home *** CD-ROM | disk | FTP | other *** search
- From: bsy+@CS.CMU.EDU (Bennet Yee)
- Newsgroups: alt.security
- Subject: Re: Big computer security lax?
- Message-ID: <1992Feb03.055758.185541@cs.cmu.edu>
- Date: 3 Feb 92 05:57:58 GMT
- References: <1992Feb3.003246.27228@ux1.cso.uiuc.edu> <1992Feb3.040316.3609@ctr.columbia.edu>
- Organization: Cranberry Melon, School of Cucumber Science
-
- In article <1992Feb3.040316.3609@ctr.columbia.edu>, jmgilchr@mtu.edu (Jason Gilchrist) writes:
- >
- > Along similar lines, there is a program that is widely
- >available that allows users of X-Windows to pull up other
- >users' windows remotely. The program also updates the window
- >at a specified interval. This program could also be looked at
- >as a security/privacy risk. The only way to defeat the
- >program is to have your xhost set to -. Of course, other
- >people not on console can change the xhost to whatever they
- >want. This holds true for X11R4, but I am not sure if it
- >holds for X11R5...
-
- This is not quite true. In the first place, there's the
- MIT-MAGIC-COOKIE-1 protocol, which pushes the access control problem
- into the filesystem. Not ideal if you don't have an authenticated
- secure distributed filesystem of some kind, but good enough, esp since
- X traffic isn't encrypted anyhow, so IP level spoofing of the X server
- to hijack a connection isn't _that_ much harder than using a sniffer
- to grab the authentication cookie as it flies past on the net. Modulo
- these potential problems (which will occur unless some cryptography is
- brought to bear), the magic cookie protocol suffices for access
- control.
-
- Second, even with R4 and maybe R3 (I forget), you can set your access
- control list to be completely empty. The Unix domain socket in
- /tmp/.X11-unix/X0 can be made a symbolic link to the real socket in a
- directory that only you have access (access control bits on Unix
- domain sockets are ignored, of course, since sockets are only grafted
- onto normal, everything-is-a-file Unix). This disallows other users
- on your system as well as those on other machines from accessing your
- X server. Of course, this means that the network-transparency that
- X11 buys you is lost: _you_ can't use the cycles on another machine,
- running X clients there to pop up on your own machine either. At
- least not without using a timing window to temporarily disable access
- control, which is a crufty hack.
-
- Rumor has it that a Kerberized access control mechanism will be
- implemented.
-
- Anyhow, frequently polled window snooping slows down the server a bit.
- A reasonably observant user _should_ notice. :-)
-
- -bsy
-
- --
- Bennet S. Yee Phone: +1 412 268-7571 Email: bsy+@cs.cmu.edu
- School of Computer Science, Carnegie Mellon, Pittsburgh, PA 15213-3890
-
-