| Summary: | use Xephyr for "secure" X-forwarding | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Christoph Anton Mitterer <calestyo> |
| Component: | ssh | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED WONTFIX | ||
| Severity: | enhancement | CC: | djm, pcerny |
| Priority: | P2 | ||
| Version: | 5.8p1 | ||
| Hardware: | All | ||
| OS: | All | ||
|
Description
Christoph Anton Mitterer
2011-08-14 05:05:16 AEST
That's a nice idea - the security extension stuff in X11 that we support has never worked well with applications that people actually use. Unfortunately, xephyr isn't widely deployed beyond Linux so we can't count on it being there. Perhaps we could ship some scripts in contrib/ that simplify the use of xephyr with ssh for now? Yeah,.. I think it would be great... though, I don't yet know, whether Xephyr is "break-out-secure". What do you mean with "beyond Linux". It's part of xorg as far as I can see, so in principle every major UNIX/Linux should ship it (are there still people using Xfree86?!). With respect to Windows/MAC/other systems: These don't have any X [forwarding] support out-of-the box,... so they don't support the whole thing anyway. So IMHO this wouldn't be a problem. And I guess it would be much more useful, if this was integrated in ssh itself,.. and controllable via config options, e.g. that one can disable "normal" X11 forwarding completely while allowing the "secure" Xephyr forwarding. Cheers, Chris. I posted a message[0] on xorg-devel, asking for advise whether the idea is actually sane, in a sense whether Xephyr is expected to confine X-forwardning or whether breaking out is easily possible. [0] http://lists.x.org/archives/xorg-devel/2012-September/033643.html From my side we can close this. I'd guess that any way that can be used to compromise the normal X, would also be usable to compromise Xephyr. Plus, X is anyway on it's way out. OpenSSH 9.3 has been released. Close resolved bugs |