On Mon, Feb 26, 2001 at 09:22:36PM -0600, Richard Cobbe wrote:
> Lo, on Monday, February 26, Ethan Benson did write:
> 
> > On Tue, Feb 27, 2001 at 06:05:03AM +0800, #KUNDAN KUMAR# wrote:
> > > Are you using su to run the xcnofig? If that is the case, try running 
> > > "xhost
> > > +" inside the termianal. Then run su and do the kernel compilation...
> > > let's see if it works.. just a guess..
> > 
> > don't do that, that disables ALL X security and lets any bozo on your
> > network or the internet to connect to and snoop your entire X
> > session.  never do that unless you are not connected to ANY NETWORK! 
> > 
> > in short xhost + is a HUGE SECURITY HOLE
> 
> Absolutely.  Two options which are much better:
> 
> 1) xhost +foo
>     where foo is your local hostname.  Still not ideal, as this allows
>     anyone who can log on to your machine full access to the X server, as
>     Ethan described above.

i consider this a bad idea.  

> 2) xauth merge ~bar/.Xauthority
>     where `bar' is the user who started X (or logged in at the *dm
>     window).  This is the best situation, as it only allows the user who
>     runs xauth access.

or simpler:

ssh -l username -X localhost

then ssh will forward the X stuff for you, no xauth or .Xauthority
fiddling, and no leakage of your X keys.  no muss no fuss.  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

Attachment: pgpzskvqSGXJ3.pgp
Description: PGP signature

Reply via email to