-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Tuesday, 2019-08-13 at 15:06 +0200, Wolfgang Mueller wrote:
On Tue, 13 Aug 2019 at 14:23:38 +0200, Carlos E. R. wrote:
On 13/08/2019 14.04, Wolfgang Mueller wrote:
On Tue, 13 Aug 2019 at 13:08:59 +0200, Vojtěh Zeisek wrote:
...
The easiest, is using "ssh -X" because it automatically sets the environment as needed :-)
On my computers, "ssh -X" produces the following response:
usage: ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] [-D [bind_address:]port] [-E log_file] [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file] [-L [bind_address:]port:host:hostport] [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] [-Q cipher | cipher-auth | mac | kex | key] [-R [bind_address:]port:host:hostport] [-S ctl_path] [-W host:port] [-w local_tun[:remote_tun]] [user@]hostname [command]
I can't detect any "-X" among the parameters listed here.
Well, you have to add the rest of the options. Account and host names or addreses. Like: ssh -X USERNAME@HOST.DOMAIN And it is in the man page: -X Enables X11 forwarding. This can also be specified on a per-host basis in a configuration file. X11 forwarding should be enabled with caution. Users with the ability to bypass file permissions on the remote host (for the user's X authorization database) can access the local X11 display through the forwarded connection. An attacker may then be able to perform activities such as keystroke monitoring. For this reason, X11 forwarding is subjected to X11 SECURITY extension restrictions by default. Please refer to the ssh -Y option and the ForwardX11Trusted directive in ssh_config(5) for more information. - -- Cheers, Carlos E. R. (from openSUSE 15.0 x86_64 at Telcontar) -----BEGIN PGP SIGNATURE----- iHoEARECADoWIQQZEb51mJKK1KpcU/W1MxgcbY1H1QUCXVK3BRwccm9iaW4ubGlz dGFzQHRlbGVmb25pY2EubmV0AAoJELUzGBxtjUfVe2IAn0F6pUJqEulAXnyLuxxZ JgRpmb5JAJ9Z1IlIl0gGXZgsP1nnSM/KpdH5fQ== =oGn0 -----END PGP SIGNATURE-----