Mosh by xmmp or equal would be useful when both of these restrictions apply. This removes the computer being controlled from requiring a static IP address or open ports to everyone. Only friends of the xmmp account that is the server could be limited to control it.
Yes every extra road block to attacking a server the better. Makes both end clients. The machine to be controlled connect like a bot to xmmp or other options waiting to be talked to by approved users. Traffic usage will be a little higher than direct. Mosh smarts should make its interface work ok over xmmp and other options. https://github.com/jjo/oxgate prototype has managed to push openvpn by xmmp. So bandwidth required is in xmmp. Yes this provides a different solution to forwarding. In fact ssh forwarding has it hazards. Like what happens when the forwarding dies. xmmp the machines inside can setup up there external connections. They don't have to just be connected to one xmmp network. Of course the business could provide internal xmmp as well. _______________________________________________ mosh-devel mailing list [email protected] http://mailman.mit.edu/mailman/listinfo/mosh-devel
