Bugtraq mailing list archives

quick and dirty x-protect


From: hobbit () avian org (*Hobbit*)
Date: Wed, 4 Sep 1996 14:07:26 -0400


If you're on a system that you haven't custom-built the X server for but
supports stock BSD-style bind(), you can always run something like

        #!/bin/sh
        while true ; do
          nc -v -l -s `hostname` -p 6000 -n 2.2.2.2 2
        done

which will holler when someone tries to tickle your server.  Then make all
your own connections via localhost, the unix-domain socket, or a relay from
some other TCP port.

Note tricky positional use of "-n" for speed.  Replace "2.2.2.2 2" with
something randomish.  This still won't completely protect the server since
there's a small window where the listener isn't running, but at least you'll
*know* when someone screwed with it.

_H*



Current thread: