* [Buildroot] How to safely connect to remote embedded systems (mostly behind Firewalls) ?
@ 2020-12-06 11:31 rob.r374 at gmail.com
0 siblings, 0 replies; only message in thread
From: rob.r374 at gmail.com @ 2020-12-06 11:31 UTC (permalink / raw)
To: buildroot
Hello,
I'm preparing buildroot based distribution for ARM Cortex M7
(noMMU,STM32F769 DISCO board).
I'd like to implement possibility to remotely connect from distant server,
to check and supervise the system.
I think that >reverse shell< is what I'm looking for (so remote system on
some trigger connects safely to some distant server, from which I can work
in shell). I guess dropbear that is already present in my system could be
used for this.
Is this solution safe and how can be implemented efficiently on these
resource constrained devices ?
Thanks,
Regards,
Rob.
--
Ta e-po?ta je bila pregledana z Avast protivirusnim programom.
https://www.avast.com/antivirus
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.busybox.net/pipermail/buildroot/attachments/20201206/d6666edf/attachment.html>
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2020-12-06 11:31 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2020-12-06 11:31 [Buildroot] How to safely connect to remote embedded systems (mostly behind Firewalls) ? rob.r374 at gmail.com
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox