Overview
This tool allowes access to devices that are not explicitly routable from the internet.
Direct connection from device to internet
It does so by connecting a Customer Device
by using a Client Connector
to the Remote Access Server
.
Therefore Consumers
are able to gain indirect access to the device by tunneling over the Remote Access Server
.
graph TD server["Remote Access Server"] subgraph "Customer Device" connector["Client Connector"] end subgraph "Consumer" client["Web Brwoser"] ssh["SSH Client"] end server -. "https (TLS)" .- connector server -. "https (TLS)" .- client server -. "SOCKS" .- ssh
Indirect connection from device over service PC to internet
In scenarios where the Customer Device
has no direct access to the internet, a Service PC
with an up-to-date browser (Firefox/Chrome) can be used to connect the Customer Device
to the Remote Access Server
.
No additional software (other than the browser) is required on the Service PC
.
graph TD; server["Remote Access Server"] subgraph "Customer Device"; connector["Client Connector"] end subgraph "Consumer"; client["Web Brwoser"] ssh["SSH Client"] end subgraph "Service PC"; browser["Web Brwoser"] end server -. " https (TLS)" .- browser browser -. "https (TLS) / http" .- connector server -. "https (TLS)" .- client server -. "SOCKS" .- ssh
Configuration tool
The configuration of the remote access endpoint can be done at sites.websof.de. Once registered and activated by an administrator you can start to create sites on the domains that are unlocked for you.
Click sites
in the side-menu to manage your sites.
Click on Add new site
to add a new site.
After adding the site you will see your configured site and the unique token.
This token is used to connect a device endpoint to a site. It can not be changed or recreated and will be lost when the corresponding site is deleted. Devices that are using an outdated token are not accessible!
Configuring a site
You have the opportunity to change various options of a site you own.
For example you can change
- the name
- or domain (and therefore the resulting FQDN for your site)
- enable/disable access to it completely
- enable/disable access to its public http/https endpoints
- change authentification for its public http/https endpoints
- enable/disable access to its socks endpoints
Integration
As a docker container
To integrate the remote access connector to your device you can use the following docker command:
docker run \
-it --rm --net=host \
-e CONNECT_TYPE=rule \
-e RULE=":80-*:*,:22-*:*" \
-e TOKEN=$MY_SITE_TOKEN \
-e NAME=`hostname` \
-e TYPE=$MY_DEVICE_TYPE \
-e NO_CONNECT=1 \
-e BRIDGE_PORT=8765 \
--name tnnl \
weberlars/tnnl:arm32v7-20220505
With the CONNECT_TYPE=rule
you can specify that a custom rule is used to restrict access to certain ports.
The RULE=":80-*:*,:22-*:*"
specifies that only access to the local ports 80 and 22 are allowed.
All other access are blocked by the connector.
Other supported CONNECT_TYPES
are
localhost
allowes access to all local ports on the deviceany
allowes access to other devices in the same network
The TOKEN
must be the token that is assigned to your site.
NAME
should be set to the hostname to identify single devices.
TYPE
should be set to the product name of the device.
By using NO_CONNECT=1
you can configure the connector not to connect to the remote access server by itself.
With the BRIDGE_PORT
a TCP port can be specified to listen on for bridge connections.
It is recommend to place this port behind a reverse proxy and only allow authorized access to that port.
Rules
You can provide your own rules using the environment variable RULE
in the format: RULE="$IN_HOST:$IN_PORT-$OUT_HOST:$OUT_PORT"
.
Multiple rules can be seperated by ,
.
The rules are evaluated in the order they are provided and the first matching rule will be used.
If no rule is matching the connection is rejected.
For the $IN_HOST
there are two special values.
- An empty string is the default host which will only match requests to the default host. Requests to the default host will be redirected to
localhost
if not specified. *
which is a wildcard that allows access to all devices (unsupported for now, tnnl requests will only be sent to the default host for now).
Here are a few example rules:
Rule | Description |
---|---|
:*-*:* |
Unrestricted access to all ports on localhost |
:80-*:* |
Allow access to port 80 |
:80-*:4000 |
Allow access to port 80 but forward it to port 4000 |
:*-192.168.1.1:* |
Allow access to all ports on 192.168.1.1 |
:80-192.168.1.1:* |
Allow access to port 80 on 192.168.1.1 |
:80-192.168.1.1:4000 |
Allow access to port 80 on 192.168.1.1 but forward it to port 4000 |
:80-*:*,:22-*:* |
Allow access to port 80 and port 22 |
Accessing a site
Public HTTP/HTTPS endpoints
To access the http endpoint on your device, you can simply use your browser and access https://$SITE_NAME.$SITE_DOMAIN.
Custom tcp protocols
To connect to a custom tcp port you have to use the sites server as a socks proxy. For example to connect to ssh on your device use:
ssh \
-o ProxyCommand='nc -x access.websof.de:1080 %h %p' \
$(SSH_USER)@$(SITE_NAME).$(SITE_DOMAIN)