Date: Wed, 6 Dec 2000 23:20:21 -0500 (EST) From: David Raistrick <keen@damoe.wireless-isp.net> To: Nick Slager <nicks@albury.net.au> Cc: Phil C <mongo@elephantitis.org>, freebsd-questions@FreeBSD.ORG Subject: Re: xlock... Message-ID: <Pine.BSF.4.21.0012062317090.30371-100000@damoe.wireless-isp.net> In-Reply-To: <20001207144325.A74591@albury.net.au>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 7 Dec 2000, Nick Slager wrote: > > as a 'normal' user and started xlock as that user... And then accidentally > > typed the root password in and regained control of my X session... that does > > not seem right to me.... > > AFAIR, it's been like that since forever. Yup. This is a normal function...recall that un*x machines were often used in lab setups...where many people could use the same machine at various times. If someone had xlock running and there were no option but a powercyle to regain access to the workstation....it would be a bad thing. to quote: XLOCK(1) XLOCK(1) NAME xlock - Locks the local X display until a password is entered. .... NOTE ON ETIQUETTE Xlock should not be used on public terminals when there is a high demand for them. If you find a public terminal that has been locked by another user and there are no other terminals available, and the terminal appears to have been left idle for a while (normally more than 15 minutes), it is fair to try to reset the session in some manner. ... -/+allowroot The allowroot option allows the root password to unlock the server as well as the user who started xlock. May not be able to turn this on and off depending on your system and how xlock was config- ured. ... ....david -- David Raistrick Digital Wireless Communications davidr@dwcinet.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0012062317090.30371-100000>