LTSP 5/code to bypass encryption of X
jim at winonacotter.org
Wed Jun 20 14:35:57 UTC 2007
Hello all, I met with Gideon Romm at our North Central Linux Symposium. He has been
working on modifications to the code for ldm to allow the bypass of X being encrypted
over ssh. He has also added functionality to be able to use autologin. You can
download the modified ldm from here:
Replace your current "/opt/ltsp/i386/usr/sbin/ldm" with the new file (you may want to
backup your current ldm just to be safe). The in "/opt/ltsp/i386/etc/lts.conf" add the
You will now be able to run without X being encrypted, which in theory should allow LTSP
5 to run at the same speed as LTSP 4.2 (however with decreased security). Bootup times
and logout times will still be slower, but once booted things should zoom along. So far
my tests show that this works awesome! I am still waiting for my new clients to really
give this a go.
If you would like to use autologin features you simply need to add the following line to
Apparently this lets you use the same user=workstation method that worked in LTSP 4.2.
You will still need to setup ssh keys OR create the same password for each user and
specify LDM_PASSWORD="mypassword" (in lts.conf). You also need to specify workstation
names in dhcpd.conf so that workstations do not all have the same hostname (I am not
sure if this is able to be done with the /etc/hosts file as well).
Anyhow this hacked ldm should allow LTSP 5 to finally be usable in larger installations
instead of hanging on to LTSP 4.2. Also I guess that Scott Balneaves has rewritten some
of the python startup files in C, which should clear up some boot time problems in the
next Gutsy release.
Cotter Tech Department
This message has been scanned for viruses and
dangerous content by the Cotter Technology
Department, and is believed to be clean.
More information about the edubuntu-devel