Hi pbuck,
Ah, data; that helps! You don't have to delete all of those options. The one that disrupts connections made by setting the display on the remote machine is the nolisten_tcp option. If you set that to 0 or "no", your apps can connect directly to the window server on your machine via tcp.
However, that doesn't apply to a secure shell tunnel. I don't know what happens between-the-sheets but maybe secure shell negotiates with XWindows directly because the above setting doesn't affect the ability to do window forward through a secure shell tunnel. Of course for that you have to have "X11Forwarding yes" in the sshd_config file on the server and you're supposed to have the "ForwardX11 yes" set in the ssh_config file on the client, although I've gotten by without the latter. After that, all you have to deal with is X11 itself, or more specifically, the
X11 Security Extension.
Newer versions of X11, such as the one that ships with Tiger, have an operative
Security Extension. Thus, they have more stringent requirements of dangerous applications. I don't really know how to deal with it outside of SSH but again OpenSSH will handle the negotiation for you if you use the "-Y" option instead of the -X option.
--
Gary
~~~~
I never thought that I'd see the day where Netscape is free
software and X11 is proprietary. We live in interesting times.
-- Matt Kimball <mkimball@xmission.com>