Sam Widges
Active Member
That's excellent news - you've cracked it!
(Thanks for all the thanks, by the way )
The next, and much simpler step is to go into webif and to click on the box that disables password authentication by selecting the box marked "Prevent logins with passwords?" and updating the settings. This is the most critical step because it stops a hacker from sidestepping all this good work and just guessing the password for root.
It looks like you can ignore this bit, but once you're happy that this works inside the network, the next thing for people to do is to configure the router to forward the SSH port from the outside to the humax. For people who haven't done this before, it will be a setting called something like 'Port Forwarding' or 'Application Sharing'. Pick a port at random (I recommend something between 33000 and 65000) and forward that to the Humax on port 22. If your router doesn't support changing the port number on the way through, you can change the port number on the webif to match the port that you chose for the router.
Once you have this configured and working, you need to be able to reach your router. This is fine if the IP address is fixed, but if your IP address changes every time you reconnect you need to sign up for a dynamic DNS address. Once that is set up then you can know that your router will always be accessible at <blah>.<something>.org. For example, you could use one of the No-IP free domains and register makem.no-ip.org or makem.redirectme.net or <anything that's not taken already>.redirectme.net. There is a list of free dynamic DNS providers at http://dnslookup.me/dynamic-dns/ but it would be a good idea to see what dynamic DNS services that your router supports before you bother registering with one.
As ever, let us know if there are any problems at each stage.
(Thanks for all the thanks, by the way )
The next, and much simpler step is to go into webif and to click on the box that disables password authentication by selecting the box marked "Prevent logins with passwords?" and updating the settings. This is the most critical step because it stops a hacker from sidestepping all this good work and just guessing the password for root.
It looks like you can ignore this bit, but once you're happy that this works inside the network, the next thing for people to do is to configure the router to forward the SSH port from the outside to the humax. For people who haven't done this before, it will be a setting called something like 'Port Forwarding' or 'Application Sharing'. Pick a port at random (I recommend something between 33000 and 65000) and forward that to the Humax on port 22. If your router doesn't support changing the port number on the way through, you can change the port number on the webif to match the port that you chose for the router.
Once you have this configured and working, you need to be able to reach your router. This is fine if the IP address is fixed, but if your IP address changes every time you reconnect you need to sign up for a dynamic DNS address. Once that is set up then you can know that your router will always be accessible at <blah>.<something>.org. For example, you could use one of the No-IP free domains and register makem.no-ip.org or makem.redirectme.net or <anything that's not taken already>.redirectme.net. There is a list of free dynamic DNS providers at http://dnslookup.me/dynamic-dns/ but it would be a good idea to see what dynamic DNS services that your router supports before you bother registering with one.
As ever, let us know if there are any problems at each stage.