Showing posts with label unix. Show all posts
Showing posts with label unix. Show all posts

Sunday, March 11, 2012

Saturday, March 14, 2009

On demand VNC server with GDM

Each user can login (via ssh) to *nix server and start vncserver. Then he can login to X11 desktop via VNC viewer with defined vnc password. But it's far far away from nice solution. Much better solution is to setup vncserver as xinetd service.

First of all you have to define new service in particular port. Add line bellow into /etc/services
vnc1024         5901/tcp                        # VNC & GDM
now create service description for xinetd. Go to directory /etc/xinetd.d
cd /etc/xinetd.d
and create file vnc1024
service vnc1024
{
disable = no
socket_type = stream
protocol = tcp
wait = no
user = nobody
server = /usr/bin/Xvnc
server_args = -inetd -query localhost -geometry 1024x800 -depth 16 -once -fp unix/:7100 -securitytypes=none
}
Move to runlevel 3
init 3
Restart xinetd
/etc/init.d/xinetd
Move back to runlevel 5
init 5
And that's it. Now try connect via VNCviewer to port 6901

Tuesday, February 17, 2009

Configuration Point-to-Point OpenVPN link

I like OpenVPN because it's simple and it does what you need - VPN.

Let's assume that we have two un*x like servers with OpenVPN software and regular OS user openvpn in group openvpn. One server has IP address 192.168.4.10 and second 192.168.4.100.

In server 192.168.4.10 use following configuration file (openvpn.conf):
remote 192.168.4.100
ifconfig 10.0.0.1 10.0.0.2
dev tun0
port 5001
proto udp
secret /usr/local/etc/openvpn/secret.key
ping 10
comp-lzo
verb 5
mute 10
user openvpn
group openvpn

In server 192.168.4.100 use following configuration file (openvpn.conf):
remote 192.168.4.10
ifconfig 10.0.0.2 10.0.0.1
dev tun0
port 5001
proto udp
secret /usr/local/etc/openvpn/secret.key
ping 10
comp-lzo
verb 5
mute 10
user openvpn
group openvpn

In one of this two servers create secret.key by issuing following command:
openvpn --genkey --secret /usr/local/etc/openvpn/secret.key

Finaly:
Somehow (for example scp) copy secret key to second server into correct location and run openvpn daemons on both servers. On servers new network interface appears (tap) with IP addresses (10.0.0.1 and 10.0.0.2) and you can ping these 10.0.0.1-2 IP addresses over secure VPN link.

Here we go.