Is it possible to setup a remote xsession using a putty client and tc dropbear?
edit 3: OK I'm beginning to see the bigger picture here. TC is using a client only dropbear. A server version is required for x11 forwarding but I guess was never compiled successfully.
http://forum.tinycorelinux.net/index.php?topic=1559.msg14761#msg14761http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2009q2/000925.htmledit 4: Now that I have looked into this in more detail I realized my current solution of using tightvnc is probably a better solution after all. I though I was missing something and that the tc base system supported remote x11 connections but I was wrong. There's absolutely nothing wrong with that, adding tightvcn is not a problem since it is quite small and fast.
---------------------------------------------------------------------------------------------------------------------
edit 1: - not sure what this means regarding x11 forwarding with tc dropbear 
http://forum.tinycorelinux.net/index.php?topic=1559.msg14761#msg14761or if this thread is a definitive answer:
http://forum.tinycorelinux.net/index.php?topic=877.0edit 2:
The information at 
http://matt.ucc.asn.au/dropbear/dropbear.html states the features as:
    * A small memory footprint suitable for memory-constrained environments
       - Dropbear can compile to a 110kB statically linked binary with uClibc on x86 (only minimal options selected)
    * Dropbear server implements X11 forwarding, and authentication-agent forwarding for OpenSSH clients
    * Can run from inetd or standalone
    * Compatible with OpenSSH ~/.ssh/authorized_keys public key authentication
    * The server, client, keygen, and key converter can be compiled into a single binary (à la busybox)
    * Features can easily be disabled when compiling to save space
    * TCP forwarding support
But the dropbear options state:
tc@box:~$ dropbear -help
Dropbear sshd v0.52
Usage: dropbear [options]
Options are:
-b bannerfile   Display the contents of bannerfile before user login
                (default: none)
-d dsskeyfile   Use dsskeyfile for the dss host key
                (default: /etc/dropbear/dropbear_dss_host_key)
-r rsakeyfile   Use rsakeyfile for the rsa host key
                (default: /etc/dropbear/dropbear_rsa_host_key)
-F              Don't fork into background
-E              Log to stderr rather than syslog
-m              Don't display the motd on login
-w              Disallow root logins
-s              Disable password logins
-g              Disable password logins for root
-j              Disable local port forwarding
-k              Disable remote port forwarding
-a              Allow connections to forwarded ports from any host
-p [address:]port
                Listen on specified tcp port (and optionally address),
                up to 10 can be specified
                (default port is 22 if none specified)
-P PidFile      Create pid file PidFile
                (default /var/run/dropbear.pid)
-W <receive_window_buffer> (default 24576, larger may be faster, max 1MB)
-K <keepalive>  (0 is never, default 0)
-I <idle_timeout>  (0 is never, default 0)
tc@box:~$
So I'm wondering where is the x11 forwarding configured?
Perhaps openssh with openssl-0.9.8h is the answer but that adds another 1.7MB that I would like to avoid to get a simple remote xsession working.
I suppose I should ask before making an assumption if remote xsessions work on tc openssh.