SlideShare a Scribd company logo
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
1
Remote AdministrationRemote Administration
of Desktop Systemsof Desktop Systems
Adam John TrickettAdam John Trickett
www.iredale.net
adam.trickett@iredale.net
PGP Key: 0xAF0DB8C8
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
2
General problemGeneral problem
• You need to connect to a remote system
• You need to administer the system (upgrade, repair,
extend etc.)
• You need to see the desktop as the user sees it
• The end user may not be technical
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
3
TopologyTopology
Internet
Firewall
Router
Other
PCYour
PC
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
4
Technical problemsTechnical problems
• Where is the other PC?
• Most ISP only offer dynamic IP
• How do I get through the firewall?
• Each make and model is different
• How do I reach the PC on the inside?
• Most networks use dynamic & private IPs on the inside
• What needs to be installed on the target system?
• Not all systems have everything installed by default
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
5
Where is the other PCWhere is the other PC
• The best solution is a static IP for the router/firewall
• Standard with some ISPs
• Optional cost extra with others
• If dynamic is the only option, then:
• Some routers/firewalls will auto-update Dynamic DNS
services
• You can install a dynamic DNS client on the target PC
• You can create a script to email you the external IP
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
6
Firewall - rulesFirewall - rules
• Most sane routers allow:
• All ports outbound
• All ports inbound that are part of an outbound pair
• All ports inbound that are not part of a pair are denied
• You will need to tell it to allow at least one port
inbound:
• Some have virtual “DMZ”
• Some have general rules
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
7
Router - ForwardingRouter - Forwarding
• The remote system's firewall/router needs to
forward incoming connections:
• of type X, e.g. tcp
• of port Y, e.g, 22
• to IP address Z, e.g. 192.168.0.10
• External port number and internal port number are
the same by default
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
8
Router – NAT/DHCPRouter – NAT/DHCP
• You need to ensure that the PC you want to reach
has the same private IP so that the NAT rule points
to the correct system every time:
• DHCP reservation using MAC address
• Static configuration in router and PC
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
9
Basic tools - SSHBasic tools - SSH
• Secure Shell (“SSH”)
• Replaces Telnet, rlogin, rsh, ftp etc
• Standard on almost all Linux/Unix systems
• Secure
• Supports port forwarding
• Creates a temporary on-demand instant “VPN-lite”
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
10
Extra toolsExtra tools
• Mobile Shell (“Mosh”)
• Deals with lost connections better than SSH
• Does not support port forwarding
• OpenVPN
• Builds a permanent secure bridge between systems
• Doesn't require user configuration to use
• Requires administrative configuration to set-up
• More complex than SSH
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
11
General installationGeneral installation
• OpenSSH server, though in all distros is not installed
by default on all of them
• Mosh is widely available but not installed by default
on most/all
• Sudo is widely available and installed by default on
many but all
• Screen is widely available but not installed by
default on most/all
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
12
Specific installationSpecific installation
• linuxvnc shares the physical console as VNC session,
useful in emergencies or headless servers
• x11vnc shares the desktop X session as a VNC
session and allows you to interact with the desktop
at the same time as the user
• There are others but I'm not going to talk about
them
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
13
Forwarding SSH portsForwarding SSH ports
• The remote system's firewall/router needs to:
• Forward TCP port on the external side to TCP port on the
target PC
• SSH normally uses tcp port 22
• Mosh normally uses udp port 60001 (and up) plus SSH to
start with only
• Many people change the external port to reduce the
noise from script kiddies
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
14
Basic AdministrationBasic Administration
• Use SSH/Mosh to connect to the remote system
• Default SSH configuration will work but you need to
harden it
• Run normal command line tools from login shell of your
choice
• Good for day to day administration and all standard tasks
• No good if you need to see what the user sees or
configure a desktop application
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
15
Harden SSHHarden SSH
• Open SSH is pretty good but it is not as secure as it
can be out of the box on most Linux distributions:
• Turn off password login – only allow SSH keys
• Turn off root login – only allow real users
• Specify the named users you want to allow
• Turn off SSH protocol 1 – it may still be turned on in some
distros
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
16
Configure SSH ClientConfigure SSH Client
• Edit your ~/.ssh/config file:
Host <machinename>* <ip address>
HostName <machinename.network.com>
user <your username on machinename>
Port <TCP port number>
ForwardX11 yes
Compression yes
LocalForward localhost:5900 localhost:5900
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
17
ProcedureProcedure
• Add your SSH-Key to your SSH-Agent
• Start your SSH session to the other system
• ssh machinename
• Your default shell starts at the other end
• Start screen
• Start any X programs
• Start x11vnc or linuxvnc
• Start your VNC client on your desktop
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
18
What does SSH forwarding do?What does SSH forwarding do?
• When you start x11vnc or linuxvnc they start to listen
on the local host of the remote system on tcp port
5900 by default
• The SSH client on your PC also listens on TCP port
5900 locally, but forwards the packets to the remote
system to its TCP port 5900
• That means an insecure protocol like VNC is now
running over a secure and compressed SSH
connection
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
19
SSH Client
TCP 5900
listen
SSH Server
TCP 22 listen
x11VNC
TCP 5900
listen
VNC Client
Secure SSH
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
20
x11vnc configurationx11vnc configuration
• To automate and get the best out of x11vnc without
end user interaction – there are a lot of options!
• Something like:
$ sudo x11vnc -nopw -localhost -ncache 10 -ncache_cr 
-q -nodpms -auth <something>
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
21
linuxvnc configurationlinuxvnc configuration
• Exports a physical terminal
• Useful if X has failed to start
• Allows you to see kernel messages etc
• Of only limited use, but nice to know
$ sudo linuxvnc 1 -alwaysshared
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
22
DemoDemo
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
23
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
24
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
25
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
26
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
27
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
28
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
29
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
30
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
31
Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence.
32
ThankThank YouYou
AnyAny
Questions?Questions?

More Related Content

What's hot (20)

XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
XPDS16:  Xenbedded: Xen-based client virtualization for phones and tablets - ...XPDS16:  Xenbedded: Xen-based client virtualization for phones and tablets - ...
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
The Linux Foundation
 
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
The Linux Foundation
 
Remote desktop win to linux
Remote desktop win to linuxRemote desktop win to linux
Remote desktop win to linux
phanleson
 
5th
5th5th
5th
Erm78
 
25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud
shira koper
 
LCA13: Xen on ARM
LCA13: Xen on ARMLCA13: Xen on ARM
LCA13: Xen on ARM
Linaro
 
Linux on Hyper-V
Linux on Hyper-VLinux on Hyper-V
Linux on Hyper-V
Tudor Damian
 
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Linaro
 
Server Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOVServer Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
Evolution of ota_update_in_the_io_t_world
Evolution of ota_update_in_the_io_t_worldEvolution of ota_update_in_the_io_t_world
Evolution of ota_update_in_the_io_t_world
Stefano Babic
 
XPDS16: A Paravirtualized Interface for Socket Syscalls - Dimitri Stiliadis, ...
XPDS16: A Paravirtualized Interface for Socket Syscalls - Dimitri Stiliadis, ...XPDS16: A Paravirtualized Interface for Socket Syscalls - Dimitri Stiliadis, ...
XPDS16: A Paravirtualized Interface for Socket Syscalls - Dimitri Stiliadis, ...
The Linux Foundation
 
VM Forking and Hypervisor-based Fuzzing with Xen
VM Forking and Hypervisor-based Fuzzing with XenVM Forking and Hypervisor-based Fuzzing with Xen
VM Forking and Hypervisor-based Fuzzing with Xen
Tamas K Lengyel
 
XPDDS17: EFI Secure Boot, Shim and Xen: Current Status and Developments - Da...
XPDDS17:  EFI Secure Boot, Shim and Xen: Current Status and Developments - Da...XPDDS17:  EFI Secure Boot, Shim and Xen: Current Status and Developments - Da...
XPDDS17: EFI Secure Boot, Shim and Xen: Current Status and Developments - Da...
The Linux Foundation
 
Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013
The Linux Foundation
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat Security Conference
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
The Linux Foundation
 
10 ways hardware engineers can make software integration easier
10 ways hardware engineers can make software integration easier10 ways hardware engineers can make software integration easier
10 ways hardware engineers can make software integration easier
Chris Simmonds
 
1184 Quayle
1184 Quayle1184 Quayle
1184 Quayle
Stanley F. Quayle
 
HP-UX Dynamic Root Disk Boot Disk Cloning Benefits and Use Cases by Dusan Bal...
HP-UX Dynamic Root Disk Boot Disk Cloning Benefits and Use Cases by Dusan Bal...HP-UX Dynamic Root Disk Boot Disk Cloning Benefits and Use Cases by Dusan Bal...
HP-UX Dynamic Root Disk Boot Disk Cloning Benefits and Use Cases by Dusan Bal...
Circling Cycle
 
LCA14: LCA14-502: The way to a generic TrustZone® solution
LCA14: LCA14-502: The way to a generic TrustZone® solutionLCA14: LCA14-502: The way to a generic TrustZone® solution
LCA14: LCA14-502: The way to a generic TrustZone® solution
Linaro
 
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
XPDS16:  Xenbedded: Xen-based client virtualization for phones and tablets - ...XPDS16:  Xenbedded: Xen-based client virtualization for phones and tablets - ...
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
The Linux Foundation
 
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
The Linux Foundation
 
Remote desktop win to linux
Remote desktop win to linuxRemote desktop win to linux
Remote desktop win to linux
phanleson
 
25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud
shira koper
 
LCA13: Xen on ARM
LCA13: Xen on ARMLCA13: Xen on ARM
LCA13: Xen on ARM
Linaro
 
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Linaro
 
Server Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOVServer Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
Evolution of ota_update_in_the_io_t_world
Evolution of ota_update_in_the_io_t_worldEvolution of ota_update_in_the_io_t_world
Evolution of ota_update_in_the_io_t_world
Stefano Babic
 
XPDS16: A Paravirtualized Interface for Socket Syscalls - Dimitri Stiliadis, ...
XPDS16: A Paravirtualized Interface for Socket Syscalls - Dimitri Stiliadis, ...XPDS16: A Paravirtualized Interface for Socket Syscalls - Dimitri Stiliadis, ...
XPDS16: A Paravirtualized Interface for Socket Syscalls - Dimitri Stiliadis, ...
The Linux Foundation
 
VM Forking and Hypervisor-based Fuzzing with Xen
VM Forking and Hypervisor-based Fuzzing with XenVM Forking and Hypervisor-based Fuzzing with Xen
VM Forking and Hypervisor-based Fuzzing with Xen
Tamas K Lengyel
 
XPDDS17: EFI Secure Boot, Shim and Xen: Current Status and Developments - Da...
XPDDS17:  EFI Secure Boot, Shim and Xen: Current Status and Developments - Da...XPDDS17:  EFI Secure Boot, Shim and Xen: Current Status and Developments - Da...
XPDDS17: EFI Secure Boot, Shim and Xen: Current Status and Developments - Da...
The Linux Foundation
 
Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013
The Linux Foundation
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat Security Conference
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
The Linux Foundation
 
10 ways hardware engineers can make software integration easier
10 ways hardware engineers can make software integration easier10 ways hardware engineers can make software integration easier
10 ways hardware engineers can make software integration easier
Chris Simmonds
 
HP-UX Dynamic Root Disk Boot Disk Cloning Benefits and Use Cases by Dusan Bal...
HP-UX Dynamic Root Disk Boot Disk Cloning Benefits and Use Cases by Dusan Bal...HP-UX Dynamic Root Disk Boot Disk Cloning Benefits and Use Cases by Dusan Bal...
HP-UX Dynamic Root Disk Boot Disk Cloning Benefits and Use Cases by Dusan Bal...
Circling Cycle
 
LCA14: LCA14-502: The way to a generic TrustZone® solution
LCA14: LCA14-502: The way to a generic TrustZone® solutionLCA14: LCA14-502: The way to a generic TrustZone® solution
LCA14: LCA14-502: The way to a generic TrustZone® solution
Linaro
 

Viewers also liked (9)

Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?
Aventis Systems, Inc.
 
Controlling remote pc using mobile
Controlling remote pc using mobileControlling remote pc using mobile
Controlling remote pc using mobile
Archana Maharjan
 
Microsoft Remote Desktop Services
Microsoft Remote Desktop ServicesMicrosoft Remote Desktop Services
Microsoft Remote Desktop Services
Ronnie Isherwood
 
Comparison of windows linux and mac os
Comparison of windows linux and mac osComparison of windows linux and mac os
Comparison of windows linux and mac os
Ali Zar
 
Features of windows operating system
Features of windows operating systemFeatures of windows operating system
Features of windows operating system
Mohammad Alig
 
comparing windows and linux ppt
comparing windows and linux pptcomparing windows and linux ppt
comparing windows and linux ppt
Shivalik college of engineering
 
Operating system and its function
Operating system and its functionOperating system and its function
Operating system and its function
Nikhi Jain
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
Jesus Obenita Jr.
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)
Vaibhav Bajaj
 
Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?Remote Desktop Services - Who Needs It?
Remote Desktop Services - Who Needs It?
Aventis Systems, Inc.
 
Controlling remote pc using mobile
Controlling remote pc using mobileControlling remote pc using mobile
Controlling remote pc using mobile
Archana Maharjan
 
Microsoft Remote Desktop Services
Microsoft Remote Desktop ServicesMicrosoft Remote Desktop Services
Microsoft Remote Desktop Services
Ronnie Isherwood
 
Comparison of windows linux and mac os
Comparison of windows linux and mac osComparison of windows linux and mac os
Comparison of windows linux and mac os
Ali Zar
 
Features of windows operating system
Features of windows operating systemFeatures of windows operating system
Features of windows operating system
Mohammad Alig
 
Operating system and its function
Operating system and its functionOperating system and its function
Operating system and its function
Nikhi Jain
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)
Vaibhav Bajaj
 

Similar to Remote Desktop Administration (Linux/X11) (20)

Using Secure Shell on Linux: What Everyone Should Know
Using Secure Shell on Linux: What Everyone Should KnowUsing Secure Shell on Linux: What Everyone Should Know
Using Secure Shell on Linux: What Everyone Should Know
Novell
 
Remote Login- Noesis
Remote Login- NoesisRemote Login- Noesis
Remote Login- Noesis
Sourav Roy
 
RemoteAdmin.pptx
RemoteAdmin.pptxRemoteAdmin.pptx
RemoteAdmin.pptx
hoangdinhhanh88
 
Medusa Project
Medusa ProjectMedusa Project
Medusa Project
Sameer Verma
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH Configuration
Vinod Gour
 
PLNOG16: Ochrona AntiDDoS, lokalnie oraz w chmurze, Paweł Wachełka
PLNOG16: Ochrona AntiDDoS, lokalnie oraz w chmurze, Paweł WachełkaPLNOG16: Ochrona AntiDDoS, lokalnie oraz w chmurze, Paweł Wachełka
PLNOG16: Ochrona AntiDDoS, lokalnie oraz w chmurze, Paweł Wachełka
PROIDEA
 
Linux red hat overview and installation
Linux red hat overview and installationLinux red hat overview and installation
Linux red hat overview and installation
devenderbhati
 
Bh usa-01-kaminsky
Bh usa-01-kaminskyBh usa-01-kaminsky
Bh usa-01-kaminsky
Dan Kaminsky
 
RHEL5 XEN HandOnTraining_v0.4.pdf
RHEL5 XEN HandOnTraining_v0.4.pdfRHEL5 XEN HandOnTraining_v0.4.pdf
RHEL5 XEN HandOnTraining_v0.4.pdf
Paul Yang
 
Installation Methods for Linux on System z without Repository Server
Installation Methods for Linux on System z without Repository ServerInstallation Methods for Linux on System z without Repository Server
Installation Methods for Linux on System z without Repository Server
IBM India Smarter Computing
 
Software update for IoT Embedded World 2017
Software update for IoT Embedded World 2017Software update for IoT Embedded World 2017
Software update for IoT Embedded World 2017
Chris Simmonds
 
Course 102: Lecture 9: Input Output Internals
Course 102: Lecture 9: Input Output Internals Course 102: Lecture 9: Input Output Internals
Course 102: Lecture 9: Input Output Internals
Ahmed El-Arabawy
 
Apache HttpD Web Server - Hardening and other Security Considerations
Apache HttpD Web Server - Hardening and other Security ConsiderationsApache HttpD Web Server - Hardening and other Security Considerations
Apache HttpD Web Server - Hardening and other Security Considerations
Andrew Carr
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
Amandeep Singh
 
MOE Ubuntu Desktop training
MOE Ubuntu Desktop trainingMOE Ubuntu Desktop training
MOE Ubuntu Desktop training
Khairul Aizat Kamarudzzaman
 
OSSNA18: Xen Beginners Training
OSSNA18: Xen Beginners Training OSSNA18: Xen Beginners Training
OSSNA18: Xen Beginners Training
The Linux Foundation
 
Linux
Linux Linux
Linux
Kevin James
 
Large Scale Deployment of Linux
Large Scale Deployment of LinuxLarge Scale Deployment of Linux
Large Scale Deployment of Linux
Kshitij Agarwal
 
linuxredhatoverviewandinstallation-121012094248-phpapp01 (1).pdf
linuxredhatoverviewandinstallation-121012094248-phpapp01 (1).pdflinuxredhatoverviewandinstallation-121012094248-phpapp01 (1).pdf
linuxredhatoverviewandinstallation-121012094248-phpapp01 (1).pdf
EduclentMegasoftel
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN Concentrator
Ronald Bartels
 
Using Secure Shell on Linux: What Everyone Should Know
Using Secure Shell on Linux: What Everyone Should KnowUsing Secure Shell on Linux: What Everyone Should Know
Using Secure Shell on Linux: What Everyone Should Know
Novell
 
Remote Login- Noesis
Remote Login- NoesisRemote Login- Noesis
Remote Login- Noesis
Sourav Roy
 
Telnet & SSH Configuration
Telnet & SSH ConfigurationTelnet & SSH Configuration
Telnet & SSH Configuration
Vinod Gour
 
PLNOG16: Ochrona AntiDDoS, lokalnie oraz w chmurze, Paweł Wachełka
PLNOG16: Ochrona AntiDDoS, lokalnie oraz w chmurze, Paweł WachełkaPLNOG16: Ochrona AntiDDoS, lokalnie oraz w chmurze, Paweł Wachełka
PLNOG16: Ochrona AntiDDoS, lokalnie oraz w chmurze, Paweł Wachełka
PROIDEA
 
Linux red hat overview and installation
Linux red hat overview and installationLinux red hat overview and installation
Linux red hat overview and installation
devenderbhati
 
Bh usa-01-kaminsky
Bh usa-01-kaminskyBh usa-01-kaminsky
Bh usa-01-kaminsky
Dan Kaminsky
 
RHEL5 XEN HandOnTraining_v0.4.pdf
RHEL5 XEN HandOnTraining_v0.4.pdfRHEL5 XEN HandOnTraining_v0.4.pdf
RHEL5 XEN HandOnTraining_v0.4.pdf
Paul Yang
 
Installation Methods for Linux on System z without Repository Server
Installation Methods for Linux on System z without Repository ServerInstallation Methods for Linux on System z without Repository Server
Installation Methods for Linux on System z without Repository Server
IBM India Smarter Computing
 
Software update for IoT Embedded World 2017
Software update for IoT Embedded World 2017Software update for IoT Embedded World 2017
Software update for IoT Embedded World 2017
Chris Simmonds
 
Course 102: Lecture 9: Input Output Internals
Course 102: Lecture 9: Input Output Internals Course 102: Lecture 9: Input Output Internals
Course 102: Lecture 9: Input Output Internals
Ahmed El-Arabawy
 
Apache HttpD Web Server - Hardening and other Security Considerations
Apache HttpD Web Server - Hardening and other Security ConsiderationsApache HttpD Web Server - Hardening and other Security Considerations
Apache HttpD Web Server - Hardening and other Security Considerations
Andrew Carr
 
Large Scale Deployment of Linux
Large Scale Deployment of LinuxLarge Scale Deployment of Linux
Large Scale Deployment of Linux
Kshitij Agarwal
 
linuxredhatoverviewandinstallation-121012094248-phpapp01 (1).pdf
linuxredhatoverviewandinstallation-121012094248-phpapp01 (1).pdflinuxredhatoverviewandinstallation-121012094248-phpapp01 (1).pdf
linuxredhatoverviewandinstallation-121012094248-phpapp01 (1).pdf
EduclentMegasoftel
 
Infrastructure management using a VPN Concentrator
Infrastructure management using a VPN ConcentratorInfrastructure management using a VPN Concentrator
Infrastructure management using a VPN Concentrator
Ronald Bartels
 

More from Adam Trickett (13)

Energy Monitoring At Home
Energy Monitoring At HomeEnergy Monitoring At Home
Energy Monitoring At Home
Adam Trickett
 
Desktop Virtualisation
Desktop VirtualisationDesktop Virtualisation
Desktop Virtualisation
Adam Trickett
 
How To Live a Low CO2 Life
How To Live a Low CO2 LifeHow To Live a Low CO2 Life
How To Live a Low CO2 Life
Adam Trickett
 
How to Review a Book (For Hants-LUG)
How to Review a Book (For Hants-LUG)How to Review a Book (For Hants-LUG)
How to Review a Book (For Hants-LUG)
Adam Trickett
 
How-to Impress
How-to ImpressHow-to Impress
How-to Impress
Adam Trickett
 
Rsnapshot
RsnapshotRsnapshot
Rsnapshot
Adam Trickett
 
Perl Quality
Perl QualityPerl Quality
Perl Quality
Adam Trickett
 
Achieving the Impossible with Perl
Achieving the Impossible with PerlAchieving the Impossible with Perl
Achieving the Impossible with Perl
Adam Trickett
 
An Introduction to Udev (OBSOLETE)
An Introduction to Udev (OBSOLETE)An Introduction to Udev (OBSOLETE)
An Introduction to Udev (OBSOLETE)
Adam Trickett
 
Introduction to the FHS
Introduction to the FHSIntroduction to the FHS
Introduction to the FHS
Adam Trickett
 
Perl Introduction (OLD - NEARLY OBSOLETE)
Perl Introduction (OLD - NEARLY OBSOLETE)Perl Introduction (OLD - NEARLY OBSOLETE)
Perl Introduction (OLD - NEARLY OBSOLETE)
Adam Trickett
 
Diy Web Development
Diy Web DevelopmentDiy Web Development
Diy Web Development
Adam Trickett
 
Desktop Adapted For Dad
Desktop Adapted For DadDesktop Adapted For Dad
Desktop Adapted For Dad
Adam Trickett
 
Energy Monitoring At Home
Energy Monitoring At HomeEnergy Monitoring At Home
Energy Monitoring At Home
Adam Trickett
 
Desktop Virtualisation
Desktop VirtualisationDesktop Virtualisation
Desktop Virtualisation
Adam Trickett
 
How To Live a Low CO2 Life
How To Live a Low CO2 LifeHow To Live a Low CO2 Life
How To Live a Low CO2 Life
Adam Trickett
 
How to Review a Book (For Hants-LUG)
How to Review a Book (For Hants-LUG)How to Review a Book (For Hants-LUG)
How to Review a Book (For Hants-LUG)
Adam Trickett
 
Achieving the Impossible with Perl
Achieving the Impossible with PerlAchieving the Impossible with Perl
Achieving the Impossible with Perl
Adam Trickett
 
An Introduction to Udev (OBSOLETE)
An Introduction to Udev (OBSOLETE)An Introduction to Udev (OBSOLETE)
An Introduction to Udev (OBSOLETE)
Adam Trickett
 
Introduction to the FHS
Introduction to the FHSIntroduction to the FHS
Introduction to the FHS
Adam Trickett
 
Perl Introduction (OLD - NEARLY OBSOLETE)
Perl Introduction (OLD - NEARLY OBSOLETE)Perl Introduction (OLD - NEARLY OBSOLETE)
Perl Introduction (OLD - NEARLY OBSOLETE)
Adam Trickett
 
Desktop Adapted For Dad
Desktop Adapted For DadDesktop Adapted For Dad
Desktop Adapted For Dad
Adam Trickett
 

Recently uploaded (19)

APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC Update, presented at NZNOG 2025 by Terry Sweetser
APNIC
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
OSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description fOSI TCP IP Protocol Layers description f
OSI TCP IP Protocol Layers description f
cbr49917
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)DNS Resolvers and Nameservers (in New Zealand)
DNS Resolvers and Nameservers (in New Zealand)
APNIC
 
project_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptxproject_based_laaaaaaaaaaearning,kelompok 10.pptx
project_based_laaaaaaaaaaearning,kelompok 10.pptx
redzuriel13
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 

Remote Desktop Administration (Linux/X11)

  • 1. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 1 Remote AdministrationRemote Administration of Desktop Systemsof Desktop Systems Adam John TrickettAdam John Trickett www.iredale.net [email protected] PGP Key: 0xAF0DB8C8
  • 2. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 2 General problemGeneral problem • You need to connect to a remote system • You need to administer the system (upgrade, repair, extend etc.) • You need to see the desktop as the user sees it • The end user may not be technical
  • 3. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 3 TopologyTopology Internet Firewall Router Other PCYour PC
  • 4. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 4 Technical problemsTechnical problems • Where is the other PC? • Most ISP only offer dynamic IP • How do I get through the firewall? • Each make and model is different • How do I reach the PC on the inside? • Most networks use dynamic & private IPs on the inside • What needs to be installed on the target system? • Not all systems have everything installed by default
  • 5. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 5 Where is the other PCWhere is the other PC • The best solution is a static IP for the router/firewall • Standard with some ISPs • Optional cost extra with others • If dynamic is the only option, then: • Some routers/firewalls will auto-update Dynamic DNS services • You can install a dynamic DNS client on the target PC • You can create a script to email you the external IP
  • 6. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 6 Firewall - rulesFirewall - rules • Most sane routers allow: • All ports outbound • All ports inbound that are part of an outbound pair • All ports inbound that are not part of a pair are denied • You will need to tell it to allow at least one port inbound: • Some have virtual “DMZ” • Some have general rules
  • 7. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 7 Router - ForwardingRouter - Forwarding • The remote system's firewall/router needs to forward incoming connections: • of type X, e.g. tcp • of port Y, e.g, 22 • to IP address Z, e.g. 192.168.0.10 • External port number and internal port number are the same by default
  • 8. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 8 Router – NAT/DHCPRouter – NAT/DHCP • You need to ensure that the PC you want to reach has the same private IP so that the NAT rule points to the correct system every time: • DHCP reservation using MAC address • Static configuration in router and PC
  • 9. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 9 Basic tools - SSHBasic tools - SSH • Secure Shell (“SSH”) • Replaces Telnet, rlogin, rsh, ftp etc • Standard on almost all Linux/Unix systems • Secure • Supports port forwarding • Creates a temporary on-demand instant “VPN-lite”
  • 10. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 10 Extra toolsExtra tools • Mobile Shell (“Mosh”) • Deals with lost connections better than SSH • Does not support port forwarding • OpenVPN • Builds a permanent secure bridge between systems • Doesn't require user configuration to use • Requires administrative configuration to set-up • More complex than SSH
  • 11. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 11 General installationGeneral installation • OpenSSH server, though in all distros is not installed by default on all of them • Mosh is widely available but not installed by default on most/all • Sudo is widely available and installed by default on many but all • Screen is widely available but not installed by default on most/all
  • 12. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 12 Specific installationSpecific installation • linuxvnc shares the physical console as VNC session, useful in emergencies or headless servers • x11vnc shares the desktop X session as a VNC session and allows you to interact with the desktop at the same time as the user • There are others but I'm not going to talk about them
  • 13. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 13 Forwarding SSH portsForwarding SSH ports • The remote system's firewall/router needs to: • Forward TCP port on the external side to TCP port on the target PC • SSH normally uses tcp port 22 • Mosh normally uses udp port 60001 (and up) plus SSH to start with only • Many people change the external port to reduce the noise from script kiddies
  • 14. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 14 Basic AdministrationBasic Administration • Use SSH/Mosh to connect to the remote system • Default SSH configuration will work but you need to harden it • Run normal command line tools from login shell of your choice • Good for day to day administration and all standard tasks • No good if you need to see what the user sees or configure a desktop application
  • 15. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 15 Harden SSHHarden SSH • Open SSH is pretty good but it is not as secure as it can be out of the box on most Linux distributions: • Turn off password login – only allow SSH keys • Turn off root login – only allow real users • Specify the named users you want to allow • Turn off SSH protocol 1 – it may still be turned on in some distros
  • 16. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 16 Configure SSH ClientConfigure SSH Client • Edit your ~/.ssh/config file: Host <machinename>* <ip address> HostName <machinename.network.com> user <your username on machinename> Port <TCP port number> ForwardX11 yes Compression yes LocalForward localhost:5900 localhost:5900
  • 17. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 17 ProcedureProcedure • Add your SSH-Key to your SSH-Agent • Start your SSH session to the other system • ssh machinename • Your default shell starts at the other end • Start screen • Start any X programs • Start x11vnc or linuxvnc • Start your VNC client on your desktop
  • 18. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 18 What does SSH forwarding do?What does SSH forwarding do? • When you start x11vnc or linuxvnc they start to listen on the local host of the remote system on tcp port 5900 by default • The SSH client on your PC also listens on TCP port 5900 locally, but forwards the packets to the remote system to its TCP port 5900 • That means an insecure protocol like VNC is now running over a secure and compressed SSH connection
  • 19. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 19 SSH Client TCP 5900 listen SSH Server TCP 22 listen x11VNC TCP 5900 listen VNC Client Secure SSH
  • 20. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 20 x11vnc configurationx11vnc configuration • To automate and get the best out of x11vnc without end user interaction – there are a lot of options! • Something like: $ sudo x11vnc -nopw -localhost -ncache 10 -ncache_cr -q -nodpms -auth <something>
  • 21. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 21 linuxvnc configurationlinuxvnc configuration • Exports a physical terminal • Useful if X has failed to start • Allows you to see kernel messages etc • Of only limited use, but nice to know $ sudo linuxvnc 1 -alwaysshared
  • 22. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 22 DemoDemo
  • 23. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 23
  • 24. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 24
  • 25. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 25
  • 26. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 26
  • 27. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 27
  • 28. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 28
  • 29. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 29
  • 30. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 30
  • 31. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 31
  • 32. Version 1.0.0 © Adam Trickett, January-2017 Distributed under a creative commons Attribution-NonCommercial-ShareAlike licence. 32 ThankThank YouYou AnyAny Questions?Questions?