[39798] in Cypherpunks
Re: XDM has the same problem as netscape ?!
daemon@ATHENA.MIT.EDU (Josh M. Osborne)
Thu Sep 21 20:22:40 1995
To: iang@cs.berkeley.edu
Cc: cypherpunks@toad.com
In-Reply-To: Your message of "21 Sep 1995 11:49:59 EDT."
<43s1j7$nd3@calum.csclub.uwaterloo.ca>
Date: Thu, 21 Sep 1995 20:19:23 -0400
From: "Josh M. Osborne" <stripes@va.pubnix.com>
In message <43s1j7$nd3@calum.csclub.uwaterloo.ca>, Ian Goldberg writes:
>In article <9509210631.AA18308@sfi.santafe.edu>,
>Nelson Minar <nelson@santafe.edu> wrote:
>>Last time I looked, the MIT-MAGIC-COOKIE-1 scheme used in X11R4 had
>>the same problem: the random seed was based on the current time to the
>>microsecond, modulo the granularity of the system clock. I think I
>>figured that on my hardware, if I could figure out which minute the X
>>server started (easy with finger), I'd only have to try a few
>>thousand keys or so. Caveat: I never actually proved the idea.
>
>Wow. I just checked, and Nelson's right.
[...]
Of corse you can do what I have been doing for years:
$cookie=`good-source-or-random-hex-strings`
xauth add $DISPLAY MIT-MAGIC-COOKIE-1 $cookie
xinit ~/.xinitrc $DISPLAY -- $server :$port -auth $XAUTHORITY
(assuming you set the various variables correctly)
This will allow you to gennerate your own cookies rather then
relying on MIT. (I actually have C code to set the cookie dirrectly,
since I don't really care to have it visable to ps, even breifly).
Unfortunitly X will blat the "secret" out in the clear every time you
make an X connection, so it still isn't very good.