[CentOS] freenx

Tue Jan 24 18:00:13 UTC 2006
Les Mikesell <lesmikesell at gmail.com>

On Tue, 2006-01-24 at 03:36, Maciej Żenczykowski wrote:
> >
> > It is only used for the initial connection so the real login
> > and password are sent over an encrypted channel.  You can't
> > do anything else with the nx user login - and you could
> > generate new keys if you wanted.  But, you should be seeing
> > sshd[18876]: Accepted publickey for nx ... entries in
> > /var/log/secure if the key is working.
> 
> Which is of course totally screwed in the NX protocol.  What the hell
for 
> does it need an nx user for?  Pretty much nothing.  Indeed nothing at
all.

I'd say it is much, much better than trying to re-invent
a different secure connection protocol.

> It could just as well ssh directly into your account via ssh
user at host 
> /usr/bin/nxserver.

The real login does not have to run over ssh or use encryption.
That is optional and a waste of CPU if not needed.

> But so much on bad design decisions.

It's not that bad compared to a lot of other ways they might
have tried to ensure that the real user password exchange is
encrypted.  The nomachine server always uses the same key for
for the nx user and trusts the shell program to not permit
anything but the next stage login to happen.  That eliminates
the key-setup issue that you have with the freenx variation
which builds new keys during the install on each server.

-- 
  Les Mikesell
   lesmikesell at gmail.com