/etc/x2go/x2goserver.conf is in x2goserver-common 4.1.0.0-3.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 | [limit users]
#user-foo=1
[limit groups]
#bar-group=1
[security]
# SSHFS umask for client-side folder sharing. Leave uncommented to keep the server's default umask
#umask="0117"
[superenicer]
# enable the SupeReNicer code in x2gocleansessions, this will renice suspended sessions to nice level 19
# and renice them to level 0 if the session becomes marked as running again...
enable=no
# list of users that shall never be reniced
#ignored_users=
# force renicing of the complete user, don't set it to 'yes' unless you know what you are doing
#force-user-renice=no
# the normal nice level (for running sessions)
#normal-nice-level=0
# the idle nice level (for suspended sessions)
#idle-nice-level=19
[telekinesis]
# telekinesis provides a bidirectional communication framework between X2Go Client
# and X2Go Server
enable=no
[x2goagent]
# Value can be either "host-based" or "pure-random".
# This is currently a workaround for a bug in X2Go Client, that uses a 1:1
# mapping of source to destination ports for SSH tunnels.
# This leads to problems if opening two (or more) instances of X2Go Client
# and connecting to two machines that use the same tunneling ports.
# Such a scenario is easy to trigger: make sure that both machines have run
# no active sessions, than spawn one session on each machine.
# Connecting to both at the same time will not be possible without a means
# of randomization.
# The randomization can either be "host-based", in which case the port will
# be set to 30000 + (128 * last octet of IPv4 address) and does the job if
# the last octet of the machine's IPv4 address is known to be unique, or
# "pure-random" which uses the (not so truly random) bash ${RANDOM}
# variable to fully randomize the port, i.e., 30000 + random(0..32767).
port_randomization="pure-random"
[log]
# possible levels are: emerg, alert, crit, err, warning, notice, info, debug
loglevel=notice
|