| Summary: | configurable timeout for x11 cookies | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Tavis Ormandy <taviso> | ||||||
| Component: | ssh | Assignee: | Assigned to nobody <unassigned-bugs> | ||||||
| Status: | CLOSED FIXED | ||||||||
| Severity: | enhancement | CC: | djm | ||||||
| Priority: | P2 | ||||||||
| Version: | 5.5p1 | ||||||||
| Hardware: | All | ||||||||
| OS: | Linux | ||||||||
| Bug Depends on: | |||||||||
| Bug Blocks: | 1708 | ||||||||
| Attachments: |
|
||||||||
|
Description
Tavis Ormandy
2010-06-20 21:24:46 AEST
Additionally, we can make the client refuse X11 connection requests for untrusted channels when it knows the cookie is scheduled to expire (- a few seconds to be safe) Created attachment 1886 [details]
/home/djm/ssh-x11forwardtimeout2.diff
Make client refuse X11 connections after timeout has expired
Oops, 20 minutes, not two hours, my mistake. Your patch looks good to me, a much better solution. patch applied - this will be in OpenSSH-5.6. Thanks! Move resolved bugs to CLOSED after 5.7 release |