Michael> I found a way to kill any "xlock" on any machine as a
Michael> simple user. This can be done as long as I can login to
Michael> that machine of after "xhost +". I've written something
Michael> that makes the job automatically on any machine I choose
Michael> (in few seconds). I don't want to post the exact
Michael> procedure (who knows what can be done with this
Michael> information...).
Michael> I would like to know if there is any way to block this
Michael> hole.
I wouldnt say that this was a 'HUGE security hole'... When someone types
'xhost +' they're saying:
"hey I don't care what anyone does to any of my windows"
It's just like someone setting a null password.. You wouldn't say that the
system had a HUGE security hole, you'd say that the user was a little 'naive'
and hope that they will learn from their mistake. The same kind of thing
applies with 'xhost', you should do 'xhost -' and maintain your system
integrity by carefully managing the magic cookies created by xauth et al..
(Another solution is do "xhost +", run whatever it was you wanted to run on
the remote system, then do "xhost -", the open connection will remain open,
but new ones will be refused - Of course this can work against you, since
someone can open a fairly dormant connection while your server is available,
and it will stay open even if you restrict access - In fact, depending on
your X server, it will stay open until you restart X.)
Daniel.
PS: If I completely mis-understood your problem then none of the above will
be of any use - however I don't think I did.
--
/- Daniel Stephens ---------------------#----------------\
| .signature still under development 8-) ### ## # # 'LIFE'|
\----------------------------------------------- # ## -/