[5341] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Ulrich Flegel's SSH/X11 "vulnerability"

daemon@ATHENA.MIT.EDU (Alan Cox)
Fri Oct 3 19:42:08 1997

Date: 	Fri, 3 Oct 1997 21:18:54 +0100
Reply-To: Alan Cox <alan@LXORGUK.UKUU.ORG.UK>
From: Alan Cox <alan@LXORGUK.UKUU.ORG.UK>
X-To:         robert@cyrus.watson.org
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.BSF.3.96.971003094958.1458W-100000@cyrus.watson.org> from
              "Robert Watson" at Oct 3, 97 09:54:07 am

> > provides a major security improvement by not sending the authorization
> > cookie or the X11 packets in the clear.
>
> For increased security, the XFree86 Xnest server can be used to protect
> your display.  For example:
>
> Xnest :2 ; xterm -display :2 -e slogin -l username remotehost

Xnest isnt ideal and there is a better system available now. XFree86 3.3
supports the Broadway extensions, and one aspect of that is the ability
to partition X clients into groups. It's used to do things like run untrusted
X apps in netscape plugins. Each group has its own xauth and they can share
information. Have a look at xrx and Xsecurity in the X11R6.3 build tree.

In theory ssh could make use of the Xsecurity features.

Alan

home help back first fref pref prev next nref lref last post