home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.os.linux.slackware      I think its the one without Selinux crap      87,272 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 86,022 of 87,272   
   Henrik Carlqvist to Harold Johanssen   
   Re: xhost not working under TigerVNC   
   22 Oct 22 10:01:41   
   
   From: Henrik.Carlqvist@deadspam.com   
      
   On Fri, 21 Oct 2022 23:37:13 +0000, Harold Johanssen wrote:   
      
   > I have a Slackware 15.0 host A running a TigerVNC session on display 1.   
   > I can connect to that session from another Slackware 15.0 system with   
   > vncviewer tunneled within an sshSSH channel. I can also ssh into B from   
   > a terminal emulator in A.   
   >   
   > 	What I would like to do is the following:   
   >   
   > 	1. In the TigerVNC session in A launch a terminal emulator and   
   > ssh from it into B.   
   >   
   > 	2. At the ssh session in B created above send some graphical   
   > output to the TigerVNC session in A.   
   >   
   > 	Step two does not work - I keep getting 'Can't open display: A:   
   > 1.0'.   
   >   
   > 	I thought that the way to do pull this off consisted of executing   
   > the following commands in a terminal emulator in the TigerVNC session in   
   > A:   
   >   
   > 	$ export DISPLAY=A:1.0 $ xhost +B   
   >   
   > The thing is, this makes no difference.   
      
   > 	Any idea on how to solve this?   
      
   As Rich said, the easiest solution and the solution nowadays used in most   
   cases is probably X forwarding with ssh.   
      
   That said, if you don't want your X traffic encrypted for some reason   
   there are a number of obstacles nowadays to use X networked traffic the   
   way it used to work...   
      
   First of all: Is the X server listening on tcp port 6000 + display   
   number? By default, at least Xorg does not do that anymore unless you   
   start Xorg with the switch "-listen tcp".   
      
   Secaond: Will the X server allow the X client to connect? As Rich said,   
   "xhost +the_client" might help if you run it on the server with the   
   DISPLAY variable pointing to the local DISPLAY of that X server. However,   
   you might also have to read up on the man pages of xauth and Xsecurity.   
      
   All this trouble of allowing other machines to connect and manually   
   setting displays can be avoided with ssh X tunneling which is considered   
   a safer choice. That is probably the reason that many X servers nowadays   
   by default does not allow connections from the network.   
      
   If you on machine A is able to put a local window like "xclock" on the   
   display that you want you will be able to also get windows from machine B   
   on that display if you on machine A do:   
      
   ssh -Y B   
      
   For many X programs it will be enough to do:   
      
   ssh -X B   
      
   But some programs will not work unless you use the -Y switch instead of -   
   B.   
      
   Once logged in on machine B with the choosen command above you will find   
   that the environment variable DISPLAY already has been set. It will   
   probably be set to something like:   
      
   DISPLAY=localhost:11.0   
      
   When you start some X program like xclock it will connect to tcp port   
   localhost:6011 which is served by the sshd deamon and that will redirect   
   all X traffic through the ssh connection to machine A where it is   
   connected to the display given by the DISPLAY variable of the ssh process   
   on machine A.   
      
   For all this to work, om machine B you must make sure that sshd allows X   
   forwarding. In /etc/ssh/ssdh_config you should have the line:   
      
   X11Forwarding yes   
      
   To allways tunnel X traffic when you start the ssh client you can on   
   machine A add the following lines to /etc/ssh/ssh_config:   
      
      ForwardX11 yes   
      ForwardX11Trusted yes   
      
   The first line will be like allways starting with switch -X, also adding   
   the second line will be like allways starting with switch -Y.   
      
   The file /etc/ssh/ssh_cofig affects all users, if you don't want to do   
   that, or if you don't have root on that machine, you can also have your   
   own  ~/.ssh/config with those lines. However, to allow the ssh server to   
   accept X11 forwarding you will need root access to machine B.   
      
   If the administrator on machine B has decided not to allow X11 tunneling   
   or if you for some reason don't want to encrypt the X traffic you will   
   have to resort to the old way of tcp connections on network interfaces   
   for the unencrypted X traffic.   
      
   regards Henrik   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca