Quote:
Originally Posted by Turbocapitalist
I won't suggest SSH with X11 forwarding to run individual graphical programs since that is not what you want and there will likely be too much latency to be enjoyable.
|
I'm actually using X11 over tcp(as described in the first post in excruciating detail). It is the same thing as "ssh with x11 forwarding" minus the ssh. I found some software (xterm) runs great, no perceptible delay at all. Some software (Chrome) is kinda usable. Some software (Firefox, alacritty) is 100% unusable. But I settled on xterm and chrome so this is my solution for now.
Quote:
Originally Posted by Turbocapitalist
However, there are two misunderstandings to address regarding OpenSSH server since you brought them up:
<digression>
1) A reverse tunnel would punch through any firewalls.
|
Seriously? I may as well set up a socks5 proxy with a reverse ssh tunnel,access my clients network like this, and do away with using the laptop altogether, until they fire my arse rightfully so for blatant disregard of their security policy.
Quote:
2) Newer versions OpenSSH can still run under non-root accounts, that hasn't changed. You do need to use a high port and you do need to specify different host key files (no passphrases) which will have to be manually generated prior to first run:
Code:
ssh-keygen -t ed25519 -f /home/luk/.ssh/ssh_host_key_ed25519
ssh-keygen -t ecdsa -f /home/luk/.ssh/ssh_host_key_ecdsa
Then:
Code:
/usr/sbin/sshd -h /home/luk/.ssh/ssh_host_key_ed25519 -h /home/luk/.ssh/ssh_host_key_ecsa -p 2222
See also the -f option.
|
Have you actually tried running modern openssh version as a non root user? If it does work I'm very interested how is non root sshd performing privilege separation on login. The config option I mention in my answer below doesn't exist anymore and it's default is set to run with privilege separation only. Making sshd bomb on first login attempt when run as a normal user.
But, hey, I accept I might be wrong. If that is the case I'm open to be told otherwise by someone who has actually done it (and successfully logged on through modern sshd running as a non root/normal user).
Quote:
</digression>
So, back to your original question, the times I have tried it, X2Go worked well and was responsive but that was a while ago and it is several steps to set up.
Are the accounts you wish to connect to on the remote systems able to launch scripts or applications for you automatically either as a service or via the account's cron or via the desktop environment's autostart?
|
I'm not setting up any accounts on remote systems. This and the initial confusion about x11 forwarding makes me think you too haven't read more than the subject of my first post.
Quote:
Originally Posted by wpeckham
Quote:
OpenSSH doesn't work for non-root user since version 7.4. :-(
|
This is a false statement.
|
Have you tried it?
OpenSSH version 7.5 deprecated UsePrivilegeSeparation option that has to be set to "no" to be able to run sshd as a non root user. See this:
https://www.openssh.com/txt/release-7.5
Unless there is some change that happened since then I'm not aware of since then it has not been possible to run openssh server as a non root user. Of course I can be wrong about this, the only way to check this is to set it up and see if sshd still bombs when someone logs in when running as normal user like version 7.5 did after they deprecated this option or not.
Quote:
Originally Posted by wpeckham
No matter what you use within your local network, if it is not a hardware solution and you use firewalls on every node, you WILL need to manage openings for your control desktop machine. I cannot image why anyone would not want a hardware solution, but I accept that.
|
First, this is not true, about port openings. No one said anything about firewalling the desktop. The laptop can have incoming connections 100% firewalled and X11 over tcp will work because when you run a program on a laptop and display it's output on a desktop using x11 over the net it is the laptop that connects to the desktop. No ssh required at all.
I never said I reject a hardware solution, but no one has shown one that actually works with 4K 60Hz over eDP with EDID emulation that support 4 machines (I have 2 now, I'll have one more soon). If you have such solution that doesn't cost >$2k please do share the make, model and firmware version of the kvm switch in question. If you're using dp to hdmi adapters these too have to be described in great detail (make, model, preferably a picture of the pcb), because there are lots of adapters on the market that share the same make/model, but have completely different innards and one works with a hdmi kvm switch, others don't.
I have asked on this and other forums for a tested "hardware solution". So far I only heard "ideas" (I have lots of these too) and descriptions of grief from people that actually tried to implement them and failed.
in summary, I'm not opposed to a hardware idea, I don't believe one exists yet
There are elements of simple X11 via tcp that are preferable to kvm. Namely having windows from multiple machines on the same screen at the same time, but the simplicity of hardware kvm would override this. Had it been available.
Quote:
Originally Posted by wpeckham
I cannot image why anyone would not want a solution based upon OpenSSH, and if that would work for them why they would reject learning how to make that work,
|
Out of curiosity, what kind of "openssh based solution" did you have in mind? I've clearly demonstrated modern unmodified versions of openssh deamon can't be run by a non root user.
So I have to assume your solution contains one of:
- running an ancient or patched version of openssh possibly listening only on 127.0.0.1
- doing a reverse port forward from the laptop to the desktop so I can ssh to a port on the desktop and have it forwarded to the laptop, from the point of view of a patched sshd coming from 127.0.0.1
Let's briefly disregard how this "solution" would look like to a security scan running on a laptop (hint. like a root kit), but let's ask a question is it worth it?
I can simply run xterm like this on the laptop:
DISPLAY=desktop:0 xterm
And I'm getting response that appears same or faster than ssh. But I have to live with some Unicode glyphs being cut because xterm is not great with Unicode.
Or I can: make my own patched version of openssh/run an ancient one, risking the relationship with a client by breaking their security policy, just to be able to run alacritty over ssh that doesn't mess these Unicode glyphs. I choose option A.
Quote:
I have made all of these solutions work: a hardware solution cost more but worked best. Where I needed shell access ssh or mosh worked very well, Where I needed a gui I found VNC acceptable, but slow and laggy.
If you reject ALL of that the other solutions require more software and complexity, or going out to resources outside of your local network with the implied security and performance issues.
I like to keep it simple, secure, and reliable.
|
Yes me too, and I've used all of these too, I've explained few times why none of them is applicable in this scenario. However, let me repeat I'm very interested in learning about a hardware solution that works with eDP 4k 60hz with EDID emulation and costs less than $2k (that someone actually uses, not a baseless marketing claim).