<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Securing X-sessions in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437440#M5780</link>
    <description>Thanks a lot! I'll check everything as soon as I have time.</description>
    <pubDate>Mon, 21 Aug 2000 06:08:03 GMT</pubDate>
    <dc:creator>Mihails Nikitins</dc:creator>
    <dc:date>2000-08-21T06:08:03Z</dc:date>
    <item>
      <title>Securing X-sessions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437431#M5771</link>
      <description>I have a problem securing X-sessions from Windows boxes to HP-UX servers.&lt;BR /&gt;&lt;BR /&gt;I tried to create  /etc/X0.hosts with two records inside (only localhost and 1.1.1.1 &lt;BR /&gt;should be allowed to connect)&lt;BR /&gt;&lt;BR /&gt;localhost&lt;BR /&gt;1.1.1.1&lt;BR /&gt;&lt;BR /&gt;However, the file is being ignored allowing everyone to connect.&lt;BR /&gt;&lt;BR /&gt;Please find below some additional diagnostic information.&lt;BR /&gt;&lt;BR /&gt;If typing 'xhost' from a non-root session, I get&lt;BR /&gt;% xhost&lt;BR /&gt;access control enabled, only authorized clients can connect&lt;BR /&gt;&lt;BR /&gt;If typing 'xhost' from a root session, I get&lt;BR /&gt;# /usr/bin/X11/xhost&lt;BR /&gt;Xlib: connection to "2.2.2.2:0.0" refused by server&lt;BR /&gt;Xlib: Client is not authorized to connect to Server&lt;BR /&gt;/usr/bin/X11/xhost:  unable to open display "2.2.2.2:0.0"&lt;BR /&gt;&lt;BR /&gt;Here 2.2.2.2 is IP address of the Windows workstation running X-server application.&lt;BR /&gt;The 2.2.2.2 address should be refused when trying to connect.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance for any directions.</description>
      <pubDate>Thu, 17 Aug 2000 13:59:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437431#M5771</guid>
      <dc:creator>Mihails Nikitins</dc:creator>
      <dc:date>2000-08-17T13:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: Securing X-sessions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437432#M5772</link>
      <description>also the local xserver should always have access to it's own display you shouldn't need the localhost entry ..what happens if you remove it ?</description>
      <pubDate>Thu, 17 Aug 2000 14:05:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437432#M5772</guid>
      <dc:creator>Alex Glennie</dc:creator>
      <dc:date>2000-08-17T14:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: Securing X-sessions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437433#M5773</link>
      <description>could you elaborate a little .... where's the /etc/X0.host file located on a server or the W/S ?</description>
      <pubDate>Thu, 17 Aug 2000 14:05:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437433#M5773</guid>
      <dc:creator>Alex Glennie</dc:creator>
      <dc:date>2000-08-17T14:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: Securing X-sessions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437434#M5774</link>
      <description>just did a quick test looks like localhost isn't the answer but worth removing for now anyway, also of use would be a ps -ef ? grep X in case user based access is playing a part .....</description>
      <pubDate>Thu, 17 Aug 2000 14:25:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437434#M5774</guid>
      <dc:creator>Alex Glennie</dc:creator>
      <dc:date>2000-08-17T14:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: Securing X-sessions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437435#M5775</link>
      <description>If you edited /etc/X0.hosts and the entries&lt;BR /&gt;seem to be ignored, this may be due to&lt;BR /&gt;having not restarted the Xserver: Log&lt;BR /&gt;completely out and login again.&lt;BR /&gt;&lt;BR /&gt;If /etc/X0.hosts still seems to be ignored&lt;BR /&gt;you must be sure, that nowhere during the&lt;BR /&gt;login procedure (e.g. /etc/profile, $HOME/&lt;BR /&gt;.profile) a 'xhost +' is issued.&lt;BR /&gt;&lt;BR /&gt;The output of your first xhost (non-root&lt;BR /&gt;session) is ok, and X security seems to&lt;BR /&gt;work fine.&lt;BR /&gt;&lt;BR /&gt;The output of your second xhost (root&lt;BR /&gt;session) is ok because you disabled&lt;BR /&gt;Xserver access by anyone but not&lt;BR /&gt;1.1.1.1 or localhost.&lt;BR /&gt;&lt;BR /&gt;What do you mean with "allowing everyone&lt;BR /&gt;to connect"? What connections do you&lt;BR /&gt;mean? Of course, just applications that&lt;BR /&gt;need any components of the Xserver are&lt;BR /&gt;refused, but not other connections (e.g.&lt;BR /&gt;rlogins).</description>
      <pubDate>Thu, 17 Aug 2000 15:19:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437435#M5775</guid>
      <dc:creator>Thomas Schler_1</dc:creator>
      <dc:date>2000-08-17T15:19:21Z</dc:date>
    </item>
    <item>
      <title>Re: Securing X-sessions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437436#M5776</link>
      <description>Thanks to all of you for the feedback! Unfortunately, the problem has not been fixed yet.&lt;BR /&gt;&lt;BR /&gt;1. I find X-terminology (idea of 'server' and 'client') to be a bit confusing. I'll try to describe the problem once more.&lt;BR /&gt;&lt;BR /&gt;I have HP-UX 10.20 server that should be secured against unsolicited remote access. inetd security is already set in /var/adm/inetd.sec, but another security hole still exists. &lt;BR /&gt;inetd.sec does not affect ability to establish remote connection via X-session. So, the host should be configured properly so that to refuse all  incoming X connections except the ones from few trusted hosts.&lt;BR /&gt;&lt;BR /&gt;I'm trying to set up /etc/X0.hosts on the HP-UX box that should be secured. The security should defend the HP-UX box from incoming remote access via X-sessions.&lt;BR /&gt;&lt;BR /&gt;2. Removing of localhost from /etc/X0.hosts did not hep (I rebooted the HP-UX box). Probably, I understood manual incorrectly (Graphics Administration Guide for HP-UX 10.20 ACE, Making an X*.hosts File), since it tells&lt;BR /&gt;&lt;BR /&gt;************&lt;BR /&gt;&amp;gt; The /etc/X0.hosts file is an ASCII text file containing the hostnames of each&lt;BR /&gt;&amp;gt; remote host permitted to access your local server...&lt;BR /&gt;&amp;gt; For example, if you are hpaaaaa, and regularly ran clients on hpccccc, and&lt;BR /&gt;&amp;gt;  hpddddd, you would want the following lines.&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;gt; hpaaaaa&lt;BR /&gt;&amp;gt; hpccccc&lt;BR /&gt;&amp;gt; hpddddd&lt;BR /&gt;I guessed hpaaaaa is localhost in my case.&lt;BR /&gt;&lt;BR /&gt;3. Startup files does not contain 'xhost +' command. (/etc/profile, /etc/csh/login, ~/.profile, ~/.login, ~.cshrc)&lt;BR /&gt;&lt;BR /&gt;4. This is ps -ef |grep X output&lt;BR /&gt;&lt;BR /&gt;ps -ef |grep X&lt;BR /&gt;&lt;BR /&gt;root   944     1  0 13:14:53 ?         0:00 /usr/bin/X11/SLSd_daemon&lt;BR /&gt; daemon  1062  1056  0 13:15:24 ?         0:03 /usr/bin/X11/X :0&lt;BR /&gt;&lt;BR /&gt;5. Running xhost from root account tells that security seem to be set up&lt;BR /&gt;# /usr/bin/X11/xhost &lt;BR /&gt;Xlib: connection to "2.2.2.2:0.0" refused by server &lt;BR /&gt;Xlib: Client is not authorized to connect to Server &lt;BR /&gt;/usr/bin/X11/xhost: unable to open display "2.2.2.2:0.0" &lt;BR /&gt;However, I can iniate X-session from 2.2.2.2.&lt;BR /&gt;&lt;BR /&gt;Many thanks in advance for more comments!&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 18 Aug 2000 12:06:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437436#M5776</guid>
      <dc:creator>Mihails Nikitins</dc:creator>
      <dc:date>2000-08-18T12:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: Securing X-sessions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437437#M5777</link>
      <description>Sorry for more questions but this has got me interested but confused all at once :&lt;BR /&gt;&lt;BR /&gt;Points to note / try : check using vi that we don't have any trailing blanks etc in the /etc/X0.hosts file.&lt;BR /&gt;&lt;BR /&gt;Does the problem still occur if you use hostnames as opposed to ip addresses ?&lt;BR /&gt;&lt;BR /&gt;Am I right by saying  we have a local  hp-ux system (1.1.1.1)  and another remote system (2.2.2.2) involved here : you are on the local box with a Xsession running, you wish to prevent the remote system having access to your local systems display right ?&lt;BR /&gt;&lt;BR /&gt;Entries on 1.1.1.1 in /etc/X0.hosts = localhost &amp;amp; 1.1.1.1 &lt;BR /&gt;You then run your application remotely on 2.2.2.2 by either using &lt;XAPPLICATIONNAME&gt; -display 1.1.1.1:0 or by remotely logging onto 1.1.1.1 from 2.2.2.2 and exporting DISPLAY=1.1.1.1:0 and then running &lt;XAPPLICATIONNAME&gt;.&lt;BR /&gt;&lt;BR /&gt;You are expecting the above to fail but instead the application appears on screen 1.1.1.1:0&lt;BR /&gt;&lt;BR /&gt;Also you mention the root output in point 5 gives a connection refused error where's this being run ? and does it involve rlogin or a telnet session ?&lt;/XAPPLICATIONNAME&gt;&lt;/XAPPLICATIONNAME&gt;</description>
      <pubDate>Fri, 18 Aug 2000 12:48:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437437#M5777</guid>
      <dc:creator>Alex Glennie</dc:creator>
      <dc:date>2000-08-18T12:48:46Z</dc:date>
    </item>
    <item>
      <title>Re: Securing X-sessions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437438#M5778</link>
      <description>I'll try and summarize what I have heard so far... &lt;BR /&gt;&lt;BR /&gt;The 10.20 that you are referring to as a 'server' is a workstation, running X.  Is it&lt;BR /&gt;running a login manager, such as CDE's dtlogin, VUE's vuelogin, or xdm? &lt;BR /&gt;&lt;BR /&gt;If it is running a login manager, then by default the system will:&lt;BR /&gt;&lt;BR /&gt;- prevent access to the screen by *any* user while the login manager is displaying&lt;BR /&gt;&lt;BR /&gt;- prevent access to the screen to only the user who holds the 'cookie' after login is complete. &lt;BR /&gt;&lt;BR /&gt;If you are not running a login manager, then you need to try and mimic what the login manager does in terms of MIT-MAGIC-COOKIE authentication.   man dtlogin and man Xserver should give you a start on what that is about.  An additional man page on xauth might be of some interest as well. &lt;BR /&gt;&lt;BR /&gt;Once you are logged into a workstation as user 'a', in the default setup, user 'a' can display because he has access to the $HOME/.Xauthority file where the cookie is stored.   If 'a' su's to another user (root), then that user (root), *must* have access to the .Xauthority OR he must be given a copy so that he may put it in his own .Xauthority file. &lt;BR /&gt;&lt;BR /&gt;If you are not using MIT-MAGIC-COOKIE authentication (.Xauthority) then the only access is through host-based authentication. This is what happens when you use xhost.  Any user from host 'b' can access the display if you have done xhost +b. &lt;BR /&gt;&lt;BR /&gt;And, yes, the client and server terminology can be quite confusing the first time you see it.   Think of it this way the 'server' is the machine that is controlling the graphics *card* (hardware), while the 'client' is the machine where the program is executing.  In the case of an Xterminal, for example, it is the 'server' in X-parlance because it controls the graphics card.</description>
      <pubDate>Fri, 18 Aug 2000 16:07:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437438#M5778</guid>
      <dc:creator>Rick Beldin</dc:creator>
      <dc:date>2000-08-18T16:07:22Z</dc:date>
    </item>
    <item>
      <title>Re: Securing X-sessions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437439#M5779</link>
      <description>Hello Rick ! Curious one this .... I don't think Xauth (User based Access is involved here) as ps -ef ? grep X didn't return X:0 -auth blah blah string but you know more about this than I, Mihails we await your reply   ......</description>
      <pubDate>Sun, 20 Aug 2000 10:51:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437439#M5779</guid>
      <dc:creator>Alex Glennie</dc:creator>
      <dc:date>2000-08-20T10:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: Securing X-sessions</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437440#M5780</link>
      <description>Thanks a lot! I'll check everything as soon as I have time.</description>
      <pubDate>Mon, 21 Aug 2000 06:08:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/securing-x-sessions/m-p/2437440#M5780</guid>
      <dc:creator>Mihails Nikitins</dc:creator>
      <dc:date>2000-08-21T06:08:03Z</dc:date>
    </item>
  </channel>
</rss>

