• How to secure IoT remote SSH connections

  • Home automation devices or internet of things devices enable almost all electrical and electronic gadgets in your home to be connected to the internet, such as air conditioners, refrigerators, washing machines, light bulbs, fans, and security cameras.

    A wide range of automobiles, including cars, trucks, trains, airplanes, and ships, are connected to the internet by means of IoT devices to track their movements and operations.

    IoT devices connect even the largest industrial machines to the internet, and sensors are added to the machines or placed at various locations in the plant to monitor their performance and operation.

    Smart electronic gadgets and electrical appliances in your home or factory can be monitored, controlled, and operated using an IoT device based on the IoT.

    Access to IoT devices via SSH

    It was primarily for the purpose of monitoring, tracking, and operating these remote access iot from remote locations that these IoT devices were deployed and connected to the internet.

    In order to troubleshoot, configure, or perform other operational tasks on those IoT devices, you sometimes need access to them.

    A sensor device at a factory hundreds of miles away is having trouble measuring the factory's temperature.

    Remote access tunnels can be used to quickly open and start sessions to that sensor device.

    You can reset the sensor device's configuration, delete unwanted log files and log histories, and restart it from the same session after identifying the problem (for instance, a misconfiguration or disk full error).

    Traditional troubleshooting methods involve sending a technician to the factory to investigate the sensor device the next day.

    Secure tunneling (using SocketXP) reduces incident response and recovery times and operational costs with remote access.

    Remotely accessing IoT devices isn't easy

    There are often shortcuts and quick hacks performed on router/firewall settings in order to allow internet traffic into corporate networks.

    Several of these unsafe practices will be discussed in the next section, as well as the security risks associated with them.

    IoT remote SSH methods that are unsafe

    In industries, factories, offices, and homes, IoT devices are placed behind firewalls and NATs (Wifi Routers or Gateway Routers). IoT devices are always assigned a Local IP address using mechanisms such as DHCP. The local IP addresses are usually assigned to IoT devices within the range 10.X.X.X or 192.X.X.X. IoT devices don't have public access to IP addresses.

    In order to prevent unwanted people from accessing your IoT devices over the internet, the gateway router allows devices behind the firewall to communicate with servers on the internet (via the gateway router), but not the other way around.

    In other words, it is not easy and straightforward to access the IoT devices at home or at work remotely via the internet.

    To allow a particular traffic to sneak into the local network, many people will open up ports (SSH port 22 or HTTP/HTTPS ports 80/443) in their firewall settings (ACL rules) or gateway router NAT configuration.

    For tracking the gateway router's non-static public IP address, they would use Dynamic DNS (DDNS) solutions.

    Your IoT installation would be at risk of security breaches if you used this method.

    Your local network and servers could be accessed by online hackers scanning such open ports.

    A common myth or misunderstanding is that people think that everything going to port 22 is safe if they use secure shell connections (SSH).

    Nevertheless, they fail to realize that they have left their house, office, or industrial network wide open to any stranger.

    Hackers and your secure SSH session will share the same door.

    You left the door wide open so anyone could sneak in, not the SSH session.

    In conclusion:

    Due to the encryption of data using SSL, the solution discussed in this article is a secure method for remote SSH into your home or office computer. Banking and governments use SSH to exchange highly confidential data over the internet. Data is encrypted end-to-end between the SSH client and the SSH server.

  • Should be Empty: