18 Mar 2015 09:47:48 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.1</generator>
		<item>
		<title>Creating a Restricted SSH User for SSH Tunneling Only</title>
		<link>http://www.ab-weblog.com/en/creating-a-restricted-ssh-user-for-ssh-tunneling-only/</link>
		<comments>http://www.ab-weblog.com/en/creating-a-restricted-ssh-user-for-ssh-tunneling-only/#comments</comments>
		<pubDate>Sat, 11 Feb 2012 14:54:58 +0000</pubDate>
		<dc:creator>Andreas Breitschopp</dc:creator>
				<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[PATH]]></category>
		<category><![CDATA[rbash]]></category>
		<category><![CDATA[router]]></category>
		<category><![CDATA[shell]]></category>
		<category><![CDATA[SSH]]></category>
		<category><![CDATA[tunneling]]></category>
		<category><![CDATA[user]]></category>

		<guid isPermaLink="false">http://www.ab-weblog.com/en/?p=453</guid>
		<description><![CDATA[Sometimes it is necessary to use SSH tunneling to access a web service on a specific port that is blocked by a firewall or router. Of course, you could create just a new SSH user on your Linux server, but &#8230; <a href="http://www.ab-weblog.com/en/creating-a-restricted-ssh-user-for-ssh-tunneling-only/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p>Sometimes it is necessary to use SSH tunneling to access a web service on a specific port that is blocked by a firewall or router.</p>
<p>Of course, you could create just a new SSH user on your Linux server, but this user will be able to execute all server commands although they would not be necessary for SSH tunneling. In fact the only thing the user needs is to login and logout again – that&#8217;s enough! Therefore we don&#8217;t want the user to be able to do anything else for security reasons.</p>
<p>I will show in the following how you can create such a restricted SSH user on a Linux server (tested on Debian Linux) that can be used for SSH tunneling only.</p>
<p>First of all we create a new user (I just call him <code class="brush: bash; gutter: false">sshtunnel</code> now) with <code class="brush: bash; gutter: false">rbash</code> as shell:</p>
<pre class="brush: bash; gutter: true">useradd sshtunnel -m -d /home/sshtunnel -s /bin/rbash
passwd sshtunnel</pre>
<p>Using <code class="brush: bash; gutter: false">rbash</code> instead of <code class="brush: bash; gutter: false">bash</code> will restrict the user already as he especially cannot change the directory and cannot set any environment variables. But the user can still execute most of the bash commands.</p>
<p>To prevent him from this, we use a small trick: we set the environment variable <code class="brush: bash; gutter: false">PATH</code> for this user to nothing. This way the bash won&#8217;t find the commands to execute anymore. That&#8217;s easily done by adding this line to the end of the file <code class="brush: bash; gutter: false">.profile</code> in the home directory of the user (in our example it is <code class="brush: bash; gutter: false">/home/sshtunnel/</code>):</p>
<pre class="brush: bash; gutter: false">PATH=&quot;&quot;</pre>
<p>As we want to make sure the user is not able to change this again himself, we remove the write permissions from the user configuration files and from the home directory of the user itself:</p>
<pre class="brush: bash; gutter: true">chmod 555 /home/sshtunnel/
cd /home/sshtunnel/
chmod 444 .bash_logout .bashrc .profile</pre>
<p>Now we&#8217;re done: you can setup your SSH tunnel for example with PuTTY just as normal and login with this newly created SSH user. You won&#8217;t be able to do anything else than login and logout anymore, but SSH tunneling will work fine!</p>
<p><em>Did you also need such a restricted SSH user already?</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.ab-weblog.com/en/creating-a-restricted-ssh-user-for-ssh-tunneling-only/feed/</wfw:commentRss>
		<slash:comments>8</slash:comments>
		</item>
		<item>
		<title>Open Ports 135, 137 and 445 in AVM Fritz!Box Routers</title>
		<link>http://www.ab-weblog.com/en/open-ports-135-137-and-445-in-avm-fritzbox-routers/</link>
		<comments>http://www.ab-weblog.com/en/open-ports-135-137-and-445-in-avm-fritzbox-routers/#comments</comments>
		<pubDate>Wed, 11 Jan 2012 11:30:53 +0000</pubDate>
		<dc:creator>Andreas Breitschopp</dc:creator>
				<category><![CDATA[Miscellaneous]]></category>
		<category><![CDATA[AVM]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[Fritz!Box]]></category>
		<category><![CDATA[NetBIOS]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[router]]></category>
		<category><![CDATA[SMB]]></category>

		<guid isPermaLink="false">http://www.ab-weblog.com/en/?p=438</guid>
		<description><![CDATA[Few days ago I got a new fiber glass internet connection here which works perfectly. Together with the new connection type I also got a new free router from my local internet provider: an AVM Fritz!Box 7570 VDSL. First of &#8230; <a href="http://www.ab-weblog.com/en/open-ports-135-137-and-445-in-avm-fritzbox-routers/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p>Few days ago I got a new fiber glass internet connection here which works perfectly.</p>
<p>Together with the new connection type I also got a new free router from my local internet provider: an AVM Fritz!Box 7570 VDSL.</p>
<p>First of all I want to say that this is really a great product: it has a build-in VDSL modem, but also VoIP telecommunication ports (analog and ISDN), provides WLAN and even DECT for connecting your mobile phones.</p>
<p>I just had one problem: after this new router was up and running from within my network I could not access our web service operating on port 445 anymore. Thus no outgoing connection on port 445 was possible anymore.</p>
<p>Therefore I went to check the router settings, but could not find any option or at least a note about this port blocking. But searching the web afterwards turned out that I was not the only guy struggling with this issue.</p>
<p>Of course, port 445, the same as also the other mentioned ports 135 and 137, are normally reserved for NetBIOS respectively SMB communications which really would be a security issue if such services would be used outside of a secure local network. But anyway, even if a port number is normally used for a specific service, everybody is free to use it in a different way like us: We are using ports 444 and 445 for operating some internal SSL webpages as the default port 443 is already in use.</p>
<p>As I&#8217;m not the only one in my company using this internal SSL webpages and I definitely didn&#8217;t want to change our port usage just because of a new router, I needed to find a way to convince my Fritz!Box to allow outgoing connections on port 445.</p>
<p>After doing some research, I finally came up with following solution. Here is a step-by-step guide to get outgoing connections on ports 135, 137 and 445 working with an AVM Fritz!Box:</p>
<ol>
<li>save the settings of your Fritz!Box to a file (menu &#8220;System&#8221; / &#8220;Save Settings&#8221;).</li>
<li>open this file with a simple text editor.</li>
<li>replace all occurrences of <code>filter_netbios = yes;</code> with <code>filter_netbios = no;</code>. (If you have an older Fritz!Box model, the name of this config entry may be a little bit different. In this case just search for &#8220;netbios&#8221; and you should be able to find it easily.)</li>
<li>add a new line <code>NoChecks=yes</code> somewhere on the top of the config file (I added it below the line starting with <code>Language=</code>). Without this line import won&#8217;t work, because the Fritz!Box would reject to load a manually changed config file.</li>
<li>finally restore the setting by using your changed config file.</li>
</ol>
<p>That&#8217;s it! After your changed config file is loaded, the Fritz!Box will reboot and now outgoing traffic on ports 135, 137  and 445 works fine again.</p>
<p>Of course, I understand that it is useful to block ports with a potential security risk by default, but I absolutely don&#8217;t understand why AVM does not provide a way (somewhere in the advanced settings) to change this from within their user interface. A router should never patronize a user: if the user wants to use a specific port for whatever reason, this has to be possible with every router!</p>
<p><em>Does your router also block some ports without being asked for?</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.ab-weblog.com/en/open-ports-135-137-and-445-in-avm-fritzbox-routers/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
<!-- WP Super Cache is installed but broken. The path to wp-cache-phase1.php in wp-content/advanced-cache.php must be fixed! -->