[FSUG PD] forward di ssh in x con xauth
alex
alexxmed a libero.it
Dom 8 Lug 2007 02:06:50 CEST
questo pomeriggio mi si chiese una configurazione di ssh che gestisca il
forward di X in oggetto. Eccola:
per ssh_config:
Host *
ForwardAgent yes
ForwardX11 no
ForwardX11Trusted yes
# RhostsRSAAuthentication no
# RSAAuthentication yes
# PasswordAuthentication yes
# HostbasedAuthentication no
# BatchMode no
# CheckHostIP yes
# AddressFamily any
# ConnectTimeout 0
StrictHostKeyChecking ask
# IdentityFile ~/.ssh/identity
# IdentityFile ~/.ssh/id_rsa
IdentityFile ~/.ssh/id_dsa
Port 22
Protocol 2
# Cipher 3des
# Ciphers
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
# EscapeChar ~
# Tunnel no
# TunnelDevice any:any
# PermitLocalCommand no
SendEnv LANG LC_*
HashKnownHosts yes
#HashKnownHosts no
#GSSAPIAuthentication yes
#GSSAPIDelegateCredentials no
************************************
per sshd_conf:
# What ports, IPs and protocols we listen for
Port 22
Protocol 2
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
#Privilege Separation is turned on for security
UsePrivilegeSeparation yes
# Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 3600
ServerKeyBits 768
# Logging
SyslogFacility AUTH
LogLevel INFO
# Authentication:
LoginGraceTime 600
PermitRootLogin yes
#StrictModes yes
#RSAAuthentication yes
PubkeyAuthentication yes
# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
# Uncomment if you don't trust ~/.ssh/known_hosts for
RhostsRSAAuthentication
#IgnoreUserKnownHosts yes
# To enable empty passwords, change to yes (NOT RECOMMENDED)
PermitEmptyPasswords no
# Change to no to disable s/key passwords
ChallengeResponseAuthentication yes
#was commented
# Change to yes to enable tunnelled clear text passwords
PasswordAuthentication no
# To change Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#AFSTokenPassing no
#KerberosTicketCleanup no
# Kerberos TGT Passing does only work with the AFS kaserver
#KerberosTgtPassing yes
X11Forwarding yes
AllowTcpForwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
KeepAlive yes
#UseLogin no
#MaxStartups 10:30:60
#Banner /etc/issue.net
Subsystem sftp /usr/lib/openssh/sftp-server
UsePAM yes
***********************
un altro file dev'esser modificato:
in /etc/X11/xinit/xserverrc
dev'esser tolto:
-nolisten tcp
A.
p.s.: il tutto da per scontato diverse cose, in primis che vi aggrada la
configurazione di ssh che ho scelto, a parer mio abbastanza sicura, a
parer di altri forse paranoica, altri potrebbero giudicarla follemente
aperta :)
p.p.s.: do anche per scontata una configurazione di base di ssh. Se
qualcuno volesse una mano faccia un fischio.
p.p.p..s.: in realta' questa non e' la mia configurazione di default, pero'
mi sono preso la briga di testarla e funziona bene.
Maggiori informazioni sulla lista
fsug-pd