[comp.windows.x] X security

tek@CS.UCLA.EDU (11/23/88)

Fix 2 highlights a small facet of the larger problem of authentication
in a distributed environment. Many X servers only use the host list
restriction as their only access control mechanism. However, I have
heard that MIT Project Athena uses a much more sophisticated system to
regulate access. 

Where can we get more information about these tools?
Are these tools available to others now? or in the future?
How much surgery is necesary to adapt the X server (or similar programs)
	to use such tools?



&ted	ARPAnet: tek@penzance.cs.ucla.edu
	UUCP:    ...!ucbvax!ucla-cs!tek

rws@EXPO.LCS.MIT.EDU (Bob Scheifler) (11/23/88)

    However, I have
    heard that MIT Project Athena uses a much more sophisticated system to
    regulate access. 

Project Athena has a system called Kerberos, which they use for general
access control in their Unix environment, but it isn't hooked into X yet.

    Where can we get more information about these tools?

Hopefully someone from Athena will post pointers for Kerberos.

    How much surgery is necesary to adapt the X server (or similar programs)
    to use such tools?

We (at the X Consortium) are in the process of installing mechanisms
into xdm, Xlib, and our servers to support better authorization mechanisms,
and we're developing a first instance of an authorization protocol to plug
into that framework.  It isn't that hard, we expect to have it pretty much
complete in the next few weeks.  We'll be distributing it within the X
Consortium first for feedback, and we'll post public patches when it seems
to be ready for prime time.