First page Back Continue Last page Overview

 

Remote X Sessions

 
  • X protocol communication is unencrypted

  • Host-based sessions implemented through the xhost command

  • User-based sessions implemented through the Xauthority mechanism

  • sshd may automatically install xauth keys on remote machine

    • Tunnels X protocol over secure encrypted ssh connection