[3331] in bugtraq
quick and dirty x-protect
daemon@ATHENA.MIT.EDU (*Hobbit*)
Wed Sep 4 17:57:37 1996
Date: Wed, 4 Sep 1996 14:07:26 -0400
Reply-To: *Hobbit* <hobbit@avian.org>
From: *Hobbit* <hobbit@avian.org>
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
If you're on a system that you haven't custom-built the X server for but
supports stock BSD-style bind(), you can always run something like
#!/bin/sh
while true ; do
nc -v -l -s `hostname` -p 6000 -n 2.2.2.2 2
done
which will holler when someone tries to tickle your server. Then make all
your own connections via localhost, the unix-domain socket, or a relay from
some other TCP port.
Note tricky positional use of "-n" for speed. Replace "2.2.2.2 2" with
something randomish. This still won't completely protect the server since
there's a small window where the listener isn't running, but at least you'll
*know* when someone screwed with it.
_H*