[FreeNX-kNX] install nx from source on Fedora Core 3 (FC3) and freenx 2.8.0 NX Version 1.4.0-02

Rick Stout zipsonic at gmail.com
Fri Feb 25 00:22:57 UTC 2005


Just curious as to whether you've seen this:

http://fedoranews.org/contributors/rick_stout/freenx/

The packages already take care of all your problems.

Regards,

Rick Stout

Rob wrote:
> Just wanted to record some rough notes in the archives for anyone trying
> this (install nx from source on Fedora Core 3 (FC3) and freenx 2.8.0):
> 
> Using the instructions here: http://ltsp.criticalcontrol.com/freenx.html
> and:
> wget http://debian.tu-bs.de/knoppix/nx/freenx-0.2.8.tar.gz
> client is on Windows 98
> 
> I am using xorg-X11 and kde from a yum install of both since I hadn't
> installed them during the initial build.
> 
> I had to do:
> yum install expect
> yum install nc
> but later found nx was looking for netcat, not nc, so I did:
> ln -s /usr/bin/nc /usr/bin/netcat
> 
> The problem I ran into is that the current version of the nxkeygen
> doesn't have the part of the code that puts the key into the
> authorized-keys file wasn't there! I checked the email archive and
> didn't see any references to nxkeygen in the past few months.
> So I have included this diff which is way overkill for what is probably
> needed. Not a shell expert, so feedback is welcome.
> 
> Aside from that issue and the nc/netcat issue, I only made one mistake 
> and that was to run "make install" in the nx-X11 directory and screwed 
> up my original X11 libraries. Don't run make install!
> 
> Works great so far:
> NX> 100 NXSERVER - Version 1.4.0-02 OS_(GPL)
> 
> I may have more questions later as I deploy it behind two firewalls.
> 
> Thanks to everyone who has worked hard to make and support this!
> 
> 
> 
> 
> ------------------------------------------------------------------------
> 
> *** ../freenx-0.2.8/nxkeygen    2005-02-23 22:37:38.000000000 -0800
> --- nxkeygen    2005-02-24 01:02:22.000000000 -0800
> ***************
> *** 22,28 ****
>   {
>         # create a new key
>         umask 002
> !       ssh-keygen -q -t dsa -N '' -f ${NX_KEY_DIR}/local.id_dsa
> 
>         # backup the existing keys
> 
> --- 22,30 ----
>   {
>         # create a new key
>         umask 002
> !
> !       # let then see what is going on
> !       ssh-keygen -b 2048 -C "${HOSTNAME}-${DATE}-key" -t dsa -N '' -f ${NX_KEY_DIR}/local.id_dsa
> 
>         # backup the existing keys
> 
> ***************
> *** 38,46 ****
> 
>         # put the new keys in place
> 
>         mv -f "${NX_KEY_DIR}/local.id_dsa" "${NX_CLIENT_KEY}"
>         mv -f "${NX_KEY_DIR}/local.id_dsa.pub" "${NX_SERVER_KEY}"
> !
>         for x in ${NX_CLIENT_KEY} ${NX_SERVER_KEY} ; do
>                 chmod 600 $x
>                 chown nx:root $x
> --- 40,71 ----
> 
>         # put the new keys in place
> 
> +       # create the auth key file if it is not already there
> +       touch "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE"
> +       cp "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE" "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE".old
> +       cp "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE".disabled "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE".disabled.old
> +       cat "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE".disabled "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE" > \
> +           "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE".combined
> +       # add this key to the auth keys file
> +         cat "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE".combined "${NX_KEY_DIR}/local.id_dsa.pub" > \
> +           "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE"
> +       rm "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE".old
> +       rm "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE".disabled.old
> +       rm "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE".combined
> +
> +       # move the auth keys file to .disabled so that nxserver --start works correctly the first time
> +       # nxserver should more robustly check for the "state" of the auth keys file
> +       # in case of server crashes/outages/etc where the server is not shut down cleanly via nxserver --stop
> +       mv -f "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE" "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE".disabled
> +
> +       # this is very important for ssh, if there are permission problems with any files or the .ssh dir
> +       # the ssh connection will fail with "authorization failed"
> +       # and _NOT_ with "hey, I don't like your loose file permissions"
> +       chmod 600 "$NX_HOME_DIR/$NX_AUTHORIZED_KEYS_FILE".disabled
> +
>         mv -f "${NX_KEY_DIR}/local.id_dsa" "${NX_CLIENT_KEY}"
>         mv -f "${NX_KEY_DIR}/local.id_dsa.pub" "${NX_SERVER_KEY}"
> !
>         for x in ${NX_CLIENT_KEY} ${NX_SERVER_KEY} ; do
>                 chmod 600 $x
>                 chown nx:root $x
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> FreeNX-kNX mailing list
> FreeNX-kNX at kde.org
> https://mail.kde.org/mailman/listinfo/freenx-knx



More information about the FreeNX-kNX mailing list