home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
X User Tools
/
X User Tools (O'Reilly and Associates)(1994).ISO
/
sun4c
/
archive
/
tcltk.z
/
tcltk
/
man
/
catn
/
send.n
< prev
next >
Wrap
Text File
|
1994-09-20
|
2KB
|
67 lines
send(n) Tk Commands
_________________________________________________________________
NAME
send - Execute a command in a different interpreter
SYNOPSIS
send _i_n_t_e_r_p _c_m_d ?_a_r_g _a_r_g ...?
_________________________________________________________________
DESCRIPTION
This command arranges for _c_m_d (and _a_r_gs) to be executed in
the interpreter named by _i_n_t_e_r_p. It returns the result or
error from that command execution. _I_n_t_e_r_p must be the name
of an interpreter registered on the display associated with
the interpreter in which the command is invoked; it need
not be within the same process or application. If no _a_r_g
arguments are present, then the command to be executed is
contained entirely within the _c_m_d argument. If one or more
_a_r_gs are present, they are concatenated to form the command
to be executed, just as for the eval Tcl command.
SECURITY
The send command is potentially a serious security loophole, |
since any application that can connect to your X server can |
send scripts to your applications. These incoming scripts |
can use Tcl to read and write your files and invoke sub- |
processes under your name. Host-based access control such |
as that provided by xhost is particularly insecure, since it |
allows anyone with an account on particular hosts to connect |
to your server, and if disabled it allows anyone anywhere to |
connect to your server. In order to provide at least a |
small amount of security, Tk checks the access control being |
used by the server and rejects incoming sends unless (a) |
xhost-style access control is enabled (i.e. only certain |
hosts can establish connections) and (b) the list of enabled |
hosts is empty. This means that applications cannot connect |
to your server unless they use some other form of authoriza- |
tion such as that provide by xauth.
KEYWORDS
interpreter, remote execution, security, send
Tk 1