All
I have 2 laptops I need to connect for testing / coding via ssh, if I connect each to the hotel wifi I cannot connect across laptops with ssh, If I grab a wifi router and connect it to the hotel wifi and use the router's wifi will this work?
would it also work with a simple wifi extender?
Thanks for any advice
On 3/22/24 11:09, Sbob wrote:
All
I have 2 laptops I need to connect for testing / coding via ssh, if I connect each to the hotel wifi I cannot connect across laptops with ssh, If I grab a wifi router and connect it to the hotel wifi and use the router's wifi will this work?
would it also work with a simple wifi extender?
Thanks for any advice
You will almost certainly not be able to connect between devices on a commercial wifi network. They don't want folks to attack other machines on the network. It would be a huge scandal if a hotel allowed a guest to connect to other guests' laptops.
If you want to connect between two laptops, I would just buy an ethernet cable (e.g. https://www.amazon.com/Amazon-Basics-Ethernet-Gold-Plated-Connectors/dp/B00N...) and configure one laptop with a static ethernet ip address of something like 172.31.101.1 and the other with 172.31.101.2. Add them to your /etc/hosts file like:
172.31.101.1 laptop1 172.31.101.2 laptop2
Then each of them would have wifi access out to the Internet, and they'd be able to ssh into each other using "ssh laptop1" or "ssh laptop2" for any connections between them.
It's a small pain, but it's a LOT easier than trying to circumvent security on commercial wifi networks (which can get you kicked off the network or even kicked out of the hotel or business).
Hope this helps!
Or...
You might talk with the front desk/data person. If a group came in for a meeting and wanted to do what you describe, they might have an additional solution for you to use!
Might be worth checking out.
good luck
On Fri, Mar 22, 2024 at 12:45 PM Thomas Cameron thomas.cameron@camerontech.com wrote:
On 3/22/24 11:09, Sbob wrote:
All
I have 2 laptops I need to connect for testing / coding via ssh, if I connect each to the hotel wifi I cannot connect across laptops with ssh, If I grab a wifi router and connect it to the hotel wifi and use the router's wifi will this work?
would it also work with a simple wifi extender?
Thanks for any advice
You will almost certainly not be able to connect between devices on a commercial wifi network. They don't want folks to attack other machines on the network. It would be a huge scandal if a hotel allowed a guest to connect to other guests' laptops.
If you want to connect between two laptops, I would just buy an ethernet cable (e.g. https://www.amazon.com/Amazon-Basics-Ethernet-Gold-Plated-Connectors/dp/B00N...) and configure one laptop with a static ethernet ip address of something like 172.31.101.1 and the other with 172.31.101.2. Add them to your /etc/hosts file like:
172.31.101.1 laptop1 172.31.101.2 laptop2
Then each of them would have wifi access out to the Internet, and they'd be able to ssh into each other using "ssh laptop1" or "ssh laptop2" for any connections between them.
It's a small pain, but it's a LOT easier than trying to circumvent security on commercial wifi networks (which can get you kicked off the network or even kicked out of the hotel or business).
Hope this helps!
-- Thomas -- _______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
On 3/22/24 12:24, bruce wrote:
Or...
You might talk with the front desk/data person. If a group came in for a meeting and wanted to do what you describe, they might have an additional solution for you to use!
Might be worth checking out.
good luck
That's a great point, but in my experience, trying to talk to the front desk about tech related issues is... challenging. ;-)
But Bruce is absolutely correct, they may be able to help you out, or give you the number for the helpdesk and see if they can help you out.
On 3/22/24 09:45, Thomas Cameron wrote:
If you want to connect between two laptops, I would just buy an ethernet cable (e.g. https://www.amazon.com/Amazon-Basics-Ethernet-Gold-Plated-Connectors/dp/B00N...) and configure one laptop with a static ethernet ip address of something like 172.31.101.1 and the other with 172.31.101.2. Add them to your /etc/hosts file like:
172.31.101.1 laptop1 172.31.101.2 laptop2
Then each of them would have wifi access out to the Internet, and they'd be able to ssh into each other using "ssh laptop1" or "ssh laptop2" for any connections between them.
It's a small pain, but it's a LOT easier than trying to circumvent security on commercial wifi networks (which can get you kicked off the network or even kicked out of the hotel or business).
The simpler option is to enable internet sharing on one of them, then the IP addresses are handled automatically.
On Fri, 2024-03-22 at 10:09 -0600, Sbob wrote:
All
I have 2 laptops I need to connect for testing / coding via ssh, if I connect each to the hotel wifi I cannot connect across laptops with ssh, If I grab a wifi router and connect it to the hotel wifi and use the router's wifi will this work?
would it also work with a simple wifi extender?
Thanks for any advice
I have, in the past, successfully gotten around firewalls that only allow http/https on tcp by setting the port for ssh to 80,8080,443 or 8443. I haven't tried it in a few years, though. I've heard that some systems can inspect packets well enough to discern ssh on port 80, but that never happened to me.
If the firewall is blocking 22 specifically and allowing other things than http/https, then you can change it to anything else.
If the firewall is not blocking 22 to the world, but only between machines behind the corporate wall, then you might be able to tunnel packets through a man in the middle offsite.
Finally, make sure it's not just a IPv4 vs IPv6 thing. I've seen a couple of routers that are set to IPv6 only. My laptop is set to use IPv4 only for ssh, and I had to change that.
billo
Once upon a time, Bill Oliver vendor@billoblog.com said:
On Fri, 2024-03-22 at 10:09 -0600, Sbob wrote:
All
I have 2 laptops I need to connect for testing / coding via ssh, if I connect each to the hotel wifi I cannot connect across laptops with ssh, If I grab a wifi router and connect it to the hotel wifi and use the router's wifi will this work?
would it also work with a simple wifi extender?
Thanks for any advice
I have, in the past, successfully gotten around firewalls that only allow http/https on tcp by setting the port for ssh to 80,8080,443 or 8443. I haven't tried it in a few years, though. I've heard that some systems can inspect packets well enough to discern ssh on port 80, but that never happened to me.
For a lot of "public" wifi networks, it's not even a firewall, it's that the access points are set to client isolation mode (so the AP only allows clients to talk to the gateway). It's basically an extra security layer on their part to keep customer A from causing problems for customer B.
So then you do need your own access point/router. On newer Android devices, you can re-share the wifi with hotspot mode, so don't need any additional equipment.
On 03/22/2024 12:02 PM, Bill Oliver wrote:
I have, in the past, successfully gotten around firewalls that only allow http/https on tcp by setting the port for ssh to 80,8080,443 or 8443.
And if I ever ran into one of those I'd be complaining loud and long and challenging their claims to providing "free WiFi." My laptops still get their email via POP3 and send it through SMTP, and blocking those ports would prevent me from using their so-called free WiFi. I'd bet that anybody who needed to use a VPN to get work done while on the road would soon learn not to use that chain at any time.
On Fri, 2024-03-22 at 13:10 -0500, Chris Adams wrote:
[snip]
For a lot of "public" wifi networks, it's not even a firewall, it's that the access points are set to client isolation mode (so the AP only allows clients to talk to the gateway). It's basically an extra security layer on their part to keep customer A from causing problems for customer B.
So then you do need your own access point/router. On newer Android devices, you can re-share the wifi with hotspot mode, so don't need any additional equipment. -- Chris Adams linux@cmadams.net --
Yikes. I just looked that up.
https://security.stackexchange.com/questions/16751/wireless-client-isolation...
https://medium.com/@dd.identity/wireless-guest-network-client-isolation-unde...
Not something I could get around sitting in a hotel room. The solution I mentioned about using port 80 for ssh was something I used when I was at a conference in DC and the host only allowed http/https traffic to machines outside the building. I used it to ssh to a machine that was outside, so it wasn't like this case of trying to get two machines behind the firewall together...
billo
On Fri, 2024-03-22 at 11:45 -0500, Thomas Cameron wrote:
You will almost certainly not be able to connect between devices on a commercial wifi network. They don't want folks to attack other machines on the network. It would be a huge scandal if a hotel allowed a guest to connect to other guests' laptops.
And yet, it happens...
I have a home network, it allegedly offers an isolated guest WiFi WLAN. I put things I don't trust on it, such as smart home devices. I've dabbled with some smart lighting, putting some mood lighting to come on at dusk, dim late at night so I don't trip over anything going to the bathroom, and go off at dawn. Leaving essential lighting manually controlled. And I won't be putting anything I consider hazardous under cloud control (such as heating).
Sometimes you *can* make connections to them. Sometime they can make connections to things on the wired LAN (I don't think that should be allowed).
My phone, on my full-access WiFi can definitely control the lighting on the isolated guest WiFi, though I expect that's going through the cloud. My phone can sometimes access the Google TV dongle, trialling it on the isolated guest WiFi, I'm not sure what method that's using.