Will Lowe wrote:

> On Tue, 7 Jul 1998 [EMAIL PROTECTED] wrote:
>
> > Unless explicitly told to do so using xhost, X does not allow anybody
> > other than the person who started it to open windows on its desktop,
> > not even root.  I could never figure out the proper syntax for xhost,
> > however, so I usually end up just using 'xhost +' which disables all
> > access control and then 'xhost -' when I'm done.
>
> That's pretty insecure.  I've seen instances where people on our campus
> (admittedly,  a large one with relatively insecure systems anyway) have
> had other people connect to their X displays because they'd done the
> "xhost +" bit.  Generally more a nuisance than a real security concern,
> but still... "xhost + locahost" is only marginally more secure ... with
> that one,  just anyone on the x machine can connect ... so on a system
> which distributes campus email,  that's a few thousand people here...
>
> Go for "sudo".

Actually, it's potentially much more than a nuisance. An X client can capture 
all your
keystrokes. You do the math.

To just allow root to run an X app when you logged in as someone other than 
root do:

chilin$ su
Password:
chilin# export XAUTHORITY=$(echo /var/lib/xdm/authdir/authfiles/*)

This way you can log access the server using the xauth data which only you and 
root
have access to. Neato.
Try it!

--
Jens B. Jorgensen
[EMAIL PROTECTED]



--  
Unsubscribe?  mail -s unsubscribe [EMAIL PROTECTED] < /dev/null

Reply via email to