Kyle Burton on Wed, 18 Aug 1999 18:40:13 -0400 (EDT) |
> Do you mean that it lets anyone connect to it from any source > and open windows? I'd suspect that it's just like the X protocol [unless you're tunneling it though ssh or some other kind of vpn connection] -- clear and visible on the wire. Open to sniffing. I have no idea how it's authentication process works, but X's is host/ip based, so people can spoof the X server to do undesierable stuff. Doing X between 2 boxes isn't really a good idea unless you have control of the network -- either secured via ssh/vpn, or it's just a private network. You have to trust the remote box, the network, and everything attached to it. It's a rare situation that you can trust everything on your network (at least once you get past the 'netowrk in my apartment'). k ------------------------------------------------------------------------------ The Net treats censorship as damage and routes around it. -- John Gilmore mortis@voicenet.com http://www.voicenet.com/~mortis ------------------------------------------------------------------------------ _______________________________________________ Plug maillist - Plug@lists.nothinbut.net http://lists.nothinbut.net/mail/listinfo/plug
|
|