I'm also not worried on mobile side, but more on allowing ssh in while visiting random wlan networks. If the wlan network configuration had something like "home network" and "public network", and ssh logins allowed only on "home network" ?
I remember also seeing an app for allowing ssh in only after user acceptance on phone. On mobile side, I can activate a public IP for the phone (Saunalahti, Finland) but that works only for 3G. -kimmo -----Original Message----- From: devel-boun...@lists.sailfishos.org [mailto:devel-boun...@lists.sailfishos.org] On Behalf Of Ove Kåven Sent: 19. huhtikuuta 2015 22:07 To: devel@lists.sailfishos.org Subject: Re: [SailfishDevel] SSH listen address Den 19. april 2015 18:50, skrev E.S. Rosenberg: > So this leaves an, I think, interesting question: how do we on the one > hand allow SSH access while on the other hand preventing access from > GSM/3G/4G? Is it important? Most likely your carrier is going to firewall you anyway. As an experiment, I just tried pinging and ssh-ing to my 4G-connected phone, but neither worked. That is, I tried to connect to the IP address shown in "ifconfig rmnet0" (which is showing a real IP address, not NAT), but apparently something is blocking it. (And my ssh seems to be listening on all interfaces.) So at least for me, there seems to be no need to do anything to prevent such access. I'm guessing it's pretty much the same for all carriers. _______________________________________________ SailfishOS.org Devel mailing list To unsubscribe, please send a mail to devel-unsubscr...@lists.sailfishos.org _______________________________________________ SailfishOS.org Devel mailing list To unsubscribe, please send a mail to devel-unsubscr...@lists.sailfishos.org