On Mon, Jan 07, 2008 at 07:28:40AM +0200, [EMAIL PROTECTED] wrote:
> On Sat, Jan 05, 2008 at 11:38:24PM -0500, Douglas A. Tutty wrote:
> > On Sat, Jan 05, 2008 at 07:48:53PM -0800, Ted Unangst wrote:
> > > On 1/5/08, Douglas A. Tutty <[EMAIL PROTECTED]> wrote:
> > > > Is there anything that, bug-wise, could go wrong with that remote
> > > > browser that would be able to read or alter anything on the local
> > > > machine?  I'm talking about using ssh's X forwarding features, not using
> > > > X's native forwarding.
> > > 
> > > a lot more can go wrong than can go right.  in theory, yes, you are
> > > insulated from the client acting up.  in practice, the isolation is
> > > often too complete.  i have never had an app actually work via an ssh
> > > -X connection.
> > 
> > I do it all the time.  The __only__ "normal app" I can't get to work is
> > from an OpenBSD box, ssh -X to a Debian box running Iceweasel (Firefox).
> > Debian-Debian even Iceweasel works just fine.
> 
> >From the ssh_config manpage on Debian (Etch):
> 
>      ForwardX11Trusted
>              If this option is set to ``yes'' then remote X11 clients will
>              have full access to the original X11 display.
> 
>              If this option is set to ``no'' then remote X11 clients will be
>              considered untrusted and prevented from stealing or tampering
>              with data belonging to trusted X11 clients.  Furthermore, the
>              xauth(1) token used for the session will be set to expire after
>              20 minutes.  Remote clients will be refused access after this
>              time.
> 
>              The default is ``yes'' (Debian-specific).
>                             ^^^    ^^^^^^^^^^^^^^^

Right, but when I go from an OpenBSD box via ssh to a debian box to run
apps, then that doesn't apply and I don't set ForwardX11Trusted on the
OpenBSD box which I use ssh -X and not ssh -Y.

Doug.

Reply via email to