IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

behaviour when an invalid cookie arrives on an x11 channel



Hi,

 

  The connection draft states (in section 6.3.1  Requesting X11 Forwarding):

 

   “It is recommended that the authentication cookie that is sent be a fake, random cookie, and that the cookie is checked and replaced by the real cookie when a connection request is received.”

 

  Clearly the intent of this is that the fake cookie be translated to the real cookie.

 

  However, my reading of this is that the action when there is an invalid cookie (ie not the fake cookie generated when the tunnel was set up) or when there is no cookie is not specified. Is this correct? Obviously, from a security point of view, we might want to close the channel in this case, or have some downstream checking going on. But as far as the ssh protocol is concerned, it sounds like (from this draft) that we are not required to terminate the connection.

 

Glen Matthews



Home | Main Index | Thread Index | Old Index