Sponsored Content
Full Discussion: X Windows Security Issue
Top Forums UNIX for Beginners Questions & Answers X Windows Security Issue Post 302985714 by Corona688 on Monday 14th of November 2016 12:09:03 PM
Old 11-14-2016
Do not post classroom or homework problems in the main forums. Homework and coursework questions can only be posted in this forum under special homework rules.

Please review the rules, which you agreed to when you registered, if you have not already done so.

More-than-likely, posting homework in the main forums has resulting in a forum infraction. If you did not post homework, please explain the company you work for and the nature of the problem you are working on.

If you did post homework in the main forums, please review the guidelines for posting homework and repost.

Thank You.

The UNIX and Linux Forums.
 

7 More Discussions You Might Find Interesting

1. Cybersecurity

permissions and security with windows 2000 server

I setup a Windows 2000 Server so that a G4 could access one specific folder. The only way this contact could take place between the two operating systems is with Maclan. I have not installed it with the PCmaclan currently, I have only been reading about it. Can someone assist me with this... (0 Replies)
Discussion started by: pmoncriffe
0 Replies

2. UNIX for Dummies Questions & Answers

Unix vs Windows security

Hi to all, Asking which of the Unix and Windows platform is better may sound stupid...! But may I know what are the major differences between Unix and Windows in terms of security (authentication, access control, and complexity vs simplicit)? In which ways Unix does better than windows and... (1 Reply)
Discussion started by: heroine
1 Replies

3. UNIX for Dummies Questions & Answers

What kind of security applications UNIX and Windows have in common?

Hi guys, may I know what kind of security applications do UNIX and Windows have in common? This is related to a project that is approaching its deadline, so would you all please be kind enough to help me? Thank You. (0 Replies)
Discussion started by: austintham
0 Replies

4. UNIX for Advanced & Expert Users

Any takers on a security issue

Hi All I have a issue We have a server that the network configuration changed very recently, this unusual and this has now turned in to a security incident. Because I just finished verifying all logs Su log, syslog, messages, sudosh.logs sudo,logs and I can’t find any... (8 Replies)
Discussion started by: Ex-Capsa
8 Replies

5. Cybersecurity

Linux and Windows Configuration Security

Hi, I have the following situation and proposed solution: SITUATION I have a notebook computer. The manufacturer ships the hardware with a Windows OS (either XP Pro, Vista or Windows 7). They provide support only for a Windows OS. Also, I am not sure how fuss-free it is to use any Linux... (0 Replies)
Discussion started by: Hanz
0 Replies

6. Red Hat

security issue

Hi all, Can someone please help to provide solutions for below security-related Linux server issue? Level : 2 UDP Constant IP Identification Field Fingerprinting Vulnerability Level : 2 TCP Sequence Number Approximation Based Denial of Service Level : 2 Operating System Detected Level : 2... (1 Reply)
Discussion started by: lseowhua
1 Replies

7. UNIX for Beginners Questions & Answers

Finger command and security issue

$ finger yeti Login: yeti Name: yeti Directory: /arpa/tz/y/yeti Shell: /bin/ksh On since Wed Apr 2 15:24 (UTC) on pts/149 Mail last read Mon Mar 31 11:08 2014 (UTC) No Plan. Hi there, I am trying to... (2 Replies)
Discussion started by: alvinoo
2 Replies
xpaacl(7)							SAORD Documentation							 xpaacl(7)

NAME
XPAAcl - Access Control for XPA Messaging SYNOPSIS
XPA supports host-based access control for each XPA access point. You can enable/disable access control using the XPA_ACL environment variable. You can specify access to specific XPA access points for specific machines using the XPA_DEFACL and XPA_ACLFILE environment vari- ables. By default, an XPA access point is accessible only to processes running on the same machine (same as X Windows). DESCRIPTION
When INET sockets are in use (the default, as specified by the XPA_METHOD environment variable), XPA supports a host-based access control mechanism for individual access points. This mean that access can be specified for get, set, or info operations for each access point on a machine by machine basis. For LOCAL sockets, access is restricted (by definition) to the host machine. XPA access control is enabled by default, but can be turned off by setting the XPA_ACL environment variable to false. In this case, any process can access any XPA server. Assuming that access control is turned on, the ACL for an individual XPA access point is set up when that access point is registered (although it can be changed later on; see below). This can be done in one of two ways: Firstly, the XPA_ACLFILE environment variable can defined to point to a file of access controls for individual access points. The format of this file is: class:name ip acl The first argument is a template that specifies the class:name of the access point covered by this ACL. See XPA Access Points and Templates for more information about xpa templates. The second argument is the IP address (in human-readable format) of the machine which is being given access. This argument can be * to match all IP addresses. It also can be $host to match the IP address of the current host. The third argument is a string combination of s, g, or i to allow xpaset, xpaget, or xpainfo access respectively. The ACL argument can be + to give sgi access or it can be - to turn off all access. For example, *:xpa1 somehost sg *:xpa1 myhost + * * g will allow processes on the machine somehost to make xpaget and xpaset calls, allow processes on myhost to make any call, and allow all other hosts to make xpaget (but not xpaset) calls. Secondly, if the XPA_ACLFILE does not exist, then a single default value for all access points can be specified using the XPA_DEFACL envi- ronment variable. The default value for this variable is: #define XPA_DEFACL "*:* $host +" meaning that all access points are fully accessible to all processes on the current host. Thus, in the absence of any ACL environment vari- ables, processes on the current host have full access to all access points created on that host. This parallels the X11 xhost mechanism. Access to an individual XPA access point can be changed using the -acl parameter for that access point. For example: xpaset -p xpa1 -acl "somehost -" will turn off all access control for somehost to the xpa1 access point, while: xpaset -p XPA:xpa1 -acl "beberly gs" will give beberly xpaget and xpaset access to the access point whose class is XPA and whose name is xpa1. Similarly, the current ACL for a given access point can be retrieved using: xpaget xpa1 -acl Of course, you must have xpaget access to this XPA access point to retrieve its ACL. Note that the XPA access points registered in the xpans program also behave according to the ACL rules. That is, you cannot use xpaget to view the access points registered with xpans unless you have the proper ACL. Note also when a client request is made to an XPA server, the access control is checked when the initial connection is established. This access in effect at this time remains in effect so long as the client connection is maintained, regardless of whether the access fro that XPA is changed later on. We recognize that host-based access control is only relatively secure and will consider more stringent security (e.g., private key) in the future if the community requires such support. SEE ALSO
See xpa(7) for a list of XPA help pages version 2.1.14 June 7, 2012 xpaacl(7)
All times are GMT -4. The time now is 10:17 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy