[8431] in bugtraq

home help back first fref pref prev next nref lref last post

Re: X11 cookie hijacker

daemon@ATHENA.MIT.EDU (Olaf Kirch)
Thu Nov 5 19:18:00 1998

Date: 	Thu, 5 Nov 1998 09:06:37 +0100
Reply-To: Olaf Kirch <okir@MONAD.SWB.DE>
From: Olaf Kirch <okir@MONAD.SWB.DE>
X-To:         David Dawes <dawes@XFREE86.ORG>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  Your message of "Tue, 03 Nov 1998 18:13:54 +1100." 
              <19981103181354.L6133@rf900.physics.usyd.edu.au>

On Tue, 03 Nov 1998 18:13:54 +1100, David Dawes wrote:
> I assume from this list that you don't have a real solution?  We've all
> seen the "potential" solutions before.  The problem doesn't still exist
> because nobody cares about it.  It still exists because nobody has, to
> my knowledge, found a real solution to it.

I consider a solution that leaves my X session open to eavesdropping
and manipulation worse than a hack that's advertised as breaking some
minor things but going to go away as soon as a better solution is
found.

Second, not all approaches necessarily break things.

 1.     Unix domain sockets could easily abandoned with, provided
        XOpenConnection clandestinely maps "unix:0" to "localhost:0".
 2.     If making /tmp/.X11-unix mode 711 breaks servers that are not
        setuid root, why not at least protect the ones that are?
        How many X servers typically get installed on a single machine?

AFAIK, most Unix vendors have been able to come up with a solution.
Not a universal one, but one that works for their servers, and
apparently doesn't break XOpenConnection big time.

Olaf
--
Olaf Kirch         |  --- o --- Nous sommes du soleil we love when we play
okir@monad.swb.de  |    / | \   sol.dhoop.naytheet.ah kin.ir.samse.qurax

home help back first fref pref prev next nref lref last post