Suggestions for X11 Libre #117
Replies: 13 comments
-
1 - Why does this matter? |
Beta Was this translation helpful? Give feedback.
-
I'm running XLibre right now as my log in user. There is no systemd running (PID1 is s6). Overriding configuration that I put in place will get your code expelled from my system permanently. |
Beta Was this translation helpful? Give feedback.
-
What is the output of |
Beta Was this translation helpful? Give feedback.
-
smj$ ps -o uid,comm -A | grep X Edit: pstree -aclup (partial)
well.. that didn't format well... but you get the gist |
Beta Was this translation helpful? Give feedback.
-
It seems it does support elogind, my bad. The prompt should say that when you install it. Also it would probably be good if this was the default behaviour |
Beta Was this translation helpful? Give feedback.
-
2- Doesn't OpenBSD already runs xenocara without root? And its already possible on Linux with some problems since i remember reading about rootless X on Slackware package configure.
|
Beta Was this translation helpful? Give feedback.
-
There is also no elogind running here, no dbus, no udev, no pam. Edit: As the pstree shows, xinit was lanched from a mingetty login shell. (by a bash login script, if I log in on tty7) |
Beta Was this translation helpful? Give feedback.
-
That's cool and all but not really relevant Edit: Why do you run your system this way? Is it just to avoid all RH stuff? |
Beta Was this translation helpful? Give feedback.
-
To retain control of my computer. I'm not entirely apposed to running something like dbus, but then I'd have to vet all of it's code personally for security issues, each and every time it updates. Once it achieves the complexity of something like X, I'm not up to the task, so X does not run as root. I compromise in places, like the kernel, because I can't find any way around it. Everything else does not run as root, unless It must to work, and it's work is important enough to warrant the risk, and small enough for me to audit the risk personally. I've been running internet facing servers since 1994 ( 0.47 kernel ), and have not been broken into yet. Edit: |
Beta Was this translation helpful? Give feedback.
-
That makes sense, but how do you know those connections aren't crawlers or people running an IP indexing script? |
Beta Was this translation helpful? Give feedback.
-
Some of them are. Those that scan broad numbers of ports are not crawlers, and those running an IP indexing script are bad actors, and exactly what I'm trying to block. But the vast majority make actual break-in attempts, such as using a login name of a known router default, or sending data structured to induce a stack smash, overflow, or binary data where ASCII was expected. |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
No it doesn't? XLibre is a hard fork and forks all necessary components of XLibre
No it doesn't, as established by the conversation between smj-cc and I, root is not required at all for an X11 session. I think running it rootless causes a handful of bugs that should be ironed out, but that isn't really what you are talking about
No thanks, Nvidia support is a primary force for adoption of XLibre, why would this project kill that? Nobody is going to hold Linux hostage against Nvidia, Wayland has tried that for almost 10 years with 0 success. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Beta Was this translation helpful? Give feedback.
All reactions