Jason,
        i just don't see how usb key can be made secure. to stop sniffing
attack, the kernel loaded into terminal would have to be able to encrypt
traffic from the keyboard and decrypt traffic from the server. on the
other hand, i've seen a little keyboard port dongle that records all the
keystrokes ....
julius

On Mon, 23 Sep 2002, Jason A. Pattie wrote:

> Julius Szelagiewicz wrote:
>
> >Tim,
> >     LTSP is inherently vulnerable to network sniffing. as long as
> >information travels in plain text over the network, it can be easily
> >intercepted. the usb keys are fine, but don't offer real security - they
> >can be duplicated with ease. Our only home is that Jim McQ. will have
> >enough free time to implement fully ssh encrypted workstation - server
> >
> You would really need to have an IPSec tunnel between the workstations
> and the server to incorporate all possible traffic types for the
> workstations.  If you can get the "key" situation worked out securely,
> then you can implement either SSH or IPSec for the workstations.
>
> >traffic from the moment when login process receives user name. julius
> >



-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_____________________________________________________________________
Ltsp-discuss mailing list.   To un-subscribe, or change prefs, goto:
      https://lists.sourceforge.net/lists/listinfo/ltsp-discuss
For additional LTSP help,   try #ltsp channel on irc.openprojects.net

Reply via email to