- X Window authorization
In the
X Window System , programs connect to theX server , possibly via acomputer network . Since the network may be accessible to other users, a method for forbidding access to programs run by users different from the one who is logged in is necessary.There are five standard access control mechanisms that control whether a client application can connect to an X server. They can be grouped in three categories:
# access based on host
# access based on cookie
# access based on userAdditionally, like every other network connection, tunnelling can be used.
Host-based access
The host-based access method consists in specifying a set of hosts that are authorized to connect to the X server. This system is considered obsolete, as it allows every user who has access to such a host to connect to the display. The
xhost
program and threeX Window System core protocol requests are used to activate this mechanism and to display and change the list of authorized hosts.Cookie-based access
The cookie-based authorization methods are based on choosing a
magic cookie (an arbitrary piece of data) and passing it to the server when it is started; every client that can prove having knowledge of this cookie is then authorized connection to the server.These cookies are created by a separate program and stored in the file
.Xauthority
in the user's home directory, by default. As a result, every program run by the client on the local computer can access this file and therefore the cookie that is necessary for being authorized by the server. If the user wants to start an application from another computer on the network, the cookie has to be copied to that other computer. How the cookie is copied is a system-dependent issue: for example, onUnix-like platforms, scp can be used to copy the cookie.The two systems using this method are
MIT-MAGIC-COOKIE-1
andXDM-AUTHORIZATION-1
. In the first method, the client simply sends the cookie when requested to authenticate. In the second method, asecret key is also stored in the.Xauthority
file. The client creates a string by concatenating the current time, a transport-dependent identifier, and the cookie, encrypts the resulting string, and sends it to the server.The xauth application is a utility for accessing the
.Xauthority
file.User-based access
The user-based access methods work by authorizing specific users to connect to the server. When a client establishes a connection to a server, it has to prove being controlled by an authorized user.
The two methods based on authenticating users are
SUN-DES-1
andMIT-KERBEROS-5
. The first system is based on a mechanism of secure remote procedure call developed inSunOS . The second mechanism is based on both client and server trusting a Kerberos server.Tunneling
Connection between client and server over a network can be protected using a secure
tunnelling protocol such as SSL or SSHSee also
*
X Window core protocol
*X Window System protocols and architecture External links
* [http://www.xfree86.org/current/Xsecurity.7.html X security manual page]
Wikimedia Foundation. 2010.