On Sat, Jan 05, 2008 at 11:38:24PM -0500, Douglas A. Tutty wrote:
> On Sat, Jan 05, 2008 at 07:48:53PM -0800, Ted Unangst wrote:
> > On 1/5/08, Douglas A. Tutty <[EMAIL PROTECTED]> wrote:
> > > Is there anything that, bug-wise, could go wrong with that remote
> > > browser that would be able to read or alter anything on the local
> > > machine?  I'm talking about using ssh's X forwarding features, not using
> > > X's native forwarding.
> > 
> > a lot more can go wrong than can go right.  in theory, yes, you are
> > insulated from the client acting up.  in practice, the isolation is
> > often too complete.  i have never had an app actually work via an ssh
> > -X connection.
> 
> I do it all the time.  The __only__ "normal app" I can't get to work is
> from an OpenBSD box, ssh -X to a Debian box running Iceweasel (Firefox).
> Debian-Debian even Iceweasel works just fine.

>From the ssh_config manpage on Debian (Etch):

     ForwardX11Trusted
             If this option is set to ``yes'' then remote X11 clients will
             have full access to the original X11 display.

             If this option is set to ``no'' then remote X11 clients will be
             considered untrusted and prevented from stealing or tampering
             with data belonging to trusted X11 clients.  Furthermore, the
             xauth(1) token used for the session will be set to expire after
             20 minutes.  Remote clients will be refused access after this
             time.

             The default is ``yes'' (Debian-specific).
                              ^^^    ^^^^^^^^^^^^^^^

Reply via email to