summaryrefslogtreecommitdiff
path: root/ssh_config.5
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2003-10-15 15:54:32 +1000
committerDarren Tucker <dtucker@zip.com.au>2003-10-15 15:54:32 +1000
commit0a118da00eff14f018a055b3c187f27aa7d78ecd (patch)
tree6904bb2738a1a8a00c545fac7d4fec7b74bee870 /ssh_config.5
parenta044f47679c27ca77b3ec19a6e0e148deb50a427 (diff)
- markus@cvs.openbsd.org 2003/10/11 08:24:08
[readconf.c readconf.h ssh.1 ssh.c ssh_config.5] remote x11 clients are now untrusted by default, uses xauth(8) to generate untrusted cookies; ForwardX11Trusted=yes restores old behaviour. ok deraadt; feedback and ok djm/fries
Diffstat (limited to 'ssh_config.5')
-rw-r--r--ssh_config.524
1 files changed, 21 insertions, 3 deletions
diff --git a/ssh_config.5 b/ssh_config.5
index da162499b..7f3c7064a 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -34,7 +34,7 @@
34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 34.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36.\" 36.\"
37.\" $OpenBSD: ssh_config.5,v 1.21 2003/10/08 15:21:24 markus Exp $ 37.\" $OpenBSD: ssh_config.5,v 1.22 2003/10/11 08:24:08 markus Exp $
38.Dd September 25, 1999 38.Dd September 25, 1999
39.Dt SSH_CONFIG 5 39.Dt SSH_CONFIG 5
40.Os 40.Os
@@ -306,9 +306,27 @@ The default is
306.Pp 306.Pp
307X11 forwarding should be enabled with caution. 307X11 forwarding should be enabled with caution.
308Users with the ability to bypass file permissions on the remote host 308Users with the ability to bypass file permissions on the remote host
309(for the user's X authorization database) 309(for the user's X11 authorization database)
310can access the local X11 display through the forwarded connection. 310can access the local X11 display through the forwarded connection.
311An attacker may then be able to perform activities such as keystroke monitoring. 311An attacker may then be able to perform activities such as keystroke monitoring
312if the
313.Cm ForwardX11Trusted
314option is also enabled.
315.It Cm ForwardX11Trusted
316If the this option is set to
317.Dq yes
318then remote X11 clients will have full access to the original X11 display.
319If this option is set to
320.Dq no
321then remote X11 clients will be considered untrusted and prevented
322from stealing or tampering with data belonging to trusted X11
323clients.
324.Pp
325The default is
326.Dq no .
327.Pp
328See the X11 SECURITY extension specification for full details on
329the restrictions imposed on untrusted clients.
312.It Cm GatewayPorts 330.It Cm GatewayPorts
313Specifies whether remote hosts are allowed to connect to local 331Specifies whether remote hosts are allowed to connect to local
314forwarded ports. 332forwarded ports.