Securing Reflection X Sessions via Secure Shell (SSH)

Secure Shell (SSH) is a network protocol that allows data to be exchanged using a secure channel between two network devices. Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for Telnet and other insecure remote shells, which send information, notably passwords, in plaintext, leaving them open for interception.

The Security Assurance Team (SAT), which operates under the Information Technology Security Operations Team (ITSOT), uses the Enterprise Vulnerability Management System (eVMS) to identify systems all over the USGS network that run Reflection X software based on TCP port 6000 being open (Nessus plugin IDs 19948 and 10407). This indicates that users are running X11 sessions without encryption. The DOI Security Policy Handbook’s best practices indicate that all login information be passed across the network in an encrypted form. Therefore, all X11 sessions should be tunneled through SSH. To further reduce vulnerabilities within eVMS, port 6000 should also be disabled on all sessions.

Tunneling Reflection XDM Sessions through SSH

Reflection X Client Setup for SSH


Tunneling Reflection XDM Sessions through SSH

To setup a secure XDM session, open up the Reflection X manager. From the Client Template section, choose sun. From the Method drop-down menu, choose SECURE SHELL.Reflection X Connection Template

Enter the hostname.

Enter Hostname

Enter the user name.Enter user name

Blank out the Command line and enter (/usr/dt/bin/Xsession &) in the field.Enter command line

Go to Settings in the Menu Bar and click Network.Network Settings

Check the Disable remote TCP/IP connections box. This will disable Port 6000. Click OK.

Disable remote TCP/IP connections

Click the Connect button.Establish Connection

Click OK on the Warning Banner.

Warning Banner

Enter your password.

Password Prompt

You should now be connected to your XDM session tunneled through SSH with Port 6000 closed. *Be sure to save your connection settings upon exiting the session for the first time.

Save Prompt


Reflection X Client Setup for SSH

To setup an SSH xterm window from Reflection X, open up the Reflection X manager, choose SECURE SHELL from the Method drop-down menu, enter the Host name and User name in their fields.

Reflection X client setup

Remove the -display %IP#% option from the xterm command so that ssh’s secure shell tunnel (X Forwarding) is not bypassed.

Command Line

If you have customized fonts stored in the .Xdefaults file located in the home area of your Unix system, then remove the -fn 6×13 option from the xterm command.

Go to Settings in the Menu Bar and click Network.

Settings Menu

Check the Disable remote TCP/IP connections box. This will disable Port 6000. Click OK.

Network Settings Dialog Box

Save your settings.

Save rxc file

Comments are closed.