Na verdade, eu estava tentando aprender o básico do X11 via PuTTY na semana passada. Eu me deparei com um bom tutorial . Para ser perfeitamente honesto, como esta foi minha primeira incursão no X11, eu não necessariamente absorvi todas as informações. No entanto, consegui que tudo funcionasse acompanhando.
Há uma seção na página que mergulha na criação e configuração desses cookies mágicos e na configuração usar o Xauth.
Na mesma página, também entra em detalhes sobre o Xhost, como mencionado por @arved. A seção relativamente curta é citada abaixo ...
Xhost allows access based on hostnames. The server maintains a list of hosts which are allowed to connect to it. It can also disable host checking entirely. Beware: this means no checks are done, so every host may connect!
You can control the server's host list with the xhost program. To use this mechanism in the previous example, do:
light$ xhost +dark.matt.er
This allows all connections from hostdark.matt.er
. As soon as your X client has made its connection and displays a window, for safety, revoke permissions for more connections with:
light$ xhost -dark.matt.er
You can disable host checking with:
light$ xhost +
This disables host access checking and thus allows everyone to connect. You should never do this on a network on which you don't trust all users (such as Internet). You can re-enable host checking with:
light$ xhost -
xhost - by itself does not remove all hosts from the access list (that would be quite useless - you wouldn't be able to connect from anywhere, not even your local host).Xhost is a very insecure mechanism. It does not distinguish between different users on the remote host. Also, hostnames (addresses actually) can be spoofed. This is bad if you're on an untrusted network (for instance already with dialup PPP access to Internet).