ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Installing X2Go NX Server on Linux Mint 17.2

    IT Discussion
    x2go nx x windows linux linux desktop terminal server remote access jump server linux mint linux mint 17.2
    6
    85
    34.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @dafyre
      last edited by

      @dafyre said:

      Cinnamon does not work at all for me.

      Are you fully up to date? Are you using the X2Go that came with the OS?

      1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @dafyre
        last edited by

        @dafyre said:

        Using the Windows X2Go client, I cannot see the mouse pointer at all. Using the PyHoca client, I get the desktop icons, but no panel at the bottom of my screen, lol.

        OH WAIT!!!

        You mean on the terminal server side, not the local client side. Okay, totally different. And yes, we had Cinnamon issues with ScreenConnect but not with X2Go. But we don't use Cinnamon but use LXDE just because it is lighter and faster over the NX link.

        1 Reply Last reply Reply Quote 1
        • dafyreD
          dafyre
          last edited by dafyre

          Yea on the terminal Server side. I'm using the Pyhoca GUI + Mate. It rocks! And to whoever was complaining about the funky seal looking icon, thta is the Pyhoca GUI, and not the regular X2Go Client app.

          1 Reply Last reply Reply Quote 1
          • scottalanmillerS
            scottalanmiller
            last edited by

            Any issues with software rendering and Mate? Mate is the one desktop we never test (Gnome 2 and all that.) You find it superior to LXDE? We find default XFCE to be very wasteful on screen real estate.

            dafyreD 1 Reply Last reply Reply Quote 0
            • dafyreD
              dafyre @scottalanmiller
              last edited by dafyre

              @scottalanmiller said:

              Any issues with software rendering and Mate? Mate is the one desktop we never test (Gnome 2 and all that.) You find it superior to LXDE? We find default XFCE to be very wasteful on screen real estate.

              I was always a big fan of the old Gnome (before Gnome 3 / Unity and all that). Mate runs plenty fast enough for me from off site, over ZT and a home connection that only has 4mbit upload.

              I really like the Pyhoca GUI, as it can dynamically resize the screen with only a short lag. I can watch videos on youtube (not in full screen, lol) and sound works too (I think). I also like Mate because it is similar in layout to Cinnamon without the hardware requirements for the fancy effects.

              I should probably try out LXDE, I don't recall using that recently.

              1 Reply Last reply Reply Quote 1
              • stacksofplatesS
                stacksofplates
                last edited by

                I had the same issue with cinnamon. It would go to fallback mode and then all you had was the application menu and places. I couldn't even log out! But Mate works really well. You get the old Mint Menu design and it works pretty well at least on my LAN. I'm going to test it tomorrow from my parents house over ZeroTier to see how it works over the internet.

                scottalanmillerS dafyreD 2 Replies Last reply Reply Quote 1
                • scottalanmillerS
                  scottalanmiller @stacksofplates
                  last edited by

                  @johnhooks said:

                  I had the same issue with cinnamon. It would go to fallback mode and then all you had was the application menu and places. I couldn't even log out! But Mate works really well. You get the old Mint Menu design and it works pretty well at least on my LAN. I'm going to test it tomorrow from my parents house over ZeroTier to see how it works over the internet.

                  How use ZeroTier? Why not connect directly?

                  dafyreD stacksofplatesS 2 Replies Last reply Reply Quote 0
                  • dafyreD
                    dafyre @stacksofplates
                    last edited by

                    @johnhooks It seems to work really well over the internet for me. I love the fact that I can disconnect a session and come back to it later. I've always wanted that for the Linux GUI.

                    1 Reply Last reply Reply Quote 2
                    • dafyreD
                      dafyre @scottalanmiller
                      last edited by

                      @scottalanmiller Because we don't want to poke holes in our router / firewall. 😄 ... and we already have ZT going.

                      scottalanmillerS 1 Reply Last reply Reply Quote 1
                      • scottalanmillerS
                        scottalanmiller
                        last edited by

                        Yes, persistent desktops are really nice.

                        1 Reply Last reply Reply Quote 0
                        • stacksofplatesS
                          stacksofplates @scottalanmiller
                          last edited by

                          @scottalanmiller said:

                          @johnhooks said:

                          I had the same issue with cinnamon. It would go to fallback mode and then all you had was the application menu and places. I couldn't even log out! But Mate works really well. You get the old Mint Menu design and it works pretty well at least on my LAN. I'm going to test it tomorrow from my parents house over ZeroTier to see how it works over the internet.

                          How use ZeroTier? Why not connect directly?

                          It's on a VM on the server in my house. I'd either have to port forward or just use ZeroTier.

                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @dafyre
                            last edited by

                            @dafyre said:

                            @scottalanmiller Because we don't want to poke holes in our router / firewall. 😄 ... and we already have ZT going.

                            But for security, you don't want unnecessary exposure, right?

                            dafyreD 1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @stacksofplates
                              last edited by

                              @johnhooks said:

                              It's on a VM on the server in my house. I'd either have to port forward or just use ZeroTier.

                              Ah, okay.

                              1 Reply Last reply Reply Quote 0
                              • dafyreD
                                dafyre @scottalanmiller
                                last edited by

                                @scottalanmiller tries to see where you're going with this

                                Right. So I'll use my existing ZT Network and not (manually) poke holes in my firewall.

                                scottalanmillerS 1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @dafyre
                                  last edited by

                                  @dafyre said:

                                  @scottalanmiller tries to see where you're going with this

                                  Right. So I'll use my existing ZT Network and not (manually) poke holes in my firewall.

                                  So you are going to expose the whole network to any ransomware / cryptoware risks on your connecting machines? One of the beauties of using a terminal server is providing an air gap to keep the biggest risks from getting through. VPNs are huge risks to networkworks.

                                  dafyreD 1 Reply Last reply Reply Quote 1
                                  • dafyreD
                                    dafyre @scottalanmiller
                                    last edited by

                                    @scottalanmiller With something like ZeroTier, the LAN is simply spread over larger distances. In that same retrospect, considering any Remote-Desktop-like tool (RDSH / X2Go, et al) there's always a risk that someone can get infected with bad stuff.

                                    If a user is using X2Go/RDP and connected to my server and they are connected to all their shares, and they get hit with Cryptoware, it doesn't matter that they're on an remote-session, or if they're physically connected to the LAN or by ZT (or VPN), it will still encrypt their files and shares.

                                    scottalanmillerS 2 Replies Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller @dafyre
                                      last edited by

                                      @dafyre said:

                                      @scottalanmiller With something like ZeroTier, the LAN is simply spread over larger distances. In that same retrospect, considering any Remote-Desktop-like tool (RDSH / X2Go, et al) there's always a risk that someone can get infected with bad stuff.

                                      Not really. If I'm connected to an NX server at a client site, they cannot infect me nor can I infect them. We are firewalled from each other except for the graphical protocol. It's dramatically safer than a VPN.

                                      dafyreD 1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller @dafyre
                                        last edited by

                                        @dafyre said:

                                        If a user is using X2Go/RDP and connected to my server and they are connected to all their shares, and they get hit with Cryptoware, it doesn't matter that they're on an remote-session, or if they're physically connected to the LAN or by ZT (or VPN), it will still encrypt their files and shares.

                                        Well then don't bypass the security by allowing shares to be added making the channel an more generic VPN again. That's not an exposure that you want.

                                        Any direct LAN, ZT, VPN, etc. connection opens you up to huge exposure.

                                        1 Reply Last reply Reply Quote 0
                                        • dafyreD
                                          dafyre @scottalanmiller
                                          last edited by dafyre

                                          @scottalanmiller said:

                                          Not really. If I'm connected to an NX server at a client site, they cannot infect me nor can I infect them. We are firewalled from each other except for the graphical protocol. It's dramatically safer than a VPN.

                                          Right, but an End User can still get themselves infected. (Yes, it's Linux, no, it isn't bullet proof, but you know this already).

                                          @scottalanmiller said:

                                          Well then don't bypass the security by allowing shares to be added making the channel an more generic VPN again. That's not an exposure that you want.

                                          Any direct LAN, ZT, VPN, etc. connection opens you up to huge exposure.

                                          So I have allowed my end-user to connect to their X2Go / RDP server and say "Here's all your applications" ... but what about their Data?

                                          If their data lives on file shares, then what? They can have their apps but not their data?
                                          Okay. Let's use ownCloud... Their files still get encrypted, and we still have to restore them from backups.

                                          I do not disagree that there is more exposure. But how is this any different than being on a LAN? If my laptop worker is sitting at their desk connected to my LAN, or if they're 500 miles away, connected to my LAN?

                                          [Maybe this would be good to fork off into its own discussion, lol... Title suggestion: VPN vs Port Forwarding ?].

                                          scottalanmillerS 3 Replies Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller @dafyre
                                            last edited by

                                            @dafyre said:

                                            @scottalanmiller said:

                                            Not really. If I'm connected to an NX server at a client site, they cannot infect me nor can I infect them. We are firewalled from each other except for the graphical protocol. It's dramatically safer than a VPN.

                                            Right, but an End User can still get themselves infected. (Yes, it's Linux, no, it isn't bullet proof, but you know this already).

                                            All the more reason to keep them from infecting everyone else 🙂

                                            1 Reply Last reply Reply Quote 1
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 1 / 5
                                            • First post
                                              Last post