I agree that if the traffic is staying within the box there is no real snooping
problem. But we are trying to talk to linux servers and some paranoid security
people do not want any clear-text traffic for any linux servers. 

Paranoid security people are like PHBs, every company has at least one and you
just have to live with them or become their boss so you can fire them.

/Tom Kern 

--- Adam Thornton <[EMAIL PROTECTED]> wrote:
> On Oct 20, 2005, at 10:41 AM, Nix, Robert P. wrote:
> > I was looking for something to ship a single command or string of
> > commands across to the zLinux image. I don't actually want to start
> > a session like telnet or transfer a file like ftp. (Although sftp
> > support would be nice too...)
> 
> If they're on the same box, why worry about it?  Put the VM system
> and the Linux system on their own VLAN, open up rsh on the Linux
> system *only* for the VM system's VLAN IP address, and just do it
> cleartext.  No unencrypted traffic will ever hit any external wire.



        
                
__________________________________ 
Yahoo! Mail - PC Magazine Editors' Choice 2005 
http://mail.yahoo.com

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to