IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
X11 forwarding
I recognize it may be too late to get this into the upcoming RFCs - but
if I don't mention it it definitely won't get in....
In an offlist email exchange about X11 forwarding, I realize there is
an aspect of it which is unsaid in the drafts, but is important:
existing server implementations use the "x11 authentication protocol"
and "x11 authentication cookie" (which really are *authorization*
values than *authentication* values, but never mind) values directly,
rather than providing its own nonce authorization information for the
session and replacing it with the values from the x11-req when
forwarding connections.
The reason I mention this now is that it is critical for security that
client implementors understand this expectation, and there is nothing
in the drafts even alluding to it. Indeed, I am astonished to hear
that existing servers work this way, but I consider my correspondent
competent to report their behaviour accurately. Until I was told this,
I had no idea server implementers were that crazy - for, yes, I do
consider it crazy; quite aside from the security aspects of it, it
means that the *client* must know what authorization-protocol-name and
authorization-protocol-data (to give them their X names) are
appropriate on the *server*'s system.
I assume it is too late to fix the semantics. But is it too late to
get a note added warning implementors of this?
/~\ The ASCII der Mouse
\ / Ribbon Campaign
X Against HTML mouse%rodents.montreal.qc.ca@localhost
/ \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B
Home |
Main Index |
Thread Index |
Old Index