Date: Fri, 01 Jan 2010 22:41:13 -0500 From: "Karl J. Runge" <runge@karlrunge.com> To: wblock@wonkity.com, runge@karlrunge.com Cc: freebsd-questions@freebsd.org Subject: Re: Remote assistance for X Message-ID: <E1NQurZ-00056X-00@haystack.runge.home> In-Reply-To: Mail from 'Warren Block <wblock@wonkity.com>' dated: Fri, 1 Jan 2010 19:53:15 -0700 (MST)
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 1 Jan 2010, Warren Block <wblock@wonkity.com> wrote: > > ssh -t -c blowfish -N -f -L 5500:$supporterhost:5500 $supporterhost && \ > x11vnc -display :0 -localhost -connect localhost -ncache 10 I think that will work, but I believe (for extra safety/clarity if nothing else) you really want: -L 5500:localhost:5500 in the ssh command. Note that for -L the ending host:port part is relative to the *sshd* (ssh-server) side. So, if I understand what you want, you might as well use localhost:5500 instead of $supporterhost:5500. Also, if $supporterhost is that of an internet firewall/router doing port forwarding, $supporterhost might not resolve properly on the "supporterhost", or leak back out to the internet in a weird way. Symmetrically: for -R the ending host:port part is relative to the ssh (ssh-client) side. Here are some examples that should work, I provide "prompt>" to indicate which machine the command is run on (and I skip your -c preference): supportee_host> ssh -t -N -f -L 5500:localhost:5500 $supporter_host && \ x11vnc -display :0 -connect_or_exit localhost:0 -rfbport 0 which should be the same as: supportee_host> x11vnc -display :0 -proxy ssh://$supporter_host \ -connect_or_exit localhost:0 -rfbport 0 i.e. x11vnc has a built-in -proxy that already does what you want it to do; it runs ssh(1) for you: http://www.karlrunge.com/x11vnc/x11vnc_opts.html#opt-proxy Note how I use -connect_or_exit instead of -connect to try to avoid problems if the connection fails: http://www.karlrunge.com/x11vnc/x11vnc_opts.html#opt-connect_or_exit I also use the '-rfbport 0' described there to prevent x11vnc from listening for any connections (which I think is what you want.) Aside: Originally I thought you could ssh into supportee_host, for anyone looking to do that here is the analogous command: supporter_host> ssh -t -N -f -R 5500:localhost:5500 $supportee_host \ x11vnc -display :0 -connect_or_exit localhost:0 -rfbport 0 In all cases supporter_host is running: supporter_host> vncviewer -listen 0 (or ssvncviewer -listen 0 if you have SSVNC) > ... > That looks more elegant. Are the security and speed comparable to ssh? Speed shouldn't be a problem; I believe both ssh and 'x11vnc -ssl' use OpenSSL for encrypting the session traffic. If a machine is *really* slow the choice of encryption cipher may be noticable (I don't see a big effect even on a 300MHz test machine I have.) Security-wise, of course 'ssh' is used much more than 'x11vnc -ssl'. For both ssh and 'x11vnc -ssl' if the certificate/key is not verified by an external means one is susceptible to man-in-the-middle-attack. However w/o verification at least both are safe against passive network sniffing.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E1NQurZ-00056X-00>