<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=6019&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / [SOLVED] X server / X11 / Xorg / X not running rootless by default?]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=6019</link>
		<description><![CDATA[The most recent posts in [SOLVED] X server / X11 / Xorg / X not running rootless by default?.]]></description>
		<lastBuildDate>Thu, 28 Sep 2023 11:34:41 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: [SOLVED] X server / X11 / Xorg / X not running rootless by default?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44587#p44587</link>
			<description><![CDATA[<p>I think you need to back up a bit.</p><div class="quotebox"><blockquote><div><p>- Could it be wiser to keep xserver-xorg-legacy because parts of my system were not responding?</p></div></blockquote></div><p>What parts?</p><div class="quotebox"><blockquote><div><p>The long story:&#160; I noticed cwm acting up;&#160; my key bindings for some applications didn&#039;t respond, etc,</p></div></blockquote></div><p>What keybinds are not responding and what does your .cwmrc look like?</p><p>Ive used cwm in the past, ill will try and help you as i have system running now that does not involve the use of xorg-server-legacy and i use dwm as window manager and all my keybinds are working and i login using startx.</p>]]></description>
			<author><![CDATA[dummy@example.com (soren)]]></author>
			<pubDate>Thu, 28 Sep 2023 11:34:41 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44587#p44587</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] X server / X11 / Xorg / X not running rootless by default?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44585#p44585</link>
			<description><![CDATA[<p>Thanks Zapper!</p><p>As an update, I got concerned about removing any <em>Xwrapper</em> recently.&#160; The <em>&#039;tldr&#039;</em> version is:&#160; </p><p>- Could it be wiser to keep <strong>xserver-xorg-legacy</strong> because parts of my system were not responding?<br />- Perhaps check that <span class="bbc">/etc/X11/Xwrapper.config</span> states <span class="bbc">allowed_users=console</span> and add <span class="bbc">needs_root_rights=auto</span> ?<br />- Maybe better run <span class="bbc">dpkg-reconfigure xserver-xorg-legacy</span> (with <strong>doas</strong> or <strong>sudo</strong>) afterwards and select the <em>&quot;Console users only&quot;</em> default because that <em>reconfigure</em> command points out, <em>&quot;A good compromise is to permit the X server to be started only by users logged in to one of the virtual consoles.&quot;</em><br />- Despite the system recommending for the console user to run <strong>X</strong>, on my Raspberry Pi 400 system, root ends up running <strong>Xorg</strong> and the console user/user runs <strong>xinit</strong>.&#160; I&#039;ll leave it &quot;as is&quot; unless someone can improve on this.</p><p>The long story:&#160; I noticed <strong>cwm</strong> acting up;&#160; my key bindings for some applications didn&#039;t respond, etc, and I found an old Ubuntu Trusty <em>man</em> page (End of Life: &quot;April 2024&quot;) for <a href="https://manpages.ubuntu.com/manpages/trusty/man5/Xwrapper.config.5.html" rel="nofollow">Xwrapper.config</a> advising:</p><div class="quotebox"><blockquote><div><p>[...]<br />&#160; &#160; &#160; &#160;/etc/X11/Xwrapper.config&#160; contains&#160; a&#160; set of flags that determine some of the behavior of<br />&#160; &#160; &#160; &#160;Debian&#039;s X server wrapper, which is installed on the system as /usr/bin/X.&#160; The purpose of<br />&#160; &#160; &#160; &#160;the wrapper, and of this configuration file, is twofold.</p><p>&#160; &#160; &#160; &#160;Firstly,&#160; it&#160; is&#160; intended&#160; to&#160; implement&#160; sound&#160; security&#160; practices.&#160; Since the X server<br />&#160; &#160; &#160; &#160;requires superuser privileges, it may be unwise to permit just any user on the&#160; system&#160; to<br />&#160; &#160; &#160; &#160;execute&#160; it.&#160; &#160;Even if the X server is not exploitable in the sense of permitting ordinary<br />&#160; &#160; &#160; &#160;users to gain elevated privileges,&#160; a&#160; poorly-written&#160; or&#160; insufficiently-tested&#160; hardware<br />&#160; &#160; &#160; &#160;driver&#160; for&#160; the&#160; X&#160; server&#160; may&#160; cause&#160; bus&#160; lockups and freeze the system, an unpleasant<br />&#160; &#160; &#160; &#160;experience for anyone using it at the time.</p><p>&#160; &#160; &#160; &#160;Secondly, a wrapper is a convenient place to set up an execution&#160; environment&#160; for&#160; the&#160; X<br />&#160; &#160; &#160; &#160;server distinct from the configurable parameters of the X server itself.</p><p>&#160; &#160; &#160; &#160;Xwrapper.config&#160; may be edited by hand, but it is typically configured via debconf(7), the<br />&#160; &#160; &#160; &#160;Debian configuration tool.&#160; The X server wrapper is part of the x11-common Debian package;<br />&#160; &#160; &#160; &#160;therefore, the parameters of Xwrapper.config may be changed with the command<br />&#160; &#160; &#160; &#160; &#160; &#160; &#160; dpkg-reconfigure x11-common.<br />[...]&quot;</p></div></blockquote></div><p>So that got me concerned that maybe an <em>Xwrapper</em> or an <span class="bbc">Xwrapper.conf</span> file should be kept.&#160; Reconfiguring <em>x11-common</em> also sounded relevant: (a) <strong>xserver-xorg-legacy</strong> had been purged;&#160; and (b) that <em>man</em> page goes on to point out that the file could set <span class="bbc">allowed_users</span> to be <span class="bbc">rootonly, console, or anybody</span>.</p><div class="codebox"><pre><code>$ doas dpkg-reconfigure x11-common
Setting up X socket directories... /tmp/.X11-unix /tmp/.ICE-unix.</code></pre></div><p>Seeing how <em>X socket</em> directories were set, or perhaps reset, could reconfiguring <em>x11-common</em> be an important step to take if one were to amend <span class="bbc">Xwrapper.config</span> or purge <strong>xserver-xorg-legacy</strong>?</p><p>I hadn&#039;t checked originally whether <span class="bbc">/etc/X11/Xwrapper.config</span> was removed after purging <strong>xserver-xorg-legacy</strong>.&#160; At any rate, yesterday I tried re-installing --and then purging-- the package again, running <span class="bbc">doas dpkg-reconfigure x11-common</span> after each of those operations. Unfortunately, I had only noticed that <span class="bbc">Xwrapper.conf</span> was there after each <strong>dpkg-reconfigure</strong> operation, so I can&#039;t determine from those operations whether (a) each <strong>dpkg-reconfigure</strong> operation generated an <span class="bbc">Xwrapper.config</span>;&#160; or (b) whether <span class="bbc">Xwrapper.config</span> remained throughout, despite the <span class="bbc">provides</span> command reporting that it was related to <strong>xserver-xorg-legacy</strong> (see above).&#160; In both instances, there was the same relevant last line:</p><div class="codebox"><pre><code>$ cat /etc/X11/Xwrapper.config 
# Xwrapper.config (Debian X Window System server wrapper configuration file)
#
# This file was generated by the post-installation script of the
# xserver-xorg-legacy package using values from the debconf database.
#
# See the Xwrapper.config(5) manual page for more information.
#
# This file is automatically updated on upgrades of the xserver-xorg-legacy
# package *only* if it has not been modified since the last upgrade of that
# package.
#
# If you have edited this file but would like it to be automatically updated
# again, run the following command as root:
#   dpkg-reconfigure xserver-xorg-legacy
allowed_users=console</code></pre></div><p>That <span class="bbc">console</span> setting sounded ok.&#160; Debian Bookworm&#039;s <a href="https://manpages.debian.org/bookworm/xserver-xorg-legacy/Xwrapper.config.5.en.html" rel="nofollow">man page</a> for <span class="bbc">Xwrapper.config</span> explained:</p><div class="quotebox"><blockquote><div><p>[...]<br />allowed_users = rootonly|console|anybody<br />&#160; &#160; Specify&#160; which users may start the X server through the wrapper. Use rootonly to only allow root, use console to only allow users logged into a physical console, and use anybody to allow anybody.&#160; The default is console.</p><p>needs_root_rights = yes|no|auto<br />&#160; &#160; Configure if the wrapper should drop its elevated (root) rights before starting the X server. Use yes to force execution as root, no to force execution with all suid rights dropped, and auto to let the wrapper auto-detect. The default is auto.</p><p>When auto-detecting the wrapper will drop rights if kms graphics are available and not drop them if no kms graphics are detected. If a system has multiple graphics cards and some are not kms capable auto-detection may fail, in this case manual configuration should be used.<br />[...]</p></div></blockquote></div><p>If <strong>dpkg-reconfigure</strong> placed that &quot;<span class="bbc">allowed_users=console</span>&quot; setting, perhaps it worked out that that default &quot;<span class="bbc">console</span>&quot; setting was suitable; that session was not launched &quot;as root&quot; --remember that a display manager is not installed--, but from <strong>.xinitrc</strong>&#039;s <span class="bbc">exec startx</span> command &quot;as user&quot; (or &quot;as console&quot;?) with success running rootless, as described above when purging <strong>xserver-xorg-legacy</strong>, but as pointed out now, with concerning artefacts.&#160; On the other hand, why isn&#039;t there the line <span class="bbc">needs_root_rights=auto</span> which is the &quot;default&quot; setting according to that <em>man</em> quote?</p><p>Whatever the case may be, if one makes a change to <span class="bbc">Xwrapper.conf</span> e.g. to set <span class="bbc">allowed_users=console</span>, the <em>man</em> page then advises running <strong>dpkg-reconfigure</strong> as root afterwards, to keep it updated.&#160; </p><p>There was no mention found of <strong>xserver-xorg-legacy</strong> in <a href="https://forums.debian.net/" rel="nofollow">Debian&#039;s forums</a> to date, but its Debian Bookworm <a href="https://packages.debian.org/bookworm/mipsel/x11/xserver-xorg-legacy" rel="nofollow">package page </a> sheds some light:</p><div class="quotebox"><blockquote><div><p>[...]<br />setuid root Xorg server wrapper<br />This package provides a wrapper for the Xorg X server, which is necessary for legacy drivers and non-Linux kernels.<br />[...]</p></div></blockquote></div><p>From the sounds of it, on the one hand maybe the package wouldn&#039;t be relevant for installations such as mine: a Raspberry Pi 400 doesn&#039;t sound &#039;legacy&#039; (and doesn&#039;t Devuan run a Linux kernel anyway?), plus I am not using a display manager.&#160; On the other hand, I am inclined to keep <strong>xserver-xorg-legacy</strong> after the alarming change of behaviour with the lack of any observable <strong>cwm</strong> key binding response and other artefacts.&#160; Might someone have commandeered those bindings remotely without the package or, perhaps more on point, without me having run <strong>dpkg-reconfigure</strong> originally?&#160; </p><p>Having reinstated <strong>xserver-xorg-legacy</strong> and afterwards run <span class="bbc">doas dpkg-reconfigure xserver-xorg-legacy</span>, note two different developments:-</p><p>(1) After disabling <strong>.xinitrc</strong>, and having recently started using an <strong>.xserverrc</strong> file that ends with <br /><span class="bbc">exec /usr/bin/Xorg -nolisten tcp &quot;$@&quot; vt$XDG_VTNR</span> , somehow, upon logging into tty1, an xfce session runs (I had launched some earlier sessions from a different tty using <span class="bbc">startxfce4</span> before powering off earlier, in case that is relevant, because I was concerned whether my <strong>.cwmrc</strong> configuration file had been infected at that point):</p><div class="codebox"><pre><code>$ ps -ef | grep X
myusername    2865  2836  0 18:34 tty1     00:00:00 xinit /etc/X11/xinit/xinitrc -- /home/devuan/.xserverrc :0 vt1 -keeptty -auth /tmp/serverauth.gTdAFhFLt4
root      2866  2865 16 18:34 tty1     00:00:10 /usr/lib/xorg/Xorg -nolisten tcp :0 vt1 -keeptty -auth /tmp/serverauth.gTdAFhFLt4 vt1
myusername    3067  3053  2 18:34 tty1     00:00:01 /usr/lib/aarch64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/aarch64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 18874381 notification-plugin Notification Plugin Notification plugin for the Xfce panel
myusername    3869  3634  0 18:35 pts/0    00:00:00 grep --color=auto X</code></pre></div><p>- Root appears to run <span class="bbc">/usr/lib/xorg/Xorg</span><br />- myusername is now involved with <strong>xinit</strong>, and <strong>wrapper-2.0</strong> or<strong> libnotification-plugin</strong> ! <br />- <span class="bbc">/etc/X11/Xwrapper.config</span> had one setting:&#160; <br /><span class="bbc">allowed_users=console</span></p><p>Why is root taking over when &quot;<span class="bbc">allowed_users=console</span>&quot;?&#160; So I thought to explicitly state the default <span class="bbc">needs_root_rights=auto</span> declaration at the end of <span class="bbc">/etc/X11/Xwrapper.config</span> in case the system needed to do a <em>needs_root_rights</em> check.</p><p>This was followed by the <em>reconfigure</em> command above.&#160; Surprise! the <em>reconfigure</em> command then launches an <em>ncurses</em> dialog box for the first time: </p><div class="codebox"><pre><code>Because the X server runs with superuser privileges, it may be unwise to permit any user to start it, for security reasons.  On the other hand, it is even more unwise to run general-purpose X client programs as root, which is what may happen if only root is permitted to start the X server.  A good compromise is to permit the X server to be started only by users logged in to one of the virtual consoles.                                                                                                                                                                                                                         
Users allowed to start the X server:
                                        Root Only
                                        Console Users Only
                                        Anybody  

					&lt; OK &gt;</code></pre></div><p><span class="bbc">Console Users Only</span> is highlighted in red as the recommended choice.&#160; By clicking <em>&quot;OK&quot;</em>, it returns the following output:</p><div class="codebox"><pre><code>$ doas  dpkg-reconfigure xserver-xorg-legacy
setting xserver-xorg-legacy/xwrapper/allowed_users from configuration file</code></pre></div><p>...and the line order in <span class="bbc">/etc/X11/Xwrapper.config</span> was somehow rejigged:-</p><div class="codebox"><pre><code>needs_root_rights=auto
allowed_users=console</code></pre></div><p>(2) Next, having by now run <strong>clamscan</strong> with no infection found, though not having gone through all folders yet;&#160; plus having <strong>cwm</strong> regenerate a new <strong>.cwmrc</strong> (which I soon enhanced); and now launching from tty1 having reinstated <strong>.xinitrc</strong> with its usual line (<span class="bbc">exec startx /usr/bin/openbsd-cwm -c ~/.config/cwm/.cwmrc -d :0</span>):</p><div class="codebox"><pre><code>$ ps -ef | grep X
root      2845  2844  8 19:39 tty1     00:00:46 /usr/lib/xorg/Xorg -nolisten tcp :0 vt1 -keeptty -auth /tmp/serverauth.f4FDEnqlKD vt1
myusername    2987  2855  0 19:39 tty1     00:00:00 xinit /usr/bin/openbsd-cwm -c /home/devuan/.config/cwm/.cwmrc -d :0 -- /home/devuan/.xserverrc :1 vt1 -keeptty -auth /tmp/serverauth.bBS5DQGfXN
root      2990  2987  0 19:39 tty1     00:00:03 /usr/lib/xorg/Xorg -nolisten tcp :1 vt1 -keeptty -auth /tmp/serverauth.bBS5DQGfXN vt1
myusername    3856  3678  0 19:48 pts/0    00:00:00 grep --color=auto X</code></pre></div><p>So with my preferred setup (running <strong>cwm</strong>), the system decides for root to run <em>Xorg</em>, and for the console user/user to run <em>xinit</em>.&#160; I&#039;ll leave that setup unless someone can improve on this.&#160; The <em>&#039;tldr&#039;</em> version at the beginning summarises this. Thank you.</p>]]></description>
			<author><![CDATA[dummy@example.com (ExposeGlobalistsMadness)]]></author>
			<pubDate>Thu, 28 Sep 2023 03:20:17 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44585#p44585</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] X server / X11 / Xorg / X not running rootless by default?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44561#p44561</link>
			<description><![CDATA[<p>Well if xorg can be used rootless, than xenocara damn well must be able to even more so.</p><p>Perhaps, display managers are even less of a problem for xenocara.</p>]]></description>
			<author><![CDATA[dummy@example.com (zapper)]]></author>
			<pubDate>Tue, 26 Sep 2023 00:00:49 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44561#p44561</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] X server / X11 / Xorg / X not running rootless by default?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44542#p44542</link>
			<description><![CDATA[<p>Thanks a lot for your input, <a href="https://dev1galaxy.org/profile.php?id=2" rel="nofollow">zapper</a>!&#160; It spurred me to get a better grasp on the &#039;rootless&#039; environment. Devuan&#039;s official <a href="https://www.devuan.org/os/announce/daedalus-release-announce-2023-08-14" rel="nofollow">release announcement</a> for Daedalus stable sounds as it&#039;s about <strong>startx</strong> running &#039;rootless&#039;:</p><div class="quotebox"><blockquote><div><p>Rootless startx uses libseat1</p></div></blockquote></div><p>A <a href="https://lists.debian.org/debian-user-catalan/2023/08/msg00002.html" rel="nofollow">&quot;devuan-announce&quot;</a> mailing, if I can summarize it adequately, elaborates about <strong>libseat1</strong> controlling &#039;<em>rootless startx</em>&#039;, etc, and its ability to use <strong>seatd</strong> or <strong>elogind</strong>. There is the default &#039;<em>autodiscovery</em>&#039; choice, or one can set the <em>LIBSEAT_BACKEND</em> environment variable. The user needs to be in the <em>video</em> group if using <strong>seatd</strong> as a backend and, <em>&quot;This is only relevant to running startx as a user, xorg run as root by a display manager is unaffected.&quot;</em></p><p>So the announcement is applicable, as I had purged my display manager.&#160; My <strong>.xinitrc</strong> hadn&#039;t been launching Xorg with <strong>startx</strong>:</p><div class="codebox"><pre><code>[...]
# Launching dbus because it seems to help my browsers&#039; videos not to stutter
# Adapted from https://daemonforums.org/showthread.php?t=5502
if [ -z &quot;${DBUS_SESSION_BUS_ADDRESS}&quot; ]; then
	eval `dbus-launch --auto-syntax --exit-with-session`
fi

exec openbsd-cwm -c ~/.config/cwm/.cwmrc -d :0</code></pre></div><p>So, to try <strong>startx</strong>:</p><p><em>Step 1</em> - With only one window manager (<em>cwm</em>) being used, and a website reporting the need for the path to the window manager to be specified with <strong>startx</strong>, the line was changed to:</p><div class="codebox"><pre><code>exec startx /usr/bin/openbsd-cwm -c ~/.config/cwm/.cwmrc -d :0</code></pre></div><p>(Other attempts, such as <span class="bbc">exec startx openbsd-cwm ... </span> or <span class="bbc">startx openbsd-cwm ...</span>I would bumped off X with &#039;<em>Connection to the X server was lost&#039;</em>.&#160; A pointer for newcomers, in case it can help: <strong>Ctr+Alt+F5</strong> or with most other Function keys except <strong>F1</strong> might probably allow you to login and modify your system in an interactive shell without getting bumped out again, in case you ever get bumped off the X server).</p><p><em>Step 2</em> - Reset <span class="bbc">/etc/X11/Xwrapper.config</span> without the added new line (mentioned above, &quot;<span class="bbc">needs_root_rights = no</span>&quot;).&#160; This may be a pointless step, with the solution found later on.</p><p><em>Step 3</em> - Should <em>LIBSEAT_BACKEND</em> be set somewhere? <span class="bbc">echo $LIBSEAT_BACKEND</span> returned a blank.&#160; The announcement satisfied my earlier query, explaining that <strong>libseat1</strong> is useful for determining this backend. <strong>elogind</strong> (and five additional <strong>elogind</strong> packages) was already installed, perhaps out-of-the-box, while <strong>seatd</strong> was not (<span class="bbc">apt list --installed | grep seatd</span>).&#160; &#160;I don&#039;t know whether &#039;<em>autodiscovery</em>&#039; decided to choose <strong>elogind</strong>, as <strong>seatd</strong> was not installed at first, but the connection to X server was still lost on each reboot at this point. Even setting <em>LIBSEAT_BACKEND=elogind</em> or <em>=logind</em> or <em>=seatd </em>in <span class="bbc">/etc/environment</span> didn&#039;t help in successive sessions. Note: from my notes, apparently <em>LIBSEAT_BACKEND=logind</em> appeared originally in that file, but some time ago I thought to comment it out, if memory serves me right, as logind maybe was not installed, and my system posed other challenges.&#160; </p><p>I then tried installing <strong>seatd</strong> in case it was relevant to resolving the lost X server connection, although that eventually got solved, as detailed above. </p><p><em>Step 4</em> - Checked whether the <strong>elogind</strong> service might run automatically:</p><div class="codebox"><pre><code>$ doas service elogind status
elogind is running.</code></pre></div><p><em>Step 5</em> - My user had already been checked to be in the <em>video</em> group (demonstrated above), so <strong>seatd</strong> should work for a rootless <strong>startx</strong> if <strong>seatd</strong> was chosen as the backend, if the announcement above was interpreted correctly.</p><p><em>Step 6</em> - Reboot.</p><p>Yet Xorg would still run as root (the <span class="bbc">serverauth</span> file names are modified here in case that this is sensitive info):</p><div class="codebox"><pre><code>$ ps -ef | grep X
root      2861  2860 14 00:53 tty1     00:00:07 /usr/lib/xorg/Xorg -nolisten tcp :0 vt1 -keeptty -auth /tmp/serverauth.Ss2Hejt3Av vt1
root      2985  2983  2 00:53 tty1     00:00:00 /usr/lib/xorg/Xorg -nolisten tcp :1 vt1 -keeptty -auth /tmp/serverauth.OJ9BbzLd8m vt1
myusername    3622  3618  0 00:54 pts/0    00:00:00 grep --color=auto X</code></pre></div><p>With no success so far, next, gratefully, was to attempt <a href="https://dev1galaxy.org/profile.php?id=2" rel="nofollow">soren</a>&#039;s solution.&#160; He was bang on the money, thank you very much!&#160; <em>Xwrapper</em> did get in the way of <strong>startx</strong> running &#039;as user&#039; until it was purged! </p><div class="quotebox"><cite>soren wrote:</cite><blockquote><div><p>what is the output of below command, you should not need xorg wrapper.</p><p>ps -ef | grep seatd</p></div></blockquote></div><p>Note from my earlier reply, before installing <strong>seatd</strong>, that the output was blank (except for picking up my <em>grep</em> query).&#160; Next, with <strong>seatd</strong> installed:</p><div class="codebox"><pre><code>$ ps -ef | grep seatd
root      2033     1  0 01:13 ?        00:00:00 /usr/sbin/seatd -g video
myusername    3875  3621  0 01:25 pts/0    00:00:00 grep --color=auto seatd</code></pre></div><p>The <em>Xwrapper</em> package was suspected to be <strong>xserver-xorg-legacy</strong>:</p><div class="codebox"><pre><code>$ provides Xwrapper.conf

dpgk -S filename works for installed packages only.  Otherwise, use  apt-file but need to do
sudo apt-file update   first and then apt-file search filename

xserver-xorg-legacy: /usr/share/man/man5/Xwrapper.config.5.gz</code></pre></div><p>It didn&#039;t pull away any other packages when purging it:</p><div class="codebox"><pre><code>$ doas apt purge xserver-xorg-legacy &amp;&amp; doas apt autoremove 

Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following packages will be REMOVED:
  xserver-xorg-legacy
0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded.
After this operation, 234 kB disk space will be freed.
Do you want to continue? [Y/n] </code></pre></div><p>With <strong>xserver-xorg-legacy</strong> gone; <strong>seatd</strong> installed; (<strong>elogind</strong> and <strong>seatd</strong> services both running, in case that is relevant); and with any <em>LIBSEAT_BACKEND</em> environment setting commented out in <span class="bbc">/etc/environment</span>, Xorg would run &#039;rootless&#039; without a display manager!</p><p><strong>elogind</strong> had best stay:&#160; purging it would have meant removing 252 packages on my system, including <strong>calligra</strong>, <strong>network-manager</strong>, <strong>okular</strong> and <strong>udisks2</strong>.</p><p>So, maybe the <em>apt dist upgrade</em> procedure didn&#039;t remove the <em>Xwrapper</em> for those who needed it for some good reason.&#160; A mystery remains as to why the connection to the X server would repeatedly be lost when setting <em>LIBSEAT_BACKEND=logind</em> or <em>=elogind</em> or <em>=seatd</em> in <span class="bbc">/etc/environment</span>, except when that line was commented out.&#160; Maybe <span class="bbc">/etc/environment</span> isn&#039;t understood correctly as the meant place for the <em>LIBSEAT_BACKEND</em> setting?&#160; According to <a href="https://superuser.com/a/664236" rel="nofollow">one post</a>:&#160; <em>&quot;You can see the programs using /etc/environment with grep -l pam_env /etc/pam.d/* &quot;</em></p><p>In my installation:</p><div class="codebox"><pre><code>$ grep -l pam_env /etc/pam.d/*
/etc/pam.d/cron
/etc/pam.d/login
/etc/pam.d/sshd
/etc/pam.d/su  </code></pre></div><p>Or perhaps <strong>login</strong> in /etc/pam.d/ is related to <strong>libseat1</strong>?</p><p>Anyway, thanks a lot for your help, participants!</p>]]></description>
			<author><![CDATA[dummy@example.com (ExposeGlobalistsMadness)]]></author>
			<pubDate>Mon, 25 Sep 2023 08:32:15 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44542#p44542</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] X server / X11 / Xorg / X not running rootless by default?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44538#p44538</link>
			<description><![CDATA[<p>I don&#039;t know about most xorg as a whole, but xenocara might run rootless. I have no idea... I would have to look it up.</p><p>Problem is, xenocara&#039;s best features don&#039;t work as well on linux. </p><p>Pledge and Unveil for example do miles of good for openbsd, but I don&#039;t think anyone knows how to make those work in linux without monstrous changes.</p>]]></description>
			<author><![CDATA[dummy@example.com (zapper)]]></author>
			<pubDate>Mon, 25 Sep 2023 01:02:50 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44538#p44538</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] X server / X11 / Xorg / X not running rootless by default?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44512#p44512</link>
			<description><![CDATA[<p>Thank you.</p><div class="codebox"><pre><code>$ ps -ef | grep seatd
myusername    3903  3899  0 08:18 pts/0    00:00:00 grep --color=auto seatd</code></pre></div><p>I had been <a href="https://dev1galaxy.org/viewtopic.php?id=5900" rel="nofollow">wondering</a> about some <strong>seat</strong> messages;&#160; to update (again, changing my <em>username</em> to &#039;<em>myusername</em>&#039;:</p><p><strong>seatd</strong> is not installed but <strong>libseat1</strong> is, yet if I understand correctly, <strong>seat</strong> would be relevant in systems like mine whose display manager was removed, for interactions with the display.</p><div class="codebox"><pre><code>$ apt list --installed | grep seat 

WARNING: apt does not have a stable CLI interface. Use with caution in scripts.

libseat1/stable,now 0.7.0-6 arm64 [installed,automatic]</code></pre></div><p>Notice <strong>seatd_libseat</strong> errors in <span class="bbc">Xorg.0.log</span>, among other errors; note that some messages may relate to the use of a PS/2 converter cable and old keyboard and mouse PS/2 devices that hopefully use a lower amperage, for health reasons:</p><div class="codebox"><pre class="vscroll"><code> $ cat Xorg.0.log  | grep &quot;(EE)&quot; -1
	(++) from command line, (!!) notice, (II) informational,
	(WW) warning, (EE) error, (NI) not implemented, (??) unknown.
[    67.585] (==) Log file: &quot;/var/log/Xorg.0.log&quot;, Time: Thu Sep 21 22:00:22 2023
--
[    71.899] (II) seatd_libseat try close /dev/input/mouse0 (-1:-1)
[    71.899] (EE) seatd_libseat device not open (/dev/input/mouse0)
[    71.901] (II) config/udev: Adding input device CHESEN PS2 to USB Converter System Control (/dev/input/event2)
--
[    72.048] (II) seatd_libseat try open /dev/input/event7
[    72.050] (EE) [libseat/backend/logind.c:137] Could not take device: Device already taken
[    72.050] (EE) seatd_libseat open /dev/input/event7 (-1) failed: -11
[    72.050] (**) vc4: always reports core events
--
[    72.052] (II) seatd_libseat try open /dev/input/event8
[    72.053] (EE) [libseat/backend/logind.c:137] Could not take device: Device already taken
[    72.053] (EE) seatd_libseat open /dev/input/event8 (-1) failed: -11
[    72.054] (**) vc4: always reports core events
--
[    75.916] (II) modeset(0): Disabling kernel dirty updates, not required.
[   853.977] (EE) event1  - CHESEN PS2 to USB Converter Mouse: client bug: event processing lagging behind by 21ms, your system is too slow
[  1362.632] (EE) event0  - CHESEN PS2 to USB Converter: client bug: event processing lagging behind by 36ms, your system is too slow
[  1518.837] (EE) event0  - CHESEN PS2 to USB Converter: client bug: event processing lagging behind by 25ms, your system is too slow
[...]
[  9311.158] (EE) event0  - CHESEN PS2 to USB Converter: client bug: event processing lagging behind by 33ms, your system is too slow
[ 10544.041] (II) event1  - CHESEN PS2 to USB Converter Mouse: device removed
--
[ 10544.305] (II) seatd_libseat try close /dev/input/event8 (40:40)
[ 10544.339] (EE) [libseat/backend/logind.c:199] Could not close device: Interrupted system call
[ 10544.339] (EE) seatd_libseat close failed 0
[ 10544.356] (II) UnloadModule: &quot;libinput&quot;
[ 10544.356] (II) seatd_libseat try close /dev/input/event7 (39:39)
[...]
[ 10544.749] (II) seatd_libseat try close /dev/input/event4 (30:30)
[ 10544.753] (EE) [libseat/backend/logind.c:199] Could not close device: Interrupted system call
[ 10544.753] (EE) seatd_libseat close failed 0
[ 10544.894] (WW) xf86CloseConsole: KDSETMODE failed: Input/output error
--
[ 10544.894] (II) seatd_libseat finish
[ 10544.898] (EE) [libseat/backend/logind.c:365] Could not release control of session: Interrupted system call
[ 10544.898] (II) Server terminated successfully (0). Closing log file.</code></pre></div><p>Note also interesting security concerns expressed elsewhere about whether the user should be in the &#039;<em>video</em>&#039; or &#039;<em>seat</em>&#039; groups (in Gentoo anyway):&#160; <a href="https://forums.gentoo.org/viewtopic-p-8790141.html" rel="nofollow">https://forums.gentoo.org/viewtopic-p-8790141.html</a> .&#160; I am not in the <em>seat</em> group:</p><div class="codebox"><pre><code>$ id
uid=1000(myusername) gid=1000(myusername) groups=1000(myusername),5(tty),6(disk),20(dialout),27(sudo),29(audio),44(video),46(plugdev),102(netdev),104(input),106(render),109(bluetooth),110(i2c),1001(gpio),1002(spi)</code></pre></div><p>So, if this type of installation does not need an <em>xorg</em> wrapper, how does one remove it?</p>]]></description>
			<author><![CDATA[dummy@example.com (ExposeGlobalistsMadness)]]></author>
			<pubDate>Sun, 24 Sep 2023 12:48:11 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44512#p44512</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] X server / X11 / Xorg / X not running rootless by default?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44504#p44504</link>
			<description><![CDATA[<p>what is the output of below command, you should not need xorg wrapper.</p><div class="codebox"><pre><code>ps -ef | grep seatd</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (soren)]]></author>
			<pubDate>Sun, 24 Sep 2023 09:46:08 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44504#p44504</guid>
		</item>
		<item>
			<title><![CDATA[[SOLVED] X server / X11 / Xorg / X not running rootless by default?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=44502#p44502</link>
			<description><![CDATA[<p>Devuan Chimaera was upgraded to Daedalus using standard bash instructions recently (on a Raspberry pi 400 arm64 architecture), and the X server was noted to not be running rootless despite this being a safer mode and a new feature of Daedalus/Debian Bookworm;&#160; as demonstrated by <a href="https://lists.debian.org/debian-user/2023/06/msg00132.html" rel="nofollow">a test used in Debian</a>:</p><div class="codebox"><pre><code>$ ps -ef | grep X
root      2906  2905 10 Sep21 tty1     00:16:45 /usr/lib/xorg/Xorg -nolisten tcp :0 vt1 -keeptty -auth /tmp/serverauth.Sv2CPp0SVI vt1
myusername   17812 17235  0 00:45 pts/0    00:00:00 grep --color=auto X</code></pre></div><p>Would the following implementation to run Xorg &#039;as user&#039; indeed be appropriate, adding a line to <span class="bbc">/etc/X11/Xwrapper.config</span>, as per an entry in the webpage cited above (using <strong>doas</strong> or <strong>sudo</strong>)?&#160; I couldn&#039;t find a relevant Debian wiki page.</p><div class="codebox"><pre><code>$ doas rnano -w /etc/X11/Xwrapper.config 
# Adding following line to ensure that Xorg runs as user
needs_root_rights = no</code></pre></div><p>Followed by a reboot.&#160; It appears to work for me.</p><p>Note that the display manager had previously been purged while in Chimaera to replace it with the system&#039;s interactive text login using an <strong>.xinitrc</strong> file (plus <strong>.bash_profile</strong>, <strong>.profile</strong>, and a soft link from <strong>.xsession</strong> to <strong>.xinitrc</strong>). </p><p>Is Daedalus/Bookworm not implementing this out-of-the-box because it could break some systems&#039; setups, say, in case their GPU driver requires X server to run as root, or is there something missing?</p>]]></description>
			<author><![CDATA[dummy@example.com (ExposeGlobalistsMadness)]]></author>
			<pubDate>Sun, 24 Sep 2023 02:19:15 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=44502#p44502</guid>
		</item>
	</channel>
</rss>
