Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 01 Jan 2010 22:41:13 -0500
From:      "Karl J. Runge" <runge@karlrunge.com>
To:        wblock@wonkity.com, runge@karlrunge.com
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Remote assistance for X
Message-ID:  <E1NQurZ-00056X-00@haystack.runge.home>
In-Reply-To: Mail from 'Warren Block <wblock@wonkity.com>' dated: Fri, 1 Jan 2010 19:53:15 -0700 (MST)

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 1 Jan 2010, Warren Block <wblock@wonkity.com> wrote:
> 
> ssh -t -c blowfish -N -f -L 5500:$supporterhost:5500 $supporterhost && \
> x11vnc -display :0 -localhost -connect localhost -ncache 10

I think that will work, but I believe (for extra safety/clarity if nothing
else) you really want:

   -L 5500:localhost:5500

in the ssh command.

Note that for -L the ending host:port part is relative to the *sshd*
(ssh-server) side.

So, if I understand what you want, you might as well use localhost:5500
instead of $supporterhost:5500.  Also, if $supporterhost is that of an
internet firewall/router doing port forwarding, $supporterhost might
not resolve properly on the "supporterhost", or leak back out to the
internet in a weird way.

Symmetrically: for -R the ending host:port part is relative to the ssh
(ssh-client) side.


Here are some examples that should work, I provide "prompt>" to indicate
which machine the command is run on (and I skip your -c preference):

   supportee_host> ssh -t -N -f -L 5500:localhost:5500 $supporter_host && \
                   x11vnc -display :0 -connect_or_exit localhost:0 -rfbport 0

which should be the same as:

   supportee_host> x11vnc -display :0 -proxy ssh://$supporter_host \
                   -connect_or_exit localhost:0 -rfbport 0

i.e. x11vnc has a built-in -proxy that already does what you want it
to do; it runs ssh(1) for you:

   http://www.karlrunge.com/x11vnc/x11vnc_opts.html#opt-proxy

Note how I use -connect_or_exit instead of -connect to try to avoid
problems if the connection fails:

   http://www.karlrunge.com/x11vnc/x11vnc_opts.html#opt-connect_or_exit

I also use the '-rfbport 0' described there to prevent x11vnc from listening
for any connections (which I think is what you want.)

Aside: Originally I thought you could ssh into supportee_host, for anyone
looking to do that here is the analogous command:

   supporter_host> ssh -t -N -f -R 5500:localhost:5500 $supportee_host \
                   x11vnc -display :0 -connect_or_exit localhost:0 -rfbport 0


In all cases supporter_host is running:

   supporter_host> vncviewer -listen 0

(or ssvncviewer -listen 0 if you have SSVNC)

> ...
> That looks more elegant.  Are the security and speed comparable to ssh?

Speed shouldn't be a problem; I believe both ssh and 'x11vnc -ssl' use
OpenSSL for encrypting the session traffic.  If a machine is *really*
slow the choice of encryption cipher may be noticable (I don't see a
big effect even on a 300MHz test machine I have.)

Security-wise, of course 'ssh' is used much more than 'x11vnc -ssl'.

For both ssh and 'x11vnc -ssl' if the certificate/key is not verified
by an external means one is susceptible to man-in-the-middle-attack.
However w/o verification at least both are safe against passive network
sniffing.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E1NQurZ-00056X-00>