https://bugzilla.novell.com/show_bug.cgi?id=538064 https://bugzilla.novell.com/show_bug.cgi?id=538064#c33 --- Comment #33 from Egbert Eich <eich@novell.com> 2010-09-28 13:23:09 UTC --- I finally found the original email tread discussing this (that there once used to be an xorg-arch email list has escaped my memory): http://lists.x.org/archives/xorg-arch/2005-August/thread.html the suggestion made by Adam Jackson in the final message in this thread solves the problem. It is not network transparent, though but this is not much of a concern today any more. The issues described in 'man 7 Xsecurity' (section SERVER INTERPRETED ACCESS TYPES) regarding ssh may not be an issue under Linux - I haven't tested this though. ATM I cannot think of any relevant scenario (on Linux and as long as we disallow and don't support remote X connections thru TCP) right now which would fail if access control is made user based. So maybe we should check if a simple: xhost +si:localuser:$(whoami) solves the issue for us (and doesn't leave any corner cases behind). If so we should then nuke the patches for XAUTHLOCALHOSTNAME instead. Vincent: could you whack gdm to use server interpreted access control. We can then deploy this on openSUSE and see if people report bugs. -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.