89 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
			
		
		
	
	
			89 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
| version-1 
 | |
| 
 | |
| # $Xorg: SecurityPolicy,v 1.3 2000/08/17 19:47:56 cpqbld Exp $
 | |
| 
 | |
| # The site policy fields are interpreted by the XC-QUERY-SECURITY-1
 | |
| # authorization protocol.  The values are arbitrary and site-specific.
 | |
| # Refer to the Security Extension Specification for the usage of the policies.
 | |
| #sitepolicy A
 | |
| #sitepolicy B
 | |
| #sitepolicy C
 | |
| 
 | |
| # Property access rules:
 | |
| # property <property> <window> <permissions>
 | |
| # <window> ::= any | root | <propertyselector>
 | |
| # <propertyselector> ::= <property> | <property>=<value>
 | |
| # <permissions> :== [ <operation> | <action> | <space> ]*
 | |
| # <operation> :== r | w | d
 | |
| #	r	read
 | |
| #	w	write
 | |
| #	d	delete
 | |
| # <action> :== a | i | e
 | |
| #	a	allow
 | |
| #	i	ignore
 | |
| #	e	error
 | |
| 
 | |
| # Allow reading of application resources, but not writing.
 | |
| property RESOURCE_MANAGER	root	ar iw
 | |
| property SCREEN_RESOURCES	root	ar iw
 | |
| 
 | |
| # Ignore attempts to use cut buffers.  Giving errors causes apps to crash,
 | |
| # and allowing access may give away too much information.
 | |
| property CUT_BUFFER0	root	irw
 | |
| property CUT_BUFFER1	root	irw
 | |
| property CUT_BUFFER2	root	irw
 | |
| property CUT_BUFFER3	root	irw
 | |
| property CUT_BUFFER4	root	irw
 | |
| property CUT_BUFFER5	root	irw
 | |
| property CUT_BUFFER6	root	irw
 | |
| property CUT_BUFFER7	root	irw
 | |
| 
 | |
| # If you are using Motif, you probably want these.
 | |
| property _MOTIF_DEFAULT_BINDINGS	root	ar iw
 | |
| property _MOTIF_DRAG_WINDOW	root	ar iw
 | |
| property _MOTIF_DRAG_TARGETS	any 	ar iw
 | |
| property _MOTIF_DRAG_ATOMS	any 	ar iw
 | |
| property _MOTIF_DRAG_ATOM_PAIRS	any 	ar iw
 | |
| 
 | |
| # If you are running CDE you also need these
 | |
| property _MOTIF_WM_INFO		root	arw
 | |
| property TT_SESSION		root	irw
 | |
| property WM_ICON_SIZE		root	irw
 | |
| property "SDT Pixel Set"	any	irw
 | |
| 
 | |
| # The next two rules let xwininfo -tree work when untrusted.
 | |
| property WM_NAME	any	ar
 | |
| 
 | |
| # Allow read of WM_CLASS, but only for windows with WM_NAME.
 | |
| # This might be more restrictive than necessary, but demonstrates
 | |
| # the <required property> facility, and is also an attempt to
 | |
| # say "top level windows only."
 | |
| property WM_CLASS	WM_NAME	ar
 | |
| 
 | |
| # These next three let xlsclients work untrusted.  Think carefully
 | |
| # before including these; giving away the client machine name and command
 | |
| # may be exposing too much.
 | |
| property WM_STATE	WM_NAME	ar
 | |
| property WM_CLIENT_MACHINE	WM_NAME	ar
 | |
| property WM_COMMAND	WM_NAME	ar
 | |
| 
 | |
| # To let untrusted clients use the standard colormaps created by
 | |
| # xstdcmap, include these lines.
 | |
| property RGB_DEFAULT_MAP	root	ar
 | |
| property RGB_BEST_MAP	root	ar
 | |
| property RGB_RED_MAP	root	ar
 | |
| property RGB_GREEN_MAP	root	ar
 | |
| property RGB_BLUE_MAP	root	ar
 | |
| property RGB_GRAY_MAP	root	ar
 | |
| 
 | |
| # To let untrusted clients use the color management database created
 | |
| # by xcmsdb, include these lines.
 | |
| property XDCCC_LINEAR_RGB_CORRECTION	root	ar
 | |
| property XDCCC_LINEAR_RGB_MATRICES	root	ar
 | |
| property XDCCC_GRAY_SCREENWHITEPOINT	root	ar
 | |
| property XDCCC_GRAY_CORRECTION	root	ar
 | |
| 
 | |
| # To let untrusted clients use the overlay visuals that many vendors
 | |
| # support, include this line.
 | |
| property SERVER_OVERLAY_VISUALS	root	ar
 |