I was looking in my /tmp folder and found a bunch of strange folders inside, so I decided to take a look inside one. Here is what I found.
Using nano I opened up one file inside kde-root and found this and inside kde-rafal the second one
I am worried because I looked up X-Window authorization on wiki (yes, I know, not the best place, but alas) and found this that worried me, unless I am not understanding it right
Should all this be there?
Not 5 minutes has gone by and I took another look in /tmp and found this
Are they multiplying
Using nano I opened up one file inside kde-root and found this and inside kde-rafal the second one
Code:
^A^@^@ rafal-desktop^@^A0^@^RMIT-MAGIC-COOKIE-1^@^P�U^W^KAE^Cg��ҖҖ]u ^A^@^@ rafal-desktop^@^A0^@^RMIT-MAGIC-COOKIE-1^@^P�U^W^KAE^Cg��ҖҖ]u
The cookie-based authorization methods are based on choosing a magic cookie (an arbitrary piece of data) and passing it to the server when it is started; every client that can prove having knowledge of this cookie is then authorized connection to the server.
These cookies are created by a separate program and stored in the file .Xauthority in the user's home directory, by default. As a result, every program run by the client on the local computer can access this file and therefore the cookie that is necessary for being authorized by the server. If the user wants to start an application from another computer on the network, the cookie has to be copied to that other computer. How the cookie is copied is a system-dependent issue: for example, on Unix-like platforms, scp can be used to copy the cookie.
The two systems using this method are MIT-MAGIC-COOKIE-1 and XDM-AUTHORIZATION-1. In the first method, the client simply sends the cookie when requested to authenticate. In the second method, a secret key is also stored in the .Xauthority file. The client creates a string by concatenating the current time, a transport-dependent identifier, and the cookie, encrypts the resulting string, and sends it to the server.
These cookies are created by a separate program and stored in the file .Xauthority in the user's home directory, by default. As a result, every program run by the client on the local computer can access this file and therefore the cookie that is necessary for being authorized by the server. If the user wants to start an application from another computer on the network, the cookie has to be copied to that other computer. How the cookie is copied is a system-dependent issue: for example, on Unix-like platforms, scp can be used to copy the cookie.
The two systems using this method are MIT-MAGIC-COOKIE-1 and XDM-AUTHORIZATION-1. In the first method, the client simply sends the cookie when requested to authenticate. In the second method, a secret key is also stored in the .Xauthority file. The client creates a string by concatenating the current time, a transport-dependent identifier, and the cookie, encrypts the resulting string, and sends it to the server.
Code:
[B]rafal@rafal-desktop:/tmp$ ls akonadi-rafal.Q5Ca8K kde-root kdesudo-nn5618-xauth gpg-DDxFrU kdesudo-nn5365-xauth kdesudo-nn5664-xauth kde-rafal kdesudo-nn5397-xauth kdesudo-nn5982-xauth [/B]
Code:
root@rafal-desktop:/tmp# ls akonadi-rafal.Q5Ca8K kdesudo-nn5397-xauth kdesudo-nn8427-xauth gpg-DDxFrU kdesudo-nn5618-xauth ksocket-rafal kde-rafal kdesudo-nn5664-xauth ksocket-root kde-root kdesudo-nn5982-xauth orbit-rafal kdesudo-nn5365-xauth kdesudo-nn6034-xauth pulse-PKdhtXMmr18n
Comment