On Sat, 15 Oct 2005 10:30:44 +0100, Jim wrote in message 
<[EMAIL PROTECTED]>:

> Hi guys,
> Without wishing to start a flame war and perhaps starting another 
> thread!!
> Anyone transmitting un-encrypted data across a world wide internet (as
>  opposed to a "private" intranet) needs to think ahead a little. Every
>  
> hacker will be rubbing their hands with glee before trying to hit you 
> on these ports you have just announced. A server/client or even 
> peer-to-peer client can implement TLS/SSL fairly easily. For those
> with  restricted firewalls you can tunnel through SSH port 22 if you
> want to  keep it simple. Firewall/NAT configurations are difficult
> enough for  admins to configure without having to allow special
> FlightGear port  rules to allow access to ports on machines
> in-the-clear which may then  get hacked thus compromising the security
> of everyone behind the  firewall.

..yes, but can ssh give us any good udp tunnelling?

> Maybe I am paranoid (well known for it in my previous job!) but a 
> denial-of-service attack on your multi-player ports will soon wreck 
> your response times!
> cheers
> Jim

..try put an outboard in your kettle and casually wield a chainsaw 
on asking the white coat guys for constructive critisism.  ;o)

-- 
..med vennlig hilsen = with Kind Regards from Arnt... ;o)
...with a number of polar bear hunters in his ancestry...
  Scenarios always come in sets of three: 
  best case, worst case, and just in case.



_______________________________________________
Flightgear-devel mailing list
Flightgear-devel@flightgear.org
http://mail.flightgear.org/mailman/listinfo/flightgear-devel
2f585eeea02e2c79d7b1d8c4963bae2d

Reply via email to