HP Visualize J5000 hp workstations - hp-ux 10.20 graphics administration guide - Page 148

x matches strings that end with x, *x* matches strings containing x, and x*y* matches strings

Page 148 highlights

lines are currently ignored. They are intended to specify the site policies used by the XCQUERY-SECURITY-1 authorization method. lines specify how the server should react to untrusted client requests that affect the X Window property named . The rest of this section describes the interpretation of an access rule. For an to apply to a given instance of , must be on a window that is in the set of windows specified by . If is any, the rule applies to on any window. If is root, the rule applies to only on root windows. If is required property, the following apply. If required property is a , the rule applies when the also has that , regardless of its value. If required property is a , must also have the value specified by . In this case, the property must have type STRING and format 8, and should contain one or more null-terminated strings. If any of the strings match , the rule applies. The definition of string matching is simple case-sensitive string comparison with one elaboration: the occurence of the character '*' in is a wildcard meaning "any string." A can contain multiple wildcards anywhere in the string. For example, "x*" matches strings that begin with x, "*x" matches strings that end with x, "*x*" matches strings containing x, and "x*y*" matches strings that start with x and subsequently contain y. There may be multiple lines for a given . The rules are tested in the order that they appear in the file. The first rule that applies is used. specify operations that untrusted clients may attempt, and the actions that the server should take in response to those operations. can be r (read), w (write), or d (delete). The following table shows how X Protocol property requests map to these operations in The Open Group server implementation. GetProperty ChangeProperty RotateProperties DeleteProperty ListProperties r, or r and d if delete=True w r and w d none, untrusted clients can always list all properties can be "a" (allow), "i" (ignore), or "e" (error). "Allow" means execute the request as if it had been issued by a trusted client. "Ignore" means treat the request as a no-op. In the case of GetProperty, ignore means return an empty property value if the property exists, regardless of its actual value. "Error" means do not execute the request and return a BadAtom error with the atom set to the property name. Error is the default action for all properties, including those not listed in the security policy file. Page 148 Graphics Administration Guide for HP-UX 10.20

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171

<sitepolicy> lines are currently ignored. They are intended to specify the site policies used by the
XC-
QUERY-SECURITY-1
authorization method.
<access rule>
lines specify how the server should react to untrusted client requests that affect the X
Window property named
<property/ar>
. The rest of this section describes the interpretation of an access
rule.
For an
<access rule>
to apply to a given instance of
<property/ar>
,
<property/ar>
must be on a
window that is in the set of windows specified by <window>. If
<window>
is any, the rule applies to
<property/ar> on any window. If
<window>
is root, the rule applies to
<property/ar>
only on root
windows.
If
<window>
is required property, the following apply. If required property is a
<property/rp>
, the rule
applies when the
<window>
also has that
<property/rp>
, regardless of its value. If required property is
a
<property with value>
,
<property/rpv >
must also have the value specified by
<string/rv>
. In this
case, the property must have type
STRING
and format 8, and should contain one or more null-terminated
strings. If any of the strings match
<string/rv>
, the rule applies.
The definition of string matching is simple case-sensitive string comparison with one elaboration: the
occurence of the character '*' in
<string/rv>
is a wildcard meaning "any string." A
<string/rv>
can
contain multiple wildcards anywhere in the string. For example, "x*" matches strings that begin with x,
"*x" matches strings that end with x, "*x*" matches strings containing x, and "x*y*" matches strings
that start with x and subsequently contain y.
There may be multiple
<access rule>
lines for a given
<property/ar>
. The rules are tested in the order
that they appear in the file. The first rule that applies is used.
<perms>
specify operations that untrusted clients may attempt, and the actions that the server should
take in response to those operations.
<operation>
can be
r
(read),
w
(write), or
d
(delete). The following table shows how X Protocol
property requests map to these operations in The Open Group server implementation.
GetProperty
r, or r and d if delete=True
ChangeProperty
w
RotateProperties
r and w
DeleteProperty
d
ListProperties
none, untrus
ted clients can always list all properties
<action>
can be "a" (allow), "i" (ignore), or "e" (error). "Allow" means execute the request as if it had
been issued by a trusted client. "Ignore" means treat the request as a no-op. In the case of
GetProperty
,
ignore means return an empty property value if the property exists, regardless of its actual value. "Error"
means do not execute the request and return a BadAtom error with the atom set to the property name.
Error is the default action for all properties, including those not listed in the security policy file.
Graphics Administration Guide for HP-UX 10.20
Page 148