• Recent
  • Tags
  • Popular
  • Home
  • Docs
  • Register
  • Login
RetroPie forum home
  • Recent
  • Tags
  • Popular
  • Home
  • Docs
  • Register
  • Login
Please do not post a support request without first reading and following the advice in https://retropie.org.uk/forum/topic/3/read-this-first

Any way to remotely transfer files to/from Retropie?

Scheduled Pinned Locked Moved Help and Support
transferremote access
24 Posts 11 Posters 5.6k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    sub_atomic
    last edited by 27 Apr 2018, 13:09

    I'm building a Retropie for my nephew who is too young to be able to edit gamelists, update configs, add roms, etc. Plus they live in another state. Is there any way to set up a remote connection so that I can SSH in from my house? Everything I search for comes up with instructions for connecting on the same network.

    Thanks.

    1 Reply Last reply Reply Quote 0
    • P
      piratefish
      last edited by 27 Apr 2018, 13:52

      I'd say the easiest way to connect to your nepews pie via ssh would be to connect to a PC in his network with a remote maintenance tool like VNC (TightVNC for example) and then connect via ssh (with putty for example) to his pie.

      Depending on how tech-savy you are setting up a VNC connection is not terribly difficult.

      Hope that helps.

      1 Reply Last reply Reply Quote 0
      • P
        piratefish
        last edited by 27 Apr 2018, 14:04

        A more secure way would be to forward the SSH TCP port in your nephews router to his pie. And thinking about it that might even be easier than setting up a VNC connection.

        Depending on the router in use forwarding ports is very easy. Then you only need his current IP-Adress (or you set up a DynDNS if you want to be able to connect at any time) and establish a ssh-connection to it. It should be forwarded to the pie and voilà you are in.

        1 Reply Last reply Reply Quote 0
        • P
          piratefish
          last edited by 27 Apr 2018, 15:19

          Some more thoughts now that I had some time to think (the first two replies where just the first things that came to my mind just before I left work):

          If you are looking for a short term and/or "on demand" solution (only used when your nephew askes for help) use the method without DynDNS (your nephew needs to tell you the current public IP adress of his router every time) and be sure to turn on the ssh port forwarding only when needed so ist does not get
          abused.

          If you are looking for a more permanent and/or long term solution (to ssh into the pie whenever) use the method with DynDNS (a lot of routers support DynDNS) and be sure to set a VERY strong password on the pie (for user pi which is used for ssh connections).

          Tools to use for ssh from a Windows PC:

          putty - a Windows ssh client
          WinSCP - a Windows program to transfer files over ssh

          Cheers!

          1 Reply Last reply Reply Quote 0
          • S
            sub_atomic
            last edited by 27 Apr 2018, 15:43

            Great! Thanks for the help, @piratefish. I'm going to have to work with his dad to get that set up, but sounds like it shouldn't be too hard. I appreciate it!

            P 1 Reply Last reply 27 Apr 2018, 16:43 Reply Quote 0
            • P
              piratefish @sub_atomic
              last edited by 27 Apr 2018, 16:43

              @sub_atomic You're welcome! If the router supports port forwarding (which most routers do) it should be a piece of cake (or a piece of pie ;-). Let me know if it works.

              Cheers!

              1 Reply Last reply Reply Quote 0
              • M
                markyh444
                last edited by 27 Apr 2018, 19:11

                I'd advise against port forwarding, especially for a common protocol like SSH out to the internet as it begs to be exploited.

                The initial idea of setting up a remote session to a pc then SSH to the Pi is much better. You could use something like logmein which can be initiated from their end easily when they want some help copying new files to the Pi.

                Retropie in a NES - Pi 3 with Mausberry circuit shutdown switch wired to buttons and 8bitdo NesPro30 controller
                Retropie in a Saturn Controller - Pi Zero, GPIO controls using DB9 driver
                Retropie in a PSX - Pi3
                https://markyh444.wordpress.com

                C 1 Reply Last reply 29 Apr 2018, 07:08 Reply Quote 1
                • R
                  Raistlin84
                  last edited by 28 Apr 2018, 06:47

                  Hi, the safest way is a VPN, many router support it. Connect to the VPN, and then with sshfs (need to install the server package in retropie) you can mount the remote filesystem. No security issue, a bit more complicated, but much better.

                  1 Reply Last reply Reply Quote 0
                  • R
                    Roken
                    last edited by 28 Apr 2018, 09:01

                    scp allows you to copy files over ssh without any fancy shenanigans. https://en.wikipedia.org/wiki/Secure_copy

                    1 Reply Last reply Reply Quote 0
                    • C
                      Clyde @markyh444
                      last edited by Clyde 29 Apr 2018, 07:08

                      Hi @markyh444, could you please elaborate why you'd prefer a remote session to "a pc" (I presume that you mean Windows by that) to an direct ssh connection? I'm having reservations against that approach, because

                      1. most remote access solutions would also require port forwarding, those who don't usually rely on external third-party servers which are a security liability by themself,
                      2. every additional layer of complexity (here: the pc's OS and its remote access software) increases the attack surface,
                      3. in contrast, Retropie's minimal system without a desktop environment is much less complex than any extensive desktop OS,
                      4. SSH is made for secure remote access, and
                      5. its port can be changed to a less common one, although there are reasons to think that this is a bad idea.

                      For these reasons, I'd rather recommend a direct SSH connection with a strong passphrase or, even better, public key authentication to a Retropie system that should be updated regularly.

                      Please don't take this offensively, I'm just curious and I'd welcome a fruitful discussion about our different views in this matter, if you like. 😌 Of course, this applies to anyone reading this.

                      edit: typo 😒

                      M 1 Reply Last reply 29 Apr 2018, 07:35 Reply Quote 0
                      • M
                        mitu Global Moderator @Clyde
                        last edited by mitu 29 Apr 2018, 07:35

                        @clyde Having an always-on SSH server exposed to the internet is always a risk to have your password brute-forced - see https://www.theregister.co.uk/2017/06/13/linuxmuldrop14_malware_for_raspberry_pi/. If you don't change your PI password from the default - as I assume most users don't - you'll get your system cracked easily. See this topic for an actual case of a RetroPie user.

                        If you use something like TeamViewer/LogmeIn, you don't need to open any additional ports and since the connection is always performed on-demand, there's an additional confirmation from the connecting parties so there's no risk of somebody else connecting to your system.

                        I second @markyh444 suggestion - if you don't need to permanently be connected to the system, then use something like TeamViewer, it's much safer and more user friendly (especially for non-technical users).

                        1 Reply Last reply Reply Quote 1
                        • C
                          Clyde
                          last edited by Clyde 29 Apr 2018, 08:09

                          @mitu Thanks for your reply. I highly doubt that a closed-source software that circumvents router's firewalls by connecting to a third-party server is safer than an up to date SSH with a strong passphrase or public key authentication. The former may seem more convenient to the average (Windows) user, but I rate it as potentially less than more secure. See TeamViewer: Fraudulent Uses and LogMeIn Hamachi: Security for some examples as well as general security and privacy concerns.

                          That said, you can also use bad passwords in remote viewers, and you can also start ssh only on demand, edit: or open its ports only if needed, so I don't see those arguments in favour of the viewers. Your example doesn't say anything about SSH vs. remote viewers, but everything about weak vs. strong authentication.

                          M M 2 Replies Last reply 29 Apr 2018, 08:17 Reply Quote 0
                          • M
                            mitu Global Moderator @Clyde
                            last edited by mitu 29 Apr 2018, 08:17

                            @clyde said in Any way to remotely transfer files to/from Retropie?:

                            See TeamViewer: Fraudulent Uses and LogMeIn Hamachi: Security for some examples as well as general security and privacy concerns.

                            Just as an always-on connection for SSH poses an brute-force security risk, if you configure TeamViewer/LogmeIn as a windows service and exposed to the internet you'll get the same exposure and risk, and the same can be said for any public facing log in service (RDP). However, starting them on-demand, just when you need to connect, will not pose the same risk since there's no listening port and the connection is always approved by the destination user. For me, that's always safer than letting SSH open to the internet.

                            1 Reply Last reply Reply Quote 1
                            • M
                              markyh444 @Clyde
                              last edited by 29 Apr 2018, 09:29

                              @clyde any remote connection exposed to the internet is a security risk. I'm a Cisco network engineer with 13 years experience and know the risks fairly well. As @mitu said, a common protocol left open is a risk to brute force attacks and exploits and I would only recommend using them if you know what you're doing and can isolate and/or protect the risk on your network. As this situation seems to involve non-technical users, a remote session to the machine via logmein or TeamViewer then SSH to the Pi makes much more sense to me. I agree that these are not without risk as well, but if only ran when required, then it should be ok. Also, it required less technical know-how that enabling and disabling port forwarding or SSH on demand imho.

                              Retropie in a NES - Pi 3 with Mausberry circuit shutdown switch wired to buttons and 8bitdo NesPro30 controller
                              Retropie in a Saturn Controller - Pi Zero, GPIO controls using DB9 driver
                              Retropie in a PSX - Pi3
                              https://markyh444.wordpress.com

                              P 1 Reply Last reply 29 Apr 2018, 19:02 Reply Quote 0
                              • D
                                DorkVonWaterfall
                                last edited by 29 Apr 2018, 09:33

                                teamviewer and putty?

                                01001110 01101111 01100010 01101111 01100100 01111001 00100000 01101011 01101110 01101111 01110111 01110011 00100000 01101001 01100000 01101101 00100000 01100001 00100000 01101100 01100101 01110011 01100010 01101001 01100001 01101110 00100001

                                1 Reply Last reply Reply Quote 0
                                • J
                                  jasonw
                                  last edited by 29 Apr 2018, 15:13

                                  What I would do if one of you have a decent (not cable company provided) router, set up a VPN server on the router (OpenVPN is pretty easy and has tutorials). Then the other would use their OpenVPN client to connect. Then it will be just like you are on the same network.

                                  1 Reply Last reply Reply Quote 0
                                  • P
                                    piratefish @markyh444
                                    last edited by 29 Apr 2018, 19:02

                                    @markyh444 I agree with you that any remote connection is a security risk, sure. Not to have an opening is ofcourse more secure than to have one, as well guarded as it might be.

                                    But I think it's not that big of a risk to leave an ssh connection exposed to the internet. As long as you set a decently strong password (I'm talking 20-30 random characters) you will be fine. The connection has to be targeted specifically (while the Pi is running or otherwise there would not be anything to target) to be brute forced or otherwise exploited which is pretty unlikely. Plus, as I suggested, the port forwarding can be disabled when not needed to further lower the risk of abuse, which should of course always be preffered to leaving the connection exposed.

                                    Yeah, using programs like logmein or teamviewer might be slightly easier but imo port forwarding is pretty much a nobrainer with most modern (consumer) routers and besides not everybody is comfortable with using connections which are established through third party servers (those connections and connection attempts can also be tempered with).

                                    Cheers!

                                    S 1 Reply Last reply 29 Apr 2018, 19:14 Reply Quote 0
                                    • S
                                      Sano @piratefish
                                      last edited by 29 Apr 2018, 19:14

                                      @piratefish
                                      I would add, if you want to leave an SSH server exposed :

                                      • Set a strong (obviously no-default) password
                                      • Choose a random/non-default port (aka not 22). Most bots try default ports.
                                      • Use an utility like fail2ban to avoid brute force.

                                      With those rules, I had a computer with ssh exposed for many years without issue, but I kind of knew what I was doing and checked the logs on a regular basis., as well as potential rootkits
                                      I second the VPN solution, as well as the on-demand remote application.

                                      P 1 Reply Last reply 29 Apr 2018, 19:35 Reply Quote 0
                                      • P
                                        piratefish @Sano
                                        last edited by 29 Apr 2018, 19:35

                                        @sano Agreed! Further security measures never hurt! If you know how to set them up, do so! :)

                                        Just to be clear, remote applications are imo fine to use as well.

                                        VPN would also be my personal preffered method to be honest. I just thought it might be to hard to set up properly (which is integral for security; a sloppily set up VPN might work, but might also easily be less secure than a forwarded ssh connection).
                                        Plus, just for the record, a VPN suffers from the same "problem" of being a constantly exposed connection. ;-)

                                        Cheers!

                                        M 1 Reply Last reply 29 Apr 2018, 20:08 Reply Quote 0
                                        • M
                                          markyh444 @piratefish
                                          last edited by 29 Apr 2018, 20:08

                                          @piratefish I understand that you can take measures to secure your SSH connection, which was why I said I wouldn't recommend it to people who didn't know what they were doing. If you have the technical knowledge, and can limit/isolate the risk posed, then that's fine.

                                          The original post suggests an OK amount of technical knowledge, but not enough to recommend it as the best option in this instance.

                                          Retropie in a NES - Pi 3 with Mausberry circuit shutdown switch wired to buttons and 8bitdo NesPro30 controller
                                          Retropie in a Saturn Controller - Pi Zero, GPIO controls using DB9 driver
                                          Retropie in a PSX - Pi3
                                          https://markyh444.wordpress.com

                                          1 Reply Last reply Reply Quote 0
                                          20 out of 24
                                          • First post
                                            20/24
                                            Last post

                                          Contributions to the project are always appreciated, so if you would like to support us with a donation you can do so here.

                                          Hosting provided by Mythic-Beasts. See the Hosting Information page for more information.

                                            This community forum collects and processes your personal information.
                                            consent.not_received