[3331] in bugtraq

home help back first fref pref prev next nref lref last post

quick and dirty x-protect

daemon@ATHENA.MIT.EDU (*Hobbit*)
Wed Sep 4 17:57:37 1996

Date: 	Wed, 4 Sep 1996 14:07:26 -0400
Reply-To: *Hobbit* <hobbit@avian.org>
From: *Hobbit* <hobbit@avian.org>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>

If you're on a system that you haven't custom-built the X server for but
supports stock BSD-style bind(), you can always run something like

        #!/bin/sh
        while true ; do
          nc -v -l -s `hostname` -p 6000 -n 2.2.2.2 2
        done

which will holler when someone tries to tickle your server.  Then make all
your own connections via localhost, the unix-domain socket, or a relay from
some other TCP port.

Note tricky positional use of "-n" for speed.  Replace "2.2.2.2 2" with
something randomish.  This still won't completely protect the server since
there's a small window where the listener isn't running, but at least you'll
*know* when someone screwed with it.

_H*

home help back first fref pref prev next nref lref last post