On Tue, 5 Mar 2002, Adi Stav wrote:

> On Tue, Mar 05, 2002 at 08:04:19AM +0200, Shlomi Fish wrote:
> >
> > I always considered Run Level 5 as a very bad idea, which I'll never want
> > to use. However, I recently run into a dillema here at the Computer
> > Networks farm. If I start X from the console and lock it, then a malicious
> > user can switch to the console from which it was invoked, press Ctrl+C or
> > Ctrl+Z and gain my permissions.
> >
> > Naturally, there are ways to overcome it:
>
> Oh, just use "exec startx" instead of "startx", and the attacker will
> have no login shell left to attack.

But the legitimate user will be left with no login shell to use

If there is any problem with the X server: you'll be logged-out

One of the advantages of using startx is that you can execute other
commands. by 'exec startx' you are making this atvantage mute.

>
> "startx >startx.log 2>&1 </dev/null & exit" if you don't want to leave
> startx on the tty either. That is sort of what xdm does, too.

-- 
Tzafrir Cohen
mailto:[EMAIL PROTECTED]
http://www.technion.ac.il/~tzafrir



=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to