On Mon, 24 May 2004, Otto [iso-8859-15] Kek�l�inen wrote:

> Hello!
> 
> As I understand, all traffic in a between a running client and server in 
> LTSP i sent with XDMCP, which is not an encrypted protocol.  So that if there 
> is a sniffer on the network, he'll catch all usernames and password from all 
> logins, right?

Almost right.  It's not XDMCP protocol, it's just plain old X protocol.

XDMCP is simply used to make the initial contact between the Xserver
and the Display manager. Once that connection is made, the Display 
manager will launch the greeter and the login dialog, which is just
using X protocol to pop-up a window on the screen.

But, the bulk of your comment is correct.  The data is un-encrypted.

We're working on tunnelling this through SSH, but it's not complete yet.

Jim McQuillan
[EMAIL PROTECTED]




> 
> What can I do to encrypt or scramble my traffic somehow? I'd like to make 
> sniffing a little bit harder, so weak encryption would be fine. How do I put 
> up something like that with LTSP?
> 
> 



-------------------------------------------------------
This SF.Net email is sponsored by: Oracle 10g
Get certified on the hottest thing ever to hit the market... Oracle 10g.
Take an Oracle 10g class now, and we'll give you the exam FREE.
http://ads.osdn.com/?ad_id149&alloc_id�66&op=click
_____________________________________________________________________
Ltsp-discuss mailing list.   To un-subscribe, or change prefs, goto:
      https://lists.sourceforge.net/lists/listinfo/ltsp-discuss
For additional LTSP help,   try #ltsp channel on irc.freenode.net

Reply via email to