[K12OSN] Tuning LTSP Performance
Almquist Burke
balmquist at mindfirestudios.com
Sat Aug 30 03:23:28 UTC 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Aug 29, 2008, at 9:54 PM, Robert Arkiletian wrote:
> Here is my question:
>
> Since X traffic is sent unencrypted how is someone suppose to
> intercept the packets (containing keyboard input) if using a switch
> that only sends packets to their destination. So you can only sniff
> yourself. (Hmm, did I just say that?) IF you are sitting at the
> server ALL local traffic goes through eth0. BUT you need root access
> to read those packets, don't you? So again how is direct X traffic a
> vulnerability?
>
> The only way I can think is if, as Terrell said, you have control of
> the switch and you enable port mirroring.
>
ARP poisoning? All they need is access to the network on a machine
with raw socket capabilities.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (Darwin)
iEYEARECAAYFAki4vTAACgkQxWV7OPa/g5HZXACdFzB4kuGz/2gR1KnH4VZL5LbB
854An3CYTYlu4Ra4zIyQJ/tWcgOQAv1W
=rvvK
-----END PGP SIGNATURE-----
More information about the K12OSN
mailing list