I want to set my Mum's new tablet so that it can only access the Internet 
via the SSH server running on her Buffalo router (with Tomato firmware).

I've got the server working and accessible remotely and so far the only app 
I've found that has a Global Proxy setting to redirect everything via the 
SSH server is SSHTunnel, although I gather that it's not totally reliable 
when connections drop/change and I can't expect my Mum to cope with 
monitoring it and re-enabling it manually.

When it's disabled, all traffic will just go over local connection 
unencrypted so that's a concern as well.

Ideally there'd be some way to setup the SSH settings at a system level, 
with no way to disable them and force all the traffic go out like this but 
I'm not sure if there is any way to achieve this.

The other part is setting a firewall (AFWall+ or Android Firewall seem to 
be the main ones) to only allow traffic via the SSH server. I'm not sure 
what whitelist rules would be required for this. For example, SSHTunnel 
connects to the server at x.x.x.x:x, so I presume I'd need a rule to allow 
connections to this address and this port (I had a quick play with the 
Avast firewall, which only allows creating custom rules for IP or port, so 
I'd need two rules with that and it doesn't allow entering the DynDNS name, 
only a IP address, so that's no good).

Then SSHTunnel has a Local Port (1984) and remote address:port 
(127.0.0.1:3128 ) so I presume I'd need rules to allow all of those as well 
(I'm not sure which of these need to be incoming/outgoing or both). Then 
there's the question of whether I need to allow other ports like DNS (53) 
and so on, or if that all goes over the SSH tunnel and doesn't require 
setting allow rules specifically.

It might be that a VPN server would be more suitable for what I'm trying to 
acheive than a SSH server and I think the Tomato firmware on the router has 
that facility (or if the version currently flashed doesn't, there's 
probably another version I could flash that does), so if that's the case, 
I'd appreciate advice on locking it down that way instead. Android has 
built-in VPN support, so it might be possible to use that but it depends on 
whether it will auto-connect and stay connected all the time or if it 
requires user intervention and I'll still need to setup firewall rules to 
prevent data being sent without the VPN in case it does get disabled.
 
Another issue is whether these firewall rules will prevent the device even 
being able to connect to any public Wi-Fi points before redirecting the 
traffic via the SSH/VPN server. 

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/android-security-discuss.
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to