|
2008-05-14
, 23:43
|
|
Moderator |
Posts: 7,109 |
Thanked: 8,820 times |
Joined on Oct 2007
@ Vancouver, BC, Canada
|
#72
|
ssh root@localhost 'debian epiphany'
|
2008-05-15
, 00:11
|
|
Posts: 643 |
Thanked: 628 times |
Joined on Mar 2007
@ Seattle (or thereabouts)
|
#73
|
|
2008-05-15
, 00:39
|
|
Moderator |
Posts: 7,109 |
Thanked: 8,820 times |
Joined on Oct 2007
@ Vancouver, BC, Canada
|
#74
|
@qole: At some point you need to "export DISPLAY=:0" or the application won't know where to find the x server. Or try this:
ssh root@localhost 'debian DISPLAY=:0 epiphany'
export DISPLAY=:0 epiphany
ssh root@localhost 'debian hepiphany'
chroot /opt $1 $2 $3
ssh root@localhost 'debian /bin/bash -c "DISPLAY=:0 epiphany"'
export DISPLAY=:0 exec $1 $2 $3
ssh root@localhost 'debian hilda epiphany'
|
2008-05-15
, 19:28
|
Posts: 25 |
Thanked: 1 time |
Joined on Apr 2008
|
#75
|
If the ForwardX11 variable is set to “yes” (or see the description of the -X and -x options described later) and the user is using X11 (the DISPLAY environment variable is set), the connection to the
X11 display is automatically forwarded to the remote side in such a way that any X11 programs started from the shell (or command) will go through the encrypted channel, and the connection to the real X
server will be made from the local machine. The user should not manually set DISPLAY. Forwarding of X11 connections can be configured on the command line or in configuration files.
...
-X Enables X11 forwarding. This can also be specified on a per-host basis in a configuration file.
X11 forwarding should be enabled with caution. Users with the ability to bypass file permissions on the remote host (for the user’s X authorization database) can access the local X11 display
through the forwarded connection. An attacker may then be able to perform activities such as keystroke monitoring.
-x Disables X11 forwarding.
-Y Enables trusted X11 forwarding.
The Following User Says Thank You to dasickis For This Useful Post: | ||
|
2008-05-15
, 20:01
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#76
|
Additionally, ssh reads ~/.ssh/environment, and adds lines of the format
``VARNAME=value'' to the environment if the file exists and if users are
allowed to change their environment. For more information, see the
PermitUserEnvironment option in sshd_config(5).
|
2008-05-15
, 21:47
|
|
Moderator |
Posts: 7,109 |
Thanked: 8,820 times |
Joined on Oct 2007
@ Vancouver, BC, Canada
|
#77
|
The Following User Says Thank You to qole For This Useful Post: | ||
|
2008-05-15
, 22:11
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#78
|
|
2008-05-15
, 22:27
|
|
Moderator |
Posts: 7,109 |
Thanked: 8,820 times |
Joined on Oct 2007
@ Vancouver, BC, Canada
|
#79
|
|
2008-05-15
, 22:57
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#80
|
user ALL = NOPASSWD: ALL
sudo debian epiphany
The Following User Says Thank You to Benson For This Useful Post: | ||
World's first inductively-charged N900!