home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.windows.x:19488 alt.security:4853
- Path: sparky!uunet!olivea!spool.mu.edu!agate!ames!riacs!ames.arc.nasa.gov!welch
- From: welch@ames.arc.nasa.gov (Todd Welch)
- Newsgroups: comp.windows.x,alt.security
- Subject: /tmp/.X11-unix fileprotection & re-use
- Keywords: X, security, xinit
- Message-ID: <1992Nov23.202848.18456@riacs.edu>
- Date: 23 Nov 92 20:28:48 GMT
- Sender: news@riacs.edu
- Reply-To: welch@ames.arc.nasa.gov (Todd Welch)
- Organization: Sterling Software
- Lines: 25
-
- In conversations regarding X authorization one item has been
- suggested having to do with changing protection of /tmp/.X11-unix
- from its default mode 777 to 700.
-
- [description of local xhost coercion by usurping DISPLAY elided]
-
- > In your .xinitrc file include the following:
- >
- > /bin/chmod 700 /tmp/.X11-unix
-
- So it has been suggested that filesys protection might be used
- to lockout access to the socket and prevent client invocation by
- all non-owner processes. Directory sticky-bits and xdm aside,
- this could have the affect of preventing subsequent use of the
- directory by all others well after the session terminates.
-
- i cannot determine how an admin might "clean up" after the X
- process has terminated so that other follow-on users might re-use
- the display. As it appears xinit may exit w/out cleaning /tmp :-(
- i wonder how those sites provide for re-assignment of ownership
- so that follow-on X's can access the (X0) socket thru .X11-unix/
- once it has been chmod'ed by the first user?
-
- thx-in-adv,
- -todd <welch@ames.arc.nasa.gov>
-