mailing list archives
quick and dirty x-protect
From: hobbit () avian org (*Hobbit*)
Date: Wed, 4 Sep 1996 14:07:26 -0400
If you're on a system that you haven't custom-built the X server for but
supports stock BSD-style bind(), you can always run something like
while true ; do
nc -v -l -s `hostname` -p 6000 -n 22.214.171.124 2
which will holler when someone tries to tickle your server. Then make all
your own connections via localhost, the unix-domain socket, or a relay from
some other TCP port.
Note tricky positional use of "-n" for speed. Replace "126.96.36.199 2" with
something randomish. This still won't completely protect the server since
there's a small window where the listener isn't running, but at least you'll
*know* when someone screwed with it.