[K12OSN] Tuning LTSP Performance

Almquist Burke balmquist at mindfirestudios.com
Sat Aug 30 03:23:28 UTC 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


On Aug 29, 2008, at 9:54 PM, Robert Arkiletian wrote:
> Here is my question:
>
> Since X traffic is sent unencrypted how is someone suppose to
> intercept the packets (containing keyboard input) if using a switch
> that only sends packets to their destination. So you can only sniff
> yourself. (Hmm, did I just say that?)  IF you are sitting at the
> server ALL local traffic goes through eth0. BUT you need root access
> to read those packets, don't you? So again how is direct X traffic a
> vulnerability?
>
> The only way I can think is if, as Terrell said, you have control of
> the switch and you enable port mirroring.
>

ARP poisoning? All they need is access to the network on a machine  
with raw socket capabilities.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (Darwin)

iEYEARECAAYFAki4vTAACgkQxWV7OPa/g5HZXACdFzB4kuGz/2gR1KnH4VZL5LbB
854An3CYTYlu4Ra4zIyQJ/tWcgOQAv1W
=rvvK
-----END PGP SIGNATURE-----




More information about the K12OSN mailing list