📄 xserver.man
字号:
<property with value> ::= <property/rpv> = <string/rv><perms> ::= [ <operation> | <action> | <space> ]*<operation> ::= r | w | d<action> ::= a | i | e<string> ::= <dbl quoted string> | <single quoted string> | <unqouted string><dbl quoted string> ::= <space> " <not dqoute>* " <space><single quoted string> ::= <space> ' <not squote>* ' <space><unquoted string> ::= <space> <not space>+ <space><space> ::= [ ' ' | '\et' ]*Character sets:<not newline> ::= any character except '\en'<not dqoute> ::= any character except "<not squote> ::= any character except '<not space> ::= any character except those in <space>.fi.PPThe semantics associated with the above syntax are as follows..PP<version line>, the first line in the file, specifies the file formatversion. If the server does not recognize the version <string/v>, itignores the rest of the file. The version string for the file formatdescribed here is "version-1" ..PPOnce past the <version line>, lines that do not match the above syntaxare ignored..PP<comment> lines are ignored..PP<sitepolicy> lines are currently ignored. They are intended tospecify the site policies used by the XC-QUERY-SECURITY-1authorization method..PP<access rule> lines specify how the server should react to untrustedclient requests that affect the X Window property named <property/ar>.The rest of this section describes the interpretation of an<access rule>..PPFor an <access rule> to apply to a given instance of <property/ar>,<property/ar> must be on a window that is in the set of windowsspecified by <window>. If <window> is any, the rule applies to<property/ar> on any window. If <window> is root, the rule applies to<property/ar> only on root windows..PPIf <window> is <required property>, the following apply. If <requiredproperty> is a <property/rp>, the rule applies when the window alsohas that <property/rp>, regardless of its value. If <requiredproperty> is a <property with value>, <property/rpv> must also havethe value specified by <string/rv>. In this case, the property musthave type STRING and format 8, and should contain one or morenull-terminated strings. If any of the strings match <string/rv>, therule applies..PPThe definition of string matching is simple case-sensitive stringcomparison with one elaboration: the occurence of the character '*' in<string/rv> is a wildcard meaning "any string." A <string/rv> cancontain multiple wildcards anywhere in the string. For example, "x*"matches strings that begin with x, "*x" matches strings that end withx, "*x*" matches strings containing x, and "x*y*" matches strings thatstart with x and subsequently contain y..PPThere may be multiple <access rule> lines for a given <property/ar>.The rules are tested in the order that they appear in the file. Thefirst rule that applies is used..PP<perms> specify operations that untrusted clients may attempt, andthe actions that the server should take in response to those operations..PP<operation> can be r (read), w (write), or d (delete). The followingtable shows how X Protocol property requests map to these operationsin the X Consortium server implementation..PP.nfGetProperty r, or r and d if delete = TrueChangeProperty wRotateProperties r and wDeleteProperty dListProperties none, untrusted clients can always list all properties.fi.PP<action> can be a (allow), i (ignore), or e (error). Allow meansexecute the request as if it had been issued by a trusted client.Ignore means treat the request as a no-op. In the case ofGetProperty, ignore means return an empty property value if theproperty exists, regardless of its actual value. Error means do notexecute the request and return a BadAtom error with the atom set tothe property name. Error is the default action for all properties,including those not listed in the security policy file..PPAn <action> applies to all <operation>s that follow it, until the next<action> is encountered. Thus, irwad means ignore read and write,allow delete..PPGetProperty and RotateProperties may do multiple operations (r and d,or r and w). If different actions apply to the operations, the mostsevere action is applied to the whole request; there is no partialrequest execution. The severity ordering is: allow < ignore < error.Thus, if the <perms> for a property are ired (ignore read, errordelete), and an untrusted client attempts GetProperty on that propertywith delete = True, an error is returned, but the property value isnot. Similarly, if any of the properties in a RotateProperties do notallow both read and write, an error is returned without changing anyproperty values..PPHere is an example security policy file..PP.ta 3i 4i.nfversion-1 # Allow reading of application resources, but not writing.property RESOURCE_MANAGER root ar iwproperty SCREEN_RESOURCES root ar iw# Ignore attempts to use cut buffers. Giving errors causes apps to crash,# and allowing access may give away too much information.property CUT_BUFFER0 root irwproperty CUT_BUFFER1 root irwproperty CUT_BUFFER2 root irwproperty CUT_BUFFER3 root irwproperty CUT_BUFFER4 root irwproperty CUT_BUFFER5 root irwproperty CUT_BUFFER6 root irwproperty CUT_BUFFER7 root irw# If you are using Motif, you probably want these.property _MOTIF_DEFAULT_BINDINGS root ar iwproperty _MOTIF_DRAG_WINDOW root ar iwproperty _MOTIF_DRAG_TARGETS any ar iwproperty _MOTIF_DRAG_ATOMS any ar iwproperty _MOTIF_DRAG_ATOM_PAIRS any ar iw# The next two rules let xwininfo -tree work when untrusted.property WM_NAME any ar# Allow read of WM_CLASS, but only for windows with WM_NAME.# This might be more restrictive than necessary, but demonstrates# the <required property> facility, and is also an attempt to# say "top level windows only."property WM_CLASS WM_NAME ar# These next three let xlsclients work untrusted. Think carefully# before including these; giving away the client machine name and command# may be exposing too much.property WM_STATE WM_NAME arproperty WM_CLIENT_MACHINE WM_NAME arproperty WM_COMMAND WM_NAME ar# To let untrusted clients use the standard colormaps created by# xstdcmap, include these lines.property RGB_DEFAULT_MAP root arproperty RGB_BEST_MAP root arproperty RGB_RED_MAP root arproperty RGB_GREEN_MAP root arproperty RGB_BLUE_MAP root arproperty RGB_GRAY_MAP root ar# To let untrusted clients use the color management database created# by xcmsdb, include these lines.property XDCCC_LINEAR_RGB_CORRECTION root arproperty XDCCC_LINEAR_RGB_MATRICES root arproperty XDCCC_GRAY_SCREENWHITEPOINT root arproperty XDCCC_GRAY_CORRECTION root ar# To let untrusted clients use the overlay visuals that many vendors# support, include this line.property SERVER_OVERLAY_VISUALS root ar# Dumb examples to show other capabilities.# oddball property names and explicit specification of error conditionsproperty "property with spaces" 'property with "' aw er ed# Allow deletion of Woo-Hoo if window also has property OhBoy with value# ending in "son". Reads and writes will cause an error.property Woo-Hoo OhBoy = "*son" ad.fi.SH "NETWORK CONNECTIONS"The X server supports client connections via a platform-dependent subset ofthe following transport types: TCP\/IP, Unix Domain sockets, DECnet,and several varieties of SVR4 local connections. See the DISPLAYNAMES section of the \fIX(1)\fP manual page to learn how to specifywhich transport type clients should try to use..SH GRANTING ACCESSThe X server implements a platform-dependent subset of the followingauthorization protocols: MIT-MAGIC-COOKIE-1, XDM-AUTHORIZATION-1,SUN-DES-1, and MIT-KERBEROS-5. See the \fIXsecurity(1)\fP manual pagefor information on the operation of these protocols..PPAuthorization data required by the above protocols is passed to theserver in a private file named with the \fB\-auth\fP command lineoption. Each time the server is about to accept the first connectionafter a reset (or when the server is starting), it reads this file.If this file contains any authorization records, the local host is notautomatically allowed access to the server, and only clients whichsend one of the authorization records contained in the file in theconnection setup information will be allowed access. See the\fIXau\fP manual page for a description of the binary format of thisfile. See \fIxauth(1)\fP for maintenance of this file, and distributionof its contents to remote hosts..PPThe X server also uses a host-based access control list for decidingwhether or not to accept connections from clients on a particular machine.If no other authorization mechanism is being used,this list initially consists of the host on which the server is running aswell as any machines listed in the file \fI/etc/X\fBn\fI.hosts\fR, where\fBn\fP is the display number of the server. Each line of the file shouldcontain either an Internet hostname (e.g. expo.lcs.mit.edu) or a DECnethostname in double colon format (e.g. hydra::). There should be no leadingor trailing spaces on any lines. For example:.sp.in +8.nf joesworkstationcorporate.company.comstar::bigcpu::.fi.in -8.PPUsers can add or remove hosts from this list and enable or disable accesscontrol using the \fIxhost\fP command from the same machine as the server..PPThe X protocol intrinsically does not have any notion of window operationpermissions or place any restrictions on what a client can do; if a program canconnect to a display, it has full run of the screen. X servers that support the SECURITY extension fare better because clientscan be designated untrusted via the authorization they use to connect; seethe \fIxauth(1)\fP manual page for details. Restrictions are imposedon untrusted clients that curtail the mischief they can do. See the SECURITYextension specification for a complete list of these restrictions..PPSites that have betterauthentication and authorization systems might wish to makeuse of the hooks in the libraries and the server to provide additionalsecurity models..SH SIGNALSThe X server attaches special meaning to the following signals:.TP 8.I SIGHUPThis signal causes the server to close all existing connections, free allresources, and restore all defaults. It is sent by the display managerwhenever the main user's main application (usually an \fIxterm\fP or windowmanager) exits to force the server to clean up and prepare for the nextuser..TP 8.I SIGTERMThis signal causes the server to exit cleanly..TP 8.I SIGUSR1This signal is used quite differently from either of the above. When theserver starts, it checks to see if it has inherited SIGUSR1 as SIG_IGNinstead of the usual SIG_DFL. In this case, the server sends a SIGUSR1 toits parent process after it has set up the various connection schemes.\fIXdm\fP uses this feature to recognize when connecting to the serveris possible..SH FONTSThe X servercan obtain fonts from directories and/or from font servers.The list of directories and font serversthe X server uses when trying to open a font is controlledby the \fIfont path\fP. .LPThe default font path is"<XRoot>/lib/X11/fonts/misc/,<XRoot>/lib/X11/fonts/Speedo/,<XRoot>/lib/X11/fonts/Type1/,<XRoot>/lib/X11/fonts/75dpi/,<XRoot>/lib/X11/fonts/100dpi/" .where <XRoot> refers to the root of the X11 install tree..LPThe font path can be set with the \fB\-fp\fP option or by \fIxset(1)\fPafter the server has started..SH FILES.TP 30/etc/X\fBn\fP.hostsInitial access control list for display number \fBn\fP.TP 30<XRoot>/lib/X11/fonts/misc, <XRoot>/lib/X11/fonts/75dpi, <XRoot>/lib/X11/fonts/100dpi Bitmap font directories.TP 30<XRoot>/lib/X11/fonts/Speedo, <XRoot>/lib/X11/fonts/Type1Outline font directories.TP 30<XRoot>/lib/X11/fonts/PEXPEX font directories.TP 30<XRoot>/lib/X11/rgb.txtColor database.TP 30/tmp/.X11-unix/X\fBn\fPUnix domain socket for display number \fBn\fP.TP 30/tmp/rcX\fBn\fPKerberos 5 replay cache for display number \fBn\fP.TP 30/usr/adm/X\fBn\fPmsgsError log file for display number \fBn\fP if run from \fIinit(8)\fP.TP 30<XRoot>/lib/X11/xdm/xdm-errorsDefault error log file if the server is run from \fIxdm(1)\fP.LPNote: <XRoot> refers to the root of the X11 install tree..SH "SEE ALSO"General information: X(1).PPProtocols:.I "X Window System Protocol,".I "The X Font Service Protocol,".I "X Display Manager Control Protocol".PPFonts: bdftopcf(1), mkfontdir(1), xfs(1), xlsfonts(1), xfontsel(1), xfd(1),.I "X Logical Font Description Conventions".PPSecurity: Xsecurity(1), xauth(1), Xau(1), xdm(1), xhost(1),.I "Security Extension Specification".PPStarting the server: xdm(1), xinit(1).PPControlling the server once started: xset(1), xsetroot(1), xhost(1).PPServer-specific man pages: Xdec(1), XmacII(1), Xsun(1), Xnest(1), Xvfb(1),XF86_Accel(1), XF86_Mono(1), XF86_SVGA(1), XF86_VGA16(1), XFree86(1).PPServer internal documentation:.I "Definition of the Porting Layer for the X v11 Sample Server".SH AUTHORSThe sample server was originally written by Susan Angebranndt, RaymondDrewry, Philip Karlton, and Todd Newman, from Digital EquipmentCorporation, with support from a large cast. It has since beenextensively rewritten by Keith Packard and Bob Scheifler, from MIT.Dave Wiggins took over post-R5 and made substantial improvements.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -