<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Logging into lxplus</title>
	<atom:link href="http://physics.bu.edu/sites/geneva-program/2010/02/02/logging-into-lxplus/feed/" rel="self" type="application/rss+xml" />
	<link>http://physics.bu.edu/sites/geneva-program/2010/02/02/logging-into-lxplus/</link>
	<description>Just another Boston University Physics weblog</description>
	<lastBuildDate>Mon, 19 Apr 2010 07:15:50 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5</generator>
	<item>
		<title>By: max</title>
		<link>http://physics.bu.edu/sites/geneva-program/2010/02/02/logging-into-lxplus/comment-page-1/#comment-12</link>
		<dc:creator>max</dc:creator>
		<pubDate>Tue, 02 Feb 2010 19:35:12 +0000</pubDate>
		<guid isPermaLink="false">http://physics.bu.edu/sites/geneva-program/?p=254#comment-12</guid>
		<description><![CDATA[just -X worked for me too.

typing &quot;man ssh&quot; into the terminal will bring up a list of all the possible tags as well as the additional info.

It says,
 &quot;-X      Enables X11 forwarding.  This can also be specified on a per-host
             basis in a configuration file.

             X11 forwarding should be enabled with caution.  Users with the
             ability to bypass file permissions on the remote host (for the
             user&#039;s X authorization database) can access the local X11 display
             through the forwarded connection.  An attacker may then be able
             to perform activities such as keystroke monitoring.

             For this reason, X11 forwarding is subjected to X11 SECURITY
             extension restrictions by default.  Please refer to the ssh -Y
             option and the ForwardX11Trusted directive in ssh_config(5) for
             more information.

     -x      Disables X11 forwarding.

     -Y      Enables trusted X11 forwarding.  Trusted X11 forwardings are not
             subjected to the X11 SECURITY extension controls.&quot;]]></description>
		<content:encoded><![CDATA[<p>just -X worked for me too.</p>
<p>typing &#8220;man ssh&#8221; into the terminal will bring up a list of all the possible tags as well as the additional info.</p>
<p>It says,<br />
 &#8220;-X      Enables X11 forwarding.  This can also be specified on a per-host<br />
             basis in a configuration file.</p>
<p>             X11 forwarding should be enabled with caution.  Users with the<br />
             ability to bypass file permissions on the remote host (for the<br />
             user&#8217;s X authorization database) can access the local X11 display<br />
             through the forwarded connection.  An attacker may then be able<br />
             to perform activities such as keystroke monitoring.</p>
<p>             For this reason, X11 forwarding is subjected to X11 SECURITY<br />
             extension restrictions by default.  Please refer to the ssh -Y<br />
             option and the ForwardX11Trusted directive in ssh_config(5) for<br />
             more information.</p>
<p>     -x      Disables X11 forwarding.</p>
<p>     -Y      Enables trusted X11 forwarding.  Trusted X11 forwardings are not<br />
             subjected to the X11 SECURITY extension controls.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: ashley</title>
		<link>http://physics.bu.edu/sites/geneva-program/2010/02/02/logging-into-lxplus/comment-page-1/#comment-10</link>
		<dc:creator>ashley</dc:creator>
		<pubDate>Tue, 02 Feb 2010 18:20:10 +0000</pubDate>
		<guid isPermaLink="false">http://physics.bu.edu/sites/geneva-program/?p=254#comment-10</guid>
		<description><![CDATA[maybe try -XY, since that&#039;s what he told us to do.. Just to be safe and to prevent future problems.]]></description>
		<content:encoded><![CDATA[<p>maybe try -XY, since that&#8217;s what he told us to do.. Just to be safe and to prevent future problems.</p>
]]></content:encoded>
	</item>
</channel>
</rss>