This is one of those really simple things that are surprisingly tricky to do right. My goal: automatically disable the touchpad when an external mouse is plugged in. Why go through all the trouble? Because—in addition to being plain annoying—a moving cursor can alter the window focus in my current tiling window manager.
On Windows, you can either do it easily (if the driver supports it) or it’s nearly impossible. For better or worse, on Linux, you can almost always do it after expending some (possibly non-trivial) effort.
a minor modification to .xinitrc to call touchpad-ctl at startup
These are intended for Arch Linux. I haven’t tried on any other systems yet, but it shouldn’t be too hard to adapt them for other distributions. It might even work out of the box!
Details
I started out by following the Arch Linux wiki, but I’ve simplified the script and made some of my own discoveries along the way.
Firstly, the udev rules: these consist of two simple rules that will call /bin/touchpad-ctl whenever a mouse is added or removed. Nothing too fancy here.
The udev rules would miss the opportunity to fire if the mouse is already plugged in at boot, so it’s necessary to call touchpad-ctrl in .xinitrc to make sure that the touchpad is disabled in this scenario.
The touchpad-ctl script is where the magic occurs. Since I’ve not come across an easy to way to figure out which device is the actual touchpad, you’ll have to set this variable manually in the script. To list all the mouse-like devices, run this command:
(If it says it can’t find udevadm, then try running it as root.)
The script does two things:
Check if any external mouse is plugged in. This is the easy part: simply loop through all the mice and check if it’s an external mouse (i.e. not the touchpad).
Enable or disable the touchpad with synclient. This is a bit more difficult because it needs to know the DISPLAY and XAUTHORITY. The DISPLAY variable is hardcoded, while the XAUTHORITY is obtained from the home directories of the users. This is repeated for every user.
SSH port forwarding can be a very useful tool for working with remote systems. There are two common reasons for doing this:
to add security to an unencrypted connection, or
to access services behind firewalls.
Background
In networking lingo, a host generally refers to a single computer. Each host can have multiple network interfaces, each of which is assigned an (IP) address.
The address suffices to identify the network interface and hence the host, but a single host can provide a variety of services (e.g. web server, mail server, SSH server, etc). Hence, there needs to be a way to distinguish between them. This is where the notion of a port comes in. Each service is allowed to pick its own port, denoted by a 16-bit unsigned integer (0‒65535).
Services can listen to a particular port, waiting for clients to initiate connections to the port. The port numbers for many services are specified by conventions. Clients can then connect to the target port that corresponds to the one chosen by the service.
Example. An HTTP web server such as httpd would typically listen to port 80 (one can also say the service httpd “runs on” port 80).
Hence, HTTP clients such as web browsers or downloaders would typically have a target port of 80.
Note: In the process of establishing a connection to a server, the clients themselves also obtain a port on their end. This port, however, is ephemeral and generally irrelevant here. They are not shown in any of these diagrams.
Normally, given the correct port, the client can simply connect directly to the server…
… unless of course, there is a firewall that blocks port 80. However, if the firewall permits SSH connections, port forwarding can be used to bypass the barrier. In this case, the client would connect to, say, port 8000, which is then forwarded to port 80 on the server.
Forwarded ports are generally temporary, so conventionally one would use a large port number to avoid conflicts with the more frequently used ports. (Some systems, usually the Unix-like ones, would also reserve port numbers below 1024 so that one would require superuser privileges to forward them.)
Port forwarding
SSH supports two kinds of port forwarding: local and remote port forwarding. (There is also the so-called dynamic port forwarding, which won’t be discussed here.) The first and most important question here is: what is the difference between local and remote forwarding?
In local port forwarding, the port that is being forwarded resides on the local end, i.e. the host of the SSH client, whereas …
… in remote port forwarding, the port that is being forwarded resides on the remote end, i.e. the host of the SSH server.
In other words, the type of port forwarding depends on the location of the service of interest (in the example earlier, the httpd server) with respect to the SSH server.
PORT: the port that is being forwarded. SSH will listen to this port and forward connections made to this port to the other side (i.e. HOST).
In the case of local port forwarding, PORT is bound to the host of the SSH client.
In the case of remote port forwarding, PORT is bound to the host of the SSH server.
HOST: the host that provides the service of interest.
In the case of local port forwarding, HOST is on the side of the SSH server.
In the case of remote port forwarding, HOST is on the side of the SSH client.
HOSTPORT: the port on HOST listened by the service of interest.
HOSTNAME: the SSH server (unrelated to HOST or HOSTPORT).
BIND_ADDRESS: this is an optional argument that specifies the address that PORT should be associated with. By default, this only binds to the loopback interface.
The naming of the arguments here is rather unfortunate as the word “host” is overloaded to mean several things. For this reason, the name sshd-host will be used to refer to the host of the SSH server (i.e. HOSTNAME), while the name appd-host will be used to refer to the host that provides the service of interest. Correspondingly, ssh-host will refer to the host of the SSH client.
Example. Consider the previous example involving the HTTP server and client. If the HTTP server resides on host of the SSH server and the HTTP client resides on host of the SSH client, then one can use local port forwarding to access the remote HTTP server from the local side.
On the other hand, if the HTTP server resides on the host of the SSH client and the HTTP client resides on the host of the SSH server, then one can use remote port forwarding to access the local HTTP server from the remote side.
Notice that for both cases, the arguments differ only by the flag (-L/-R). However, the similarity is somewhat deceptive: the address localhost is interpreted differently in each case. In the case of remote port forwarding, localhost refers to the host of the SSH client (ssh-host) as one would normally expect, whereas in the case of local port forwarding, localhost actually refers to the host of the SSH server (sshd-host)! In fact, the HOST parameter in the case of local port forwarding is always relative to the SSH server.
The above two scenarios are actually special cases of a more general scenario: appd-host could be a separate host, different from either ssh-host or sshd-host. In the more general case, local port forwarding would involve forwarding a port from ssh-host to sshd-host and then to appd-host, while remote port forwarding would involve forwarding a port from sshd-host to ssh-host and then to appd-host.
Example. If the HTTP server is accessible on the remote side and the HTTP client resides on host of the SSH client, then one can use local port forwarding to access the HTTP server from the local side.
On the other hand, if the HTTP server is accessible on the local side and the HTTP client resides on host of the SSH server, then one can use remote port forwarding to access the HTTP server from the remote side.
Note that in both cases, the second part of the traffic is not encrypted by SSH since the SSH tunnel only connects between ssh-host and sshd-host.
While the target host (appd-host) can be almost anywhere, the forwarded port must always reside on either ssh-host or sshd-host: this is necessary since SSH has to actually listen to the forwarded port, whereas the target port simply needs to be reachable (not blocked by a firewall).
Lastly, what about BIND_ADDRESS? By default, SSH will only listen to a forwarded port on the loopback interface, which is a virtual network interface that only responds to internal requests (from the same host). This is for security reasons, since if SSH listened on all interfaces, it could be potentially forwarding traffic from just about anybody on the Internet. Using BIND_ADDRESS one can override the default behavior so that SSH will listen on other interfaces as well. Use this cautiously! (Note: it may necessary to enable the GatewayPorts flag for this to work on anything but the loopback interface.)
It’s been a while. The last time I had a blog was in college a few years back and it’s been offline for quite some time. I didn’t really have anything useful to write on at the time, but between now and then, I think (or would like to think) I’ve acquired at least some new knowledge and experience, so perhaps this time it’ll be a bit different. Hopefully I won’t run dry within a few weeks. We’ll see!
I’d like to start afresh: I won’t repost any of the old stuff, which were mostly garbage anyway. Maybe if I dig up a gem I might repost it after some editing, but I don’t expect that to happen any time soon.
I once thought I would eventually get to do everything that I wanted to do, learn everything I wanted to learn, but that was a young, naive thought. I’ve since learned that I have pick and choose because I have only so much time. In this case, things I write would have to be of relevance to both myself and others.
This blog shall be primarily devoted to matters of technical consequence: information, guides, expositions, etc. in programming, physics, and math. The idea is that what I write should be relatively timeless: it should be useful now and a few years into the future perhaps. Its usefulness may diminish if the technology becomes outdated for some reason (as is often the case in the fast-moving digital world), but even then it’s better than, say, a post about why I enjoy peanut butter and jelly sandwiches!
I’m aware that this a fairly broad spectrum of subjects here: not everyone who reads about programming is going to care about physics since there aren’t a lot people who care about both simultaneously! That’s fine though. There is a reason why I didn’t even bother adding feeds to this blog (do people still use them?): the posts are going to be relatively self-contained snippets, other than the occasional series. There’ll be little if any meaning to the chronological ordering of the posts. The hope is that whatever I write might potentially help someone who is (un)fortunate enough to encounter the topic of interest.
Many times I have tread through the barren wastes of the Internet, scrounging for answers to questions that no-one asked, and only to find none. May this site be of use to my fellow travelers in search of such answers.