https://bugzilla.novell.com/show_bug.cgi?id=538064
https://bugzilla.novell.com/show_bug.cgi?id=538064#c33
--- Comment #33 from Egbert Eich 2010-09-28 13:23:09 UTC ---
I finally found the original email tread discussing this (that there once used
to be an xorg-arch email list has escaped my memory):
http://lists.x.org/archives/xorg-arch/2005-August/thread.html
the suggestion made by Adam Jackson in the final message in this thread solves
the problem. It is not network transparent, though but this is not much of a
concern today any more. The issues described in 'man 7 Xsecurity' (section
SERVER INTERPRETED ACCESS TYPES) regarding ssh may not be an issue under Linux
- I haven't tested this though.
ATM I cannot think of any relevant scenario (on Linux and as long as we
disallow and don't support remote X connections thru TCP) right now which would
fail if access control is made user based.
So maybe we should check if a simple:
xhost +si:localuser:$(whoami)
solves the issue for us (and doesn't leave any corner cases behind). If so we
should then nuke the patches for XAUTHLOCALHOSTNAME instead.
Vincent: could you whack gdm to use server interpreted access control. We can
then deploy this on openSUSE and see if people report bugs.
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.