Lan Barnes wrote:
Here is my techinique for review and correction:
1. On the client, I run "xhost +" for promiscuous acceptance
2. On the server, I run "export DISPLAY=toto:0.0" to tell it where to
send output
That's not even tunneled.
Try this:
ssh -X oz -l root # (you want to be root -- one of your errors was
permissions, and sudo/su fubar the X auth model)
then, magically,
xterm & # (or something)
Alternatively (instead of using the -X option to ssh), on the CLIENT
machine (the one whose console at which you sit), edit your
~/.ssh/config file, and at the very beginning add the following lines:
ForwardX11 yes
ForwardX11Trusted yes
That will tell ssh to automagicaly forward X11 upon connections.
Now, before you security/paranoia weenies jump on me about ssh as root
(which, I admit, is generally a bad idea to allow), there is a clause in
the /etc/ssh/sshd_config file "PermitRootLogon" which you can set to
"WithoutPassword" which only allows things like publickey auth or ISO
Smart Card, etc. (mitigating the brute-force dictionary attack method).
Cheers, hope it works. :)
-Kelsey
--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list