Am 20.12.21 um 16:14 schrieb richard lucassen:
>> In short: forget about it. If you're allowing users SSH access for
>> X2Go, they WILL be able to copy data. You can make it a little harder
>> for them if you think you have to, but as long as they are in control
>> of the client hardware, they will always be able to do so.
> I have no complete answer to it, but if you use keys instead of
> user/pass then you will be able to restrict ssh in
> ~/.ssh/authorized_keys
> 
> from="1.2.3.4,2.3.4.5,9.8.7.6",no-port-forwarding,command="/path/to/script",no-X11-forwarding,no-agent-forwarding,no-pty
> ssh-rsa <key>
> 
> (all in 1 line)
> 
> This is an example of what I use here, I think there must be many other
> options available.
> 
> see "man authorized_keys"

That's all fine for non-interactive commands or simple scripts. But have
you tried to use this with X2Go?

Even with commandline-only tools like vim or mc, this becomes a royal
PITA (and yes, I know about rvim).

-Stefan

-- 
BAUR-ITCS UG (haftungsbeschränkt)
Geschäftsführer: Stefan Baur
Eichenäckerweg 10, 89081 Ulm | Registergericht Ulm, HRB 724364
Fon/Fax 0731 40 34 66-36/-35 | USt-IdNr.: DE268653243
_______________________________________________
x2go-user mailing list
x2go-user@lists.x2go.org
https://lists.x2go.org/listinfo/x2go-user

Reply via email to