[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: [K12OSN] Tuning LTSP Performance



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


On Aug 29, 2008, at 9:54 PM, Robert Arkiletian wrote:
Here is my question:

Since X traffic is sent unencrypted how is someone suppose to
intercept the packets (containing keyboard input) if using a switch
that only sends packets to their destination. So you can only sniff
yourself. (Hmm, did I just say that?)  IF you are sitting at the
server ALL local traffic goes through eth0. BUT you need root access
to read those packets, don't you? So again how is direct X traffic a
vulnerability?

The only way I can think is if, as Terrell said, you have control of
the switch and you enable port mirroring.


ARP poisoning? All they need is access to the network on a machine with raw socket capabilities.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (Darwin)

iEYEARECAAYFAki4vTAACgkQxWV7OPa/g5HZXACdFzB4kuGz/2gR1KnH4VZL5LbB
854An3CYTYlu4Ra4zIyQJ/tWcgOQAv1W
=rvvK
-----END PGP SIGNATURE-----


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]