https://bugzilla.mindrot.org/show_bug.cgi?id=3695
--- Comment #1 from kolafl...@kolahilft.de --- Recent developments: https://lwn.net/Articles/984838/ > 0.0.0.0 Day: > Exploiting Localhost APIs From the Browser (Oligo Security) Turns out Unix (Linux, macOS) maps requests to 0.0.0.0/32 also to 127.0.0.1. WORKAROUND SSH: Forward X via UNIX socket instead of IP. (bash code for Debian-12) remote_disp="$(shuf -i1-10000 -n1)" ssh -t -R /tmp/.X11-unix/X${remote_disp}:/tmp/.X11-unix/X"${DISPLAY:1}" "${@}" env "DISPLAY=:${remote_disp}" bash -c "bash; rm -Iv /tmp/.X11-unix/X${remote_disp}" WORKAROUND BROWSER: I'm now running my browser in a cgroup which I deny access to these addresses. (bash code) systemd-run --user --scope --slice=no_localhost_net WEBBROWSER # run with $CMD "iptables" and "ip6tables" # for $IP 127.0.0.0/8 and 0.0.0.0/32 and ::1/128 $IPTABLES -A OUTPUT -p tcp --destination $IP -m cgroup --path 'user.slice/user-${UID}.slice/user@${UID}.service/no_localhost_net.slice' -j REJECT -- You are receiving this mail because: You are watching the assignee of the bug. _______________________________________________ openssh-bugs mailing list openssh-bugs@mindrot.org https://lists.mindrot.org/mailman/listinfo/openssh-bugs