diff options
author | Damien Miller <djm@mindrot.org> | 2005-03-02 13:22:30 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2005-03-02 13:22:30 +1100 |
commit | 947219e6e6d8be46d42c70239a907e4227e62d4a (patch) | |
tree | 0e1fe7d686fbcd488055e5bbb1383a3b8e363d7c /ssh.1 | |
parent | 89eac8010a80589bcd3abda8f253cd0cd3d2088c (diff) | |
download | openssh-git-947219e6e6d8be46d42c70239a907e4227e62d4a.tar.gz |
- djm@cvs.openbsd.org 2005/03/02 02:21:07
[ssh.1]
bz#987: mention ForwardX11Trusted in ssh.1,
reported by andrew.benham AT thus.net; ok deraadt@
Diffstat (limited to 'ssh.1')
-rw-r--r-- | ssh.1 | 15 |
1 files changed, 14 insertions, 1 deletions
@@ -34,7 +34,7 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.\" $OpenBSD: ssh.1,v 1.202 2005/03/01 14:47:58 jmc Exp $ +.\" $OpenBSD: ssh.1,v 1.203 2005/03/02 02:21:07 djm Exp $ .Dd September 25, 1999 .Dt SSH 1 .Os @@ -831,10 +831,23 @@ Users with the ability to bypass file permissions on the remote host (for the user's X authorization database) can access the local X11 display through the forwarded connection. An attacker may then be able to perform activities such as keystroke monitoring. +.Pp +For this reason, X11 forwarding is subjected X11 SECURITY extension +restrictions by default. +Please refer to the +.Nm +.Fl Y +option and the +.Cm ForwardX11Trusted +directive in +.Xr ssh_config 5 +for more information. .It Fl x Disables X11 forwarding. .It Fl Y Enables trusted X11 forwarding. +Trusted X11 forwardings are not subjected to the X11 SECURITY extension +controls. .El .Sh CONFIGURATION FILES .Nm |