A page in your DokuWiki was added or changed. Here are the details:

Date        : 2017/11/20 11:23
Browser     : Mozilla/5.0 (X11; Linux x86_64; rv:52.9) Gecko/20100101 
Goanna/3.4 Firefox/52.9 PaleMoon/27.6.0
IP-Address  : 134.3.37.90
Hostname    : HSI-KBW-134-3-37-90.hsi14.kabel-badenwuerttemberg.de
Old Revision: https://wiki.x2go.org/doku.php/doc:howto:tce?rev=1511176409
New Revision: https://wiki.x2go.org/doku.php/doc:howto:tce
Edit Summary: Clarifications, style, copyediting, uniform "Attention" and bold 
font for security-relevant items
User        : stefanbaur

@@ -742,34 +742,34 @@
   * Options containing 
"tftp|rsync|https|http|ftp://your-http-server-ip-or-dns-here"; should be 
replaced with the proper HTTP, HTTPS, FTP, or, where mentioned as an alternative, TFTP or 
rsync URL for your server. HTTPS is always preferred for security reasons. IP or DNS name 
may be used.
=== These two are mutually exclusive, i.e. never put both of them in the same config ===
   *
''broker-url=ssh:<nowiki>//</nowiki>your-broker-address-here'' - this allows 
you to specify an X2Go Session Broker instead of a sessions file (not limited to an 
ssh-based broker, works with an http-based broker as well)
-   * 
''sessionsurl=https|http|ftp://your-http-server-ip-or-dns-here/x2go-tce/x2go-tce.sessions''
 - use this to specify a sessions file. You need this unless you are using a 
session broker. See below for how to add this file to your HTTP, HTTPS, or FTP 
server.  Note that whoever manages to spoof the server name can inject rogue 
session config files into your ThinClients.  To mitigate this risk, use HTTPS, 
where the attacker would have to spoof both server name and matching 
certificate.
+   * 
''sessionsurl=https|http|ftp://your-http-server-ip-or-dns-here/x2go-tce/x2go-tce.sessions''
 - use this to specify a sessions file. You need this unless you are using a 
session broker. See below for how to add this file to your HTTP, HTTPS, or FTP 
server.  **Attention: Whoever
manages to spoof the server name can inject rogue session config files into 
your ThinClients.**  To mitigate this risk, use HTTPS, where the attacker would 
have to spoof both server name and matching certificate.
=== These are entirely optional ===
-   * ''bg=https|http|ftp://your-http-server-ip-or-dns-here/x2go-tce/x2go-tce-bg.svg'' - 
use this to specify an SVG file to "brand" your X2Go-TCE with. It will replace 
theblue background theme of the login screen. See below for how to add this file to your 
HTTP, HTTPS, or FTP server.  Note that whoever manages to spoof the server name can 
inject rogue images into your ThinClients. To mitigate this risk, use HTTPS, where the 
attacker would have to spoof both server name and matching certificate.
+   * ''bg=https|http|ftp://your-http-server-ip-or-dns-here/x2go-tce/x2go-tce-bg.svg'' - 
use this to specify an SVG file to "brand" your X2Go-TCE with. It will replace 
theblue background theme of the login screen. See below for how to add this
file to your HTTP, HTTPS, or FTP server.  **Attention: Whoever manages to spoof 
the server name can inject rogue images into your ThinClients.** To mitigate 
this risk, use HTTPS, where the attacker would have to spoof both server name 
and matching certificate.
   * ''blank=n|n:n:n'' - Will disable (''blank=0'') or set screensaver timeout. 
Use ''blank=n:n:n'' to set DPMS Standby/Suspend/Off values. Standby value 
equals screensaver timeout value. All values are given in seconds.
-   * 
''branding=https|http|ftp://your-http-server-ip-or-dns-here/x2go-tce/x2go-tce-branding.svg''
 - use this to specify an SVG file to "brand" your X2Go-TCE with. It will 
replace the seal icon in the lower left of the login screen. See below for how to add 
this file to your HTTP, HTTPS, or FTP server.  Note that whoever manages to spoof the 
server name can inject rogue images into your ThinClients. To mitigate this risk, use 
HTTPS, where the attacker would have to spoof both server name and matching
certificate.
-   * ''copysecring'' - this will scan for USB media and fixed disk media (with 
USB media taking precedence) at boot for one or more of the following 
directories: ''config/ssh'', 'ssh', ''.ssh''. Any SSH Secret Keys found there 
will be copied into /home/user/.ssh (in the ramdisk), with proper permissions 
and ownerships for the default user account. This may come in handy when you 
are using SSH Secret Keys on USB media, but need to log in and out of sessions 
often, and don't want to leave the USB media plugged in all the time/don't want 
to have to re-insert it before each session startup. **Note:** This poses a 
security risk when other people are using your thin client afterwards (as they 
will have access to your keys), so be sure to power-cycle the thinclient once 
you are done.
+   * 
''branding=https|http|ftp://your-http-server-ip-or-dns-here/x2go-tce/x2go-tce-branding.svg''
 - use this to specify an SVG file to "brand" your X2Go-TCE with. It will 
replace the seal icon in
the lower left of the login screen. See below for how to add this file to your 
HTTP, HTTPS, or FTP server.  **Attention: Whoever manages to spoof the server 
name can inject rogue images into your ThinClients.**  To mitigate this risk, 
use HTTPS, where the attacker would have to spoof both server name and matching 
certificate.
+   * ''copysecring'' - this will scan for USB media and fixed disk media (with 
USB media taking precedence) at boot for one or more of the following 
directories: ''config/ssh'', 'ssh', ''.ssh''. Any SSH Secret Keys found there 
will be copied into /home/user/.ssh (in the ramdisk), with proper permissions 
and ownerships for the default user account. This may come in handy when you 
are using SSH Secret Keys on USB media, but need to log in and out of sessions 
often, and don't want to leave the USB media plugged in all the time/don't want 
to have to re-insert it before each session startup. **Attention: This poses a 
security risk when other people are using your
ThinClient afterwards (as they will have access to your keys).**  To mitigate 
this risk,be sure to power-cycle the ThinClient once you are done.
   * ''ldap=ldap.example.com:389:cn=cngoeshere,dc=example,dc=com'' - this 
allows you to specify an LDAP server to connect to - note that this is not 
needed for LDAP-based authentication, only when you intend to store entire 
session profiles in LDAP. You should really consider using the X2Go Session 
Broker instead.
   * ''ldap1=ldap-backupserver-1.example.com:389'' - this allows you to specify 
the first of up to two LDAP backup servers when using LDAP authentication
* ''ldap2=ldap-backupserver-2.example.com:389'' - this allows you to specify the second of up to two LDAP backup servers when using LDAP authentication * ''nodpms'' - Will not touch DPMS settings at all (by default, ''blank=0'' does both ''xset s off'' and ''xset -dpms''). Use this along with ''blank=n'' if you do want to blank the screen, but your screen is confused by
DPMS settings.
-   * ''nomagicpixel=1'' or ''nomagicpixel=2'' - you should set ''nomagicpixel=1'' while 
the "magic pixel" (clicking in the upper right corner of the screen will 
minimize a fullscreen session) is still active in thinclient mode (this feature is 
expected to be disabled at some point in the future). ''nomagicpixel=1'' will disable the 
window manager when exactly 3 windows are detected (that's the usual situation when a 
fullscreen session is active). It will re-enable openbox whenever more or less than 3 
windows are detected. If this fails for you, you can try ''nomagicpixel=2'', which will 
try to trigger on the window-minimize command and restore it to fullscreen. Note that 
''nomagicpixel=2'' is known to cause problems when trying to run the actual X2Go-TCE 
client as a virtual machine guest (the //X2GoServer// you connect to may be a VM guest, 
no problems there). To live with the magic pixel bug, simply do not add this option at 
all.
-   *
''pubkey=tftp|http|https|ftp://your-http-server-ip-or-dns-here/x2go-tce/x2go-tce.authorized_keys''
 - Allows you to add an ssh public key file to the ThinClient, so your 
administrators can log in remotely using SSH. Note that this file needs to be 
chmodded 644, not 600, on the web server.  **Attention: Whoever manages to 
spoof this server name will have root access to your ThinClients. Using HTTPS 
will mitigate this - an attacker would not only have to spoof the server name, 
but also the matching certificate.**
+   * ''nomagicpixel=1'' or ''nomagicpixel=2'' - you should set ''nomagicpixel=1'' while 
the "magic pixel" (clicking in the upper right corner of the screen will 
minimize a fullscreen session) is still active in thinclient mode (this feature is 
expected to be disabled at some point in the future). ''nomagicpixel=1'' will disable the 
window manager when exactly 3 windows are detected (that's the usual situation when a 
fullscreen session is active). It will re-enable openbox
whenever more or less than 3 windows are detected. If this fails for you, you 
can try ''nomagicpixel=2'', which will try to trigger on the window-minimize 
command and restore it to fullscreen (this will cause a short screen flickering 
effect). Note that ''nomagicpixel=2'' will make your ThinClient unusable when 
trying to run the actual X2Go-TCE client as a virtual machine guest (the 
//X2GoServer// you connect to may be a VM guest, no problems there). To live 
with the magic pixel bug, simply do not add this option at all.
+   * 
''pubkey=tftp|http|https|ftp://your-http-server-ip-or-dns-here/x2go-tce/x2go-tce.authorized_keys''
 - Allows you to add an ssh public key file to the ThinClient, so your 
administrators can log in remotely using SSH. Note that this file needs to be 
chmodded 644, not 600, on the web server.  **Attention: Whoever manages to 
spoof this server name will have root access to your ThinClients.** Using HTTPS 
will mitigate this - an attacker would not only have to spoof
the server name, but also the matching certificate.
   *  ''session=sessionname'' - use this to specify a session by name that should be 
pre-selected on startup. The name must be listed in the sessions file and may only 
contain characters from the following charset: //a-zA-Z0-9.:/ _-// (We suggest naming the 
default session ''default'' and using ''session=default''.) When using a session name 
with blanks, please enclose the sessionname in either single or double quotes, like so: 
''session="session name"'' / ''session='session name'''
-   * ''tcpprint'' - Will allow you to use local LPT/USB printers like "dumb" network 
printers (listening to port 9100 and above). Requires MAC->IP mapping in DHCP server (and 
optionally, DNS->IP mapping), or static IPs - else your print jobs will end up on random 
devices. This setup is preferred over the X2GoClient's built-in printing for locally attached 
printers if X2GoServer and ThinClients are on the same network. It is not recommended when your
X2Go connection goes across the internet or when the ThinClient is actually a laptop roaming between different networks. **Attention:** When used without ''tcpprintonlyfrom'' (see below), this means anyone that can reach your thin client via e.g. ping can also send print jobs to it! - * ''tcpprintonlyfrom=x.x.x.x'' - Will allow you to specify which IP address may connect to Port 9100 and above for printing to a locally attached LPT/USB printer. This should be the IP of your CUPS server or whatever print server system you use. Understands the same syntax as xinetd's ''only_from''. + * ''tcpprint'' - Will allow you to use local LPT/USB printers like "dumb" network printers (listening to port 9100 and above). Requires MAC->IP mapping in DHCP server (and optionally, DNS->IP mapping), or static IPs - else your print jobs will end up on random devices. This setup is preferred over the X2GoClient's built-in printing for locally attached printers if X2GoServer and ThinClients are on the same network. It is not recommended when your X2Go connection goes across the internet or when the ThinClient is actually a laptop roaming between different networks. **Attention: When used without ''tcpprintonlyfrom'' (see below), this means anyone that can reach your thin client via e.g. ping can also send print jobs to it!** + * ''tcpprintonlyfrom=x.x.x.x'' - Will allow you to specify which IP address may connect to Port 9100 and above for printing to a locally attached LPT/USB printer. This should be the IP of your CUPS server or whatever print server system you use. Understands the same syntax as ''xinetd'''s ''only_from''. * ''throttle=n|n:n:n:n:n'' - Will throttle down- and upload speed (''throttle=n'') or set throttling limits as follows: download:upload:smoothingtime:smoothinglength:latency. Defaults for up- and download are 10 (KiloBytes/s), 3.0 (seconds, using decimals is permitted) smoothingtime, 20 (KiloBytes), 0 (ms). for a detailed description of these
parameters, see "man trickle". You can use the first 1, 2, 3, 4 or all 5 parameters. To 
set down- and/or upload speed to unlimited, use the letter "u" instead of a numeric value.
   * ''xinerama=left-of|right-of|above|below|same-as'' - Allows you to specify how 
multiple screens are handled (same-as clones the primary screen to all secondary screens, 
the other commands will cascade and thus expand the screen). Note that the current 
implementation will enforce "same-as" if it detects a touch screen driver 
(wacom) and no other pointing device. This is so you won't get stuck being unable to log 
off, for example, due to your touch device being limited to one screen.
   * ''xorg-resolution=HRESxVRES'' - will force the horizontal resolution to 
HRES and the vertical resolution to VRES, e.g. ''xorg-resolution=1280x1024'', 
useful if autodetection for the correct screen size fails, but you do get as 
far as seeing the X2Go GUI
-   *
''xorgconfurl=tftp|http|https|ftp://your-http-server-ip-or-dns-here/x2go-tce/x2go-tce.xorg.conf''
 - when a client outright refuses to boot into the graphical X2Go login screen, 
but gets stuck at the console or a black screen instead, yet you can get the 
GUI to work using a regular Linux on the same hardware, you can disable the X 
Server's autodetection and force it to use the xorg.conf specified here.  Note 
that you should use a more descriptive name for the file, as described below. 
Also note that whoever manages to spoof the server name can inject rogue xorg 
config files into your ThinClients.  To mitigate this risk, use HTTPS, where 
the attacker would have to spoof both server name and matching certificate.
+   * 
''xorgconfurl=tftp|http|https|ftp://your-http-server-ip-or-dns-here/x2go-tce/x2go-tce.xorg.conf''
 - when a client outright refuses to boot into the graphical X2Go login screen, 
but gets stuck at the console or a black screen instead, yet you can get the 
GUI to work using
a regular Linux on the same hardware, you can disable the X Server's 
autodetection and force it to use the xorg.conf specified here.  Note that you 
should use a more descriptive name for the file, as described below. 
**Attention: Whoever manages to spoof the server name can inject rogue xorg 
config files into your ThinClients.**  To mitigate this risk, use HTTPS, where 
the attacker would have to spoof both server name and matching certificate.
=== These are only intended to be used with TCE images stored on local media ===
   * ''bwlimit=nnn'' - Will allow you to specify a bandwidth limit (valid 
values: 1-100) in percent for the backgrounded update task.
   * ''ntfs-uuid='' - Will be required for updating images stored on NTFS filesystems. 
Full UUID as shown under /dev/disk/by-uuid/ is preferred, but can work with the volume 
serial number shown in the output of "vol c:" as well.
   * ''updatesleep=nnnnn'' - Will allow you to specify the upper limit (in 
seconds) of the update
timer's randomizer.  Allowed range for upper limit: 240-32767. Will default to 
900 if unset or set to an out-of-range value. Lower limit is fixed at 120 
seconds.
- * ''updateurl=rsync|https|http|ftp://your-http-server-ip-or-dns-here/path-to-update-files'' - Will allow you to update an image in the background when using local storage instead of PXE. Download task will start at a randomized interval to avoid unintentional dDOSing of the update server/network infrastructure. The updater will even work when using NTFS for local storage, but only if the //toram// boot option is used. Regardless of NTFS or not, the updater requires three directories: ''/boot/X2Go-live1, /boot/X2Go-live2, /boot/X2Go-live-download'' **Attention:** Whoever manages to spoof the server name can deploy rogue images to your ThinClients. Even though it is slower, using an HTTPS web server is the safer way of doing this. Be sure that your web server delivers a last-modified header for all files. + * ''updateurl=rsync|https|http|ftp://your-http-server-ip-or-dns-here/path-to-update-files'' - Will allow you to update an image in the background when using local storage instead of PXE. Download task will start at a randomized interval to avoid unintentional dDOSing of the update server/network infrastructure. The updater will even work when using NTFS for local storage, but only if the //toram// boot option is used. Regardless of NTFS or not, the updater requires three directories: ''/boot/X2Go-live1, /boot/X2Go-live2, /boot/X2Go-live-download''. **Attention: Whoever manages to spoof the server name can deploy rogue images to your ThinClients.** Even though it is slower, using an HTTPS web server is the safer way of doing this. Be sure that your web server delivers a last-modified header for all files. ===== Querying X2Go-TCE version info ===== images built using the https://github.com/LinuxHaus/live-build-x2go::feature/openbox repository/branch after 2017-07-27 10:50 UTC
will create a file ''/var/run/x2go-timestamps''.

--
This mail was generated by DokuWiki at
https://wiki.x2go.org/

_______________________________________________
x2go-commits mailing list
[email protected]
https://lists.x2go.org/listinfo/x2go-commits

Reply via email to