Commit c1c9ecaa authored by Simon McVittie's avatar Simon McVittie

dbus-daemon(1): Recommend against remote TCP for debugging

Bug: Ralf Habacker's avatarRalf Habacker <>
Reviewed-by: Philip Withnall's avatarPhilip Withnall <>
[smcv: Add a TODO comment as suggested]
Signed-off-by: Simon McVittie's avatarSimon McVittie <>
(cherry picked from commit cf473806)
parent 9bd0256f
......@@ -415,6 +415,16 @@ a transport name plus possible parameters/options.</para>
configuring the well-known system bus or the well-known session
bus to listen on a non-loopback TCP address is insecure.
Developers are sometimes tempted to use remote TCP as a debugging
tool. However, if this functionality is left enabled in finished
products, the result will be dangerously insecure. Instead of
using remote TCP, developers should <ulink
>relay connections via Secure Shell or a similar protocol</ulink>.
<!-- TODO: Ideally someone would write a more formal guide to
remote D-Bus debugging, and we could link to that instead -->
<para>Example: &lt;listen&gt;unix:path=/tmp/foo&lt;/listen&gt;</para>
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment