For a long time I’ve been using Windows only on my private computer even though I might’ve wanted to use Windows.

One big part of that is that I have it set up next to my work computer when I’m working from home so I can do private stuff on it while working. Talking to people on Signal, Matrix, browsing Beehaw and so on. My work computer is pretty locked down and snooped on. I’m allowed do to stuff like that on it but it feels iffy.

Until recently I’ve used Mouse Without Worders to share the same mouse and keyboard between the two and it’s worked like a charm.

I just never got around to checking for a solution that would work cross OS until today.

I’ve tried Logitech’s solution once but couldn’t get it to work due to firewalls and other stuff going on on my work computer but… Barrier!

That just worked! I set up my private computer as the server and my work computer as the client and now I’m switching betwern the two machines without a glitch! :)

It did complain a bout a missing SSL cert at first but this solved that issue:

Copy the path to SSL directory which you can find in your error. "ERROR: ssl certificate doesn’t exist: /home/rsvay/snap/barrier-kvm/2/.local/share/barrier/SSL/Barrier.pem " In this case : “/home/rsvay/snap/barrier-kvm/2/.local/share/barrier/SSL/” Then run the following commands:

cd  "path to your SSL"
mkdir -p Fingerprints
openssl req -x509 -nodes -days 365 -subj /CN=barrier -newkey rsa:4096 -keyout Barrier.pem -out Barrier.pem
openssl x509 -fingerprint -sha256 -noout -in Barrier.pem > Fingerprints/Local.txt
sed -e "s/.*=/v2:sha256:/" -i Fingerprints/Local.txt

https://stackoverflow.com/questions/67343804/error-ssl-certificate-doesnt-exist-home-rsvay-snap-barrier-kvm-2-local-shar

  • Square Singer@feddit.de
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    1 year ago

    I am running the same exact setup.

    Btw, if your work laptop’s firewall is causing issues, you can just set the server port to 80 or 443 and run the work laptop as a client. This will work on any firewall setup that doesn’t use whitelists for http/https connections.