Blame README

Packit Service f89583
Packit Service f89583
Packit Service f89583
		     A Sample Authorization Protocol for X
Packit Service f89583
Packit Service f89583
Packit Service f89583
Overview
Packit Service f89583
Packit Service f89583
The following note describes a very simple mechanism for providing individual
Packit Service f89583
access to an X Window System display.  It uses existing core protocol and
Packit Service f89583
library hooks for specifying authorization data in the connection setup block
Packit Service f89583
to restrict use of the display to only those clients that show that they
Packit Service f89583
know a server-specific key called a "magic cookie".  This mechanism is *not*
Packit Service f89583
being proposed as an addition to the Xlib standard; among other reasons, a
Packit Service f89583
protocol extension is needed to support more flexible mechanisms.  We have
Packit Service f89583
implemented this mechanism already; if you have comments, please send them
Packit Service f89583
to us.
Packit Service f89583
Packit Service f89583
This scheme involves changes to the following parts of the sample release:
Packit Service f89583
Packit Service f89583
    o  xdm
Packit Service f89583
	-  generate random magic cookie and store in protected file
Packit Service f89583
	-  pass name of magic cookie file to server
Packit Service f89583
	-  when user logs in, add magic cookie to user's auth file
Packit Service f89583
	-  when user logs out, generate a new cookie for server
Packit Service f89583
Packit Service f89583
    o  server
Packit Service f89583
	-  a new command line option to specify cookie file
Packit Service f89583
	-  check client authorization data against magic cookie
Packit Service f89583
	-  read in cookie whenever the server resets
Packit Service f89583
	-  do not add local machine to host list if magic cookie given
Packit Service f89583
Packit Service f89583
    o  Xlib
Packit Service f89583
	-  read in authorization data from file
Packit Service f89583
	-  find data for appropriate server
Packit Service f89583
	-  send authorization data if found
Packit Service f89583
Packit Service f89583
    o  xauth [new program to manage user auth file]
Packit Service f89583
	-  add entries to user's auth file
Packit Service f89583
	-  remove entries from user's auth file
Packit Service f89583
Packit Service f89583
This mechanism assumes that the superuser and the transport layer between
Packit Service f89583
the client and the server is secure.
Packit Service f89583
Packit Service f89583
Packit Service f89583
Description
Packit Service f89583
Packit Service f89583
The sample implementation will use the xdm Display Manager to set up and
Packit Service f89583
control the server's authorization file.  Sites that do not run xdm will
Packit Service f89583
need to build their own mechanisms.
Packit Service f89583
Packit Service f89583
Xdm uses a random key (seeded by the system time and check sum of /dev/kmem)
Packit Service f89583
to generate a unique sequence of characters at 16 bytes long.  This sequence
Packit Service f89583
will be written to a file which is made readable only by the server.  The
Packit Service f89583
server will then be started with a command line option instructing it to use
Packit Service f89583
the contents of the file as the magic cookie for connections that include
Packit Service f89583
authorization data.  This will also disable the server from adding the local
Packit Service f89583
machine's address to the initial host list.  Note that the actual cookie must
Packit Service f89583
not be stored on the command line or in an environment variable, to prevent
Packit Service f89583
it from being publicly obtainable by the "ps" command.
Packit Service f89583
Packit Service f89583
If a client presents an authorization name of "MIT-MAGIC-COOKIE-1" and
Packit Service f89583
authorization data that matches the magic cookie, that client is allowed
Packit Service f89583
access.  If the name or data does not match and the host list is empty,
Packit Service f89583
that client will be denied access.  Otherwise, the existing host-based access
Packit Service f89583
control will be used.  Since any client that is making a connection from a
Packit Service f89583
machine on the host list will be granted access even if their authorization
Packit Service f89583
data is incorrect, sites are strongly urged not to set up any default hosts
Packit Service f89583
using the /etc/X*.hosts files.  Granting access to other machines should be
Packit Service f89583
done by the user's session manager instead.
Packit Service f89583
Packit Service f89583
Assuming the server is configured with an empty host list, the existence of the
Packit Service f89583
cookie is sufficient to ensure there will be no unauthorized access to the
Packit Service f89583
display.  However, xdm will (continue to) work to minimize the chances of
Packit Service f89583
spoofing on servers that do not support this authorization mechanism.  This
Packit Service f89583
will be done by grabbing the server and the keyboard after opening the display.
Packit Service f89583
This action will be surrounded by a timer which will kill the server if the
Packit Service f89583
grabs cannot be done within several seconds.  [This level of security is now
Packit Service f89583
implemented in patches already sent out.]
Packit Service f89583
Packit Service f89583
After the user logs in, xdm will add authorization entries for each of the
Packit Service f89583
server machine's network addresses to the user's authorization file (the format
Packit Service f89583
of which is described below).  This file will usually be named .Xauthority in
Packit Service f89583
the users's home directory; will be owned by the user (as specified by the
Packit Service f89583
pw_uid and pw_gid fields in the user's password entry), and will be accessible
Packit Service f89583
only to the user (no group access).  This file will contain authorization data
Packit Service f89583
for all of the displays opened by the user.
Packit Service f89583
Packit Service f89583
When the session terminates, xdm will generate and store a new magic cookie
Packit Service f89583
for the server.  Then, xdm will shutdown its own connection and send a
Packit Service f89583
SIGHUP to the server process, which should cause the server to reset.  The
Packit Service f89583
server will then read in the new magic cookie.
Packit Service f89583
Packit Service f89583
To support accesses (both read and write) from multiple machines (for use in
Packit Service f89583
environments that use distributed file systems), file locking is done using
Packit Service f89583
hard links.  This is done by creat'ing (sic) a lock file and then linking it
Packit Service f89583
to another name in the same directory.  If the link-target already exists,
Packit Service f89583
the link will fail, indicating failure to obtain the lock.  Linking is used
Packit Service f89583
instead of just creating the file read-only since link will fail even for
Packit Service f89583
the superuser.
Packit Service f89583
Packit Service f89583
Problems and Solutions
Packit Service f89583
Packit Service f89583
There are a few problems with .Xauthority as described.  If no home directory
Packit Service f89583
exists, or if xdm cannot create a file there (disk full), xdm stores the
Packit Service f89583
cookie in a file in a resource-specified back-up directory, and sets an
Packit Service f89583
environment variable in the user's session (called XAUTHORITY) naming this
Packit Service f89583
file.  There is also the problem that the locking attempts will need to be
Packit Service f89583
timed out, due to a leftover lock.  Xdm, again, creates a file and set an
Packit Service f89583
environment variable.  Finally, the back-up directory might be full.  Xdm,
Packit Service f89583
as a last resort, provides a function key binding that allows a user to log
Packit Service f89583
in without having the authorization data stored, and with host-based access
Packit Service f89583
control disabled.
Packit Service f89583
Packit Service f89583
Xlib
Packit Service f89583
Packit Service f89583
XOpenDisplay in Xlib was enhanced to allow specification of authorization
Packit Service f89583
information.  As implied above, Xlib looks for the data in the
Packit Service f89583
.Xauthority file of the home directory, or in the file pointed at by the
Packit Service f89583
XAUTHORITY environment variable instead if that is defined.  This required
Packit Service f89583
no programmatic interface change to Xlib.  In addition, a new Xlib routine
Packit Service f89583
is provided to explicitly specify authorization.
Packit Service f89583
Packit Service f89583
	XSetAuthorization(name, namelen, data, datalen)
Packit Service f89583
		int namelen, datalen;
Packit Service f89583
		char *name, *data;
Packit Service f89583
Packit Service f89583
There are three types of input:
Packit Service f89583
Packit Service f89583
	name NULL, data don't care	- use default authorization mechanism.
Packit Service f89583
	name non-NULL, data NULL	- use the named authorization; get
Packit Service f89583
					  data from that mechanism's default.
Packit Service f89583
	name non-NULL, data non-NULL	- use the given authorization and data.
Packit Service f89583
Packit Service f89583
This interface is used by xdm and might also be used by any other
Packit Service f89583
applications that wish to explicitly set the authorization information.
Packit Service f89583
Packit Service f89583
Authorization File
Packit Service f89583
Packit Service f89583
The .Xauthority file is a binary file consisting of a sequence of entries
Packit Service f89583
in the following format:
Packit Service f89583
Packit Service f89583
	2 bytes		Family value (second byte is as in protocol HOST)
Packit Service f89583
	2 bytes		address length (always MSB first)
Packit Service f89583
	A bytes		host address (as in protocol HOST)
Packit Service f89583
	2 bytes		display "number" length (always MSB first)
Packit Service f89583
	S bytes		display "number" string
Packit Service f89583
	2 bytes		name length (always MSB first)
Packit Service f89583
	N bytes		authorization name string
Packit Service f89583
	2 bytes		data length (always MSB first)
Packit Service f89583
	D bytes		authorization data string
Packit Service f89583
Packit Service f89583
The format is binary for easy processing, since authorization information
Packit Service f89583
usually consists of arbitrary data.  Host addresses are used instead of
Packit Service f89583
names to eliminate potentially time-consuming name resolutions in
Packit Service f89583
XOpenDisplay.  Programs, such as xdm, that initialize the user's
Packit Service f89583
authorization file will have to do the same work as the server in finding
Packit Service f89583
addresses for all network interfaces.  If more than one entry matches the
Packit Service f89583
desired address, the entry that is chosen is implementation-dependent.  In
Packit Service f89583
our implementation, it is always the first in the file.
Packit Service f89583
Packit Service f89583
The Family is specified in two bytes to allow out-of-band values
Packit Service f89583
(i.e. values not in the Protocol) to be used.  In particular,
Packit Service f89583
two new values "FamilyLocal" and "FamilyWild" are defined.  FamilyLocal
Packit Service f89583
refers to any connections using a non-network method of connetion from the
Packit Service f89583
local machine (Unix domain sockets, shared memory, loopback serial line).
Packit Service f89583
In this case the host address is specified by the data returned from
Packit Service f89583
gethostname() and better be unique in a collection of machines
Packit Service f89583
which share NFS directories.  FamilyWild is currently used only
Packit Service f89583
by xdm to communicate authorization data to the server.  It matches
Packit Service f89583
any family/host address pair.
Packit Service f89583
Packit Service f89583
For FamilyInternet, the host address is the 4 byte internet address, for
Packit Service f89583
FamilyDecnet, the host address is the byte decnet address, for FamilyChaos
Packit Service f89583
the address is also two bytes.
Packit Service f89583
Packit Service f89583
The Display Number is the ascii representation of the display number
Packit Service f89583
portion of the display name.  It is in ascii to allow future expansion
Packit Service f89583
to PseudoRoots or anything else that might happen.
Packit Service f89583
Packit Service f89583
A utility called "xauth" will be provided for editing and viewing the
Packit Service f89583
contents of authorization files.  Note that the user's authorization file is
Packit Service f89583
not the same as the server's magic cookie file.