On Tue, Jan 13, 2015 at 11:22 PM, Billy Wilson <billy_wil...@byu.edu> wrote:
> Hi,
>
> I have a question about using Xvfb securely on a multi-user system. We are
> currently using  xorg-x11-server-Xvfb-1.10.4-6.el6.x86_64. Our main reason
> for using Xvfb is to accommodate one of our users, whose scientific
> computing software requires an X server for some reason.
>
> My concern is that if the non-privileged user runs the following: `Xvfb :1
> -screen 0 800x600x24+1`
>
> Any user on the system is able to export DISPLAY=:1 and run programs that
> connect to his dummy X server. I'm aware of auth file and xhost mechanisms
> for access control, but I was wondering how I can have Xvfb restrict
> connections strictly to the user, by default.
>
> In other words: How can I prevent an uninformed user from using the Xvfb
> defaults and opening X to the world?

See Xsecurity(7) manual page... the SUN-DES-1 MIT-KERBEROS-5 and
ServerInterpreted auth (see $ xhost +si:localuser:root # example in
the man page, likely your preference if you only need Xvfb locally)
are user-to-user authentification mechanisms...

----

Bye,
Roland

-- 
  __ .  . __
 (o.\ \/ /.o) roland.ma...@nrubsig.org
  \__\/\/__/  MPEG specialist, C&&JAVA&&Sun&&Unix programmer
  /O /==\ O\  TEL +49 641 3992797
 (;O/ \/ \O;)
_______________________________________________
xorg@lists.x.org: X.Org support
Archives: http://lists.freedesktop.org/archives/xorg
Info: http://lists.x.org/mailman/listinfo/xorg
Your subscription address: %(user_address)s

Reply via email to