On 09/05/2012 09:03 AM, Asias He wrote: > On Tue, Sep 4, 2012 at 9:07 PM, Avi Kivity <a...@redhat.com> wrote: >> On 08/24/2012 02:29 PM, Asias He wrote: >>> It is useful to run a X program in guest and display it on host. >>> >>> 1) Make host's x server listen to localhost:6000 >>> host_shell$ socat -d -d TCP-LISTEN:6000,fork,bind=localhost \ >>> UNIX-CONNECT:/tmp/.X11-unix/X0 >>> >>> 2) Start the guest and run X program >>> host_shell$ lkvm run -k /boot/bzImage >>> guest_shell$ xlogo >>> >> >> Note, this is insecure, don't do this with untrusted guests. > > In this use case, the user on the host side should trust the guest. > > Btw, any attack the untrusted guests can do with the X port which host > listens?
Steal the entire display, record user keystrokes, present false information. btw, how did it work? The you need the xauth cookie for this to work, or disable authentication. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html