HP-UX 11i June 2001 Release Notes

Internet and Networking Services
Low Bandwidth X Extension (LBX)
Chapter 10212
The proxymngr executable is added to the /usr/bin/X11 directory. It
must be started directly by the user. This can also be used in conjunction
with xfindproxy which is also in /usr/bin/X11.
Remote Execution (RX) Service
The remote execution (RX) service specifies a MIME format for invoking
applications remotely, for example via a Web browser. This RX format
specifies a syntax for listing network services required by the
application, for example, an X display server. The requesting web
browser must identify specific instances of the services in the request to
invoke the application.
There are two methods to demonstrate this service: xrx, the helper
program and libxrx.6.3, the Netscape plug-in. The xrx helper
program is added to the /usr/bin/X11 directory. End users must set up
their web browsers to use this program for files with the rx extension.
The Netscape plug-in, libxrx.6.3, is added to the /usr/lib/X11R6
directory. End users must copy this to their
$(HOME)/.netscape/plug-ins (or equivalent) directory so that files
with the rx extension are interpreted correctly. In order to use the
plug-in, Netscape should not also be setup to use the helper program.
Security Extension
The security extension adds X protocol needed to provide enhanced X
server security. This extension adds the concepts of trusted and
untrusted clients. The trust status of a client is determined by the
authorization used at connection setup. All clients using host-based
authorization are considered trusted. Clients using other authorization
protocols may be either trusted or untrusted depending on the data
included in the connection authorization phase.
When a connection identifying an untrusted client is accepted, the client
is restricted from performing certain operations that would steal or
modify data that is held by the server for trusted clients. An untrusted
client performing a disallowed operation will receive protocol errors.
When a client is untrusted, the server will also limit the extensions that
are available to the client. Each X protocol extension is responsible for
defining what operations are permitted to untrusted clients; by default,
the entire extension is hidden.