{"author_url":"https://blog.hatena.ne.jp/kiririmode/","blog_url":"https://kiririmode.hatenablog.jp/","image_url":null,"provider_name":"Hatena Blog","url":"https://kiririmode.hatenablog.jp/entry/20100920/p2","blog_title":"\u7406\u7cfb\u5b66\u751f\u65e5\u8a18","type":"rich","published":"2010-09-20 00:00:01","height":"190","description":"X \u3092\u30ea\u30e2\u30fc\u30c8\u304b\u3089\u98db\u3070\u3059\u3068\u304d\u306b\u3001\u3088\u304f .ssh/config \u306e ForwardX11 \u3092 yes \u306b\u8a2d\u5b9a\u3057\u305f\u308a\u3059\u308b\u3068\u601d\u3044\u307e\u3059\u304c\u3001\u3061\u3087\u3063\u3068\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3092\u8aad\u3093\u3067\u308b\u3068 ForwardX11Trusted \u3068\u3044\u3046\u8a2d\u5b9a\u9805\u76ee\u304c\u51fa\u3066\u304d\u305f\u3002FowardX11 \u306e\u9805\u76ee\u306b\u306f An attacker may then be able to perform activities such as keystroke monitoring if the ForwardX11Trusted option is also enabled. << \u3068\u3044\u3046\u6587\u8a00\u304c\u3042\u3063\u305f\u3053\u3068\u304b\u3089\u3001\u3058\u3083\u3041 ForwardX11Trusted \u306f n\u2026","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fkiririmode.hatenablog.jp%2Fentry%2F20100920%2Fp2\" title=\"ForwardX11Trusted \u306f true \u3067\u3044\u3044\u304b\u306a - \u7406\u7cfb\u5b66\u751f\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_name":"kiririmode","title":"ForwardX11Trusted \u306f true \u3067\u3044\u3044\u304b\u306a","categories":["middleware"],"version":"1.0","provider_url":"https://hatena.blog","width":"100%"}