[FUG-BR] aplicacoes X atraves do canal SSH

Nilton Jose Rizzo rizzo em i805.com.br
Seg Mar 20 12:31:19 BRT 2006


On Mon, 20 Mar 2006 16:17:14 +0100, Nader Amadeu wrote
> On Fri, Mar 17, 2006 at 12:00:03PM -0300, Rainer Alves wrote:
> > 
> > # ssh -Y usuario em host
> > # xclock &
> > 
> A variavel DISPLAY continua indefinida e eu nao consigo achar 
> o numero do canal pelo netstat. 
> Alguem sabe como encontrar o numero do canal SSH pelo qual
> o localhost:canal acessa meu monitor local?
> 
> Agradeco por todas as dicas, nader.

Normalmente eu uso a seguinte opção:

ssh -X -A -f 10.0.0.1 xterm -fg green -bg black -sb -T SERVER

Esse comando abre um terminal (xterm) com a cor das letras verde cor de fundo
preto com barra de rolagem e título SERVER

do man do ssh
  
     -A      Enables forwarding of the authentication agent connection.  This
             can also be specified on a per-host basis in a configuration
             file.

             Agent forwarding should be enabled with caution.  Users with the
             ability to bypass file permissions on the remote host (for the
             agent's Unix-domain socket) can access the local agent through
             the forwarded connection.  An attacker cannot obtain key material
             from the agent, however they can perform operations on the keys
             that enable them to authenticate using the identities loaded into
             the agent.

     -X      Enables X11 forwarding.  This can also be specified on a per-host
             basis in a configuration file.

             X11 forwarding should be enabled with caution.  Users with the
             ability to bypass file permissions on the remote host (for the
             user's X authorization database) can access the local X11 display
             through the forwarded connection.  An attacker may then be able
             to perform activities such as keystroke monitoring.

     -f      Requests ssh to go to background just before command execution.
             This is useful if ssh is going to ask for passwords or
             passphrases, but the user wants it in the background.  This
             implies -n.  The recommended way to start X11 programs at a
             remote site is with something like ssh -f host xterm.



> 
> ############ mensagem original ##################
> 
> Ola a todos,
> quero fazer ssh do meu FBSD 6 em uma Sun Solaris 9
> e usar aplicacoes X. Por default Solaris tenta
> redirecionar o X externamente ao canal ssh
> (setenv DISPLAY  remotehost:0.0). Quero usar
> o canal SSH (tipo setenv DISPLAY  localhost:10 ou coisa assim).
> O problem a eh que nao consigo achar o canal SSH que o Solaris
> estah usando. O netstat  da Sun fornece isso qudo estou remotamente logado:
> 
> sunmachine.ssh        local.desktop.com.52575 66608     47 66608     
>  0 ESTABLISHED
> 
> Aprendi que o numero do canal encriptado deveria estar ai, mas
> nao o encontro. Tentei localhost:10 , 11, 12 ...
> Com outras maquinas isso eh setado automaticamente e funciona.
> Instalei um novo OpenSSH (SSH Version Sun_SSH_1.0.1, protocol 
> versions 1.5/2.0) pra ver se resolveria, mas nao.
> 
> _______________________________________________
> freebsd mailing list
> freebsd em fug.com.br
> http://lists.fug.com.br/listinfo.cgi/freebsd-fug.com.br


--
Nilton José Rizzo
805 Informatica
021 2413 9786

_______________________________________________
freebsd mailing list
freebsd em fug.com.br
http://lists.fug.com.br/listinfo.cgi/freebsd-fug.com.br



Mais detalhes sobre a lista de discussão freebsd