Hi, * Peter Dolding <[email protected]> [2013-09-05 10:59:31 +1000]: > Mosh by xmmp or equal would be useful when both of these restrictions > apply. This removes the computer being controlled from requiring a > static IP address or open ports to everyone. Only friends of the > xmmp account that is the server could be limited to control it.
By using TCP, you'd defeat most of mosh's features. Basically everything except the predictive local echo maybe. > Yes every extra road block to attacking a server the better. I'm not sure how introducing much more complexity and attack surface (e.g. if someone can gain control over the jabber server, etc., etc.) would make the whole system _more_ secure. > Traffic usage will be a little higher than direct. Transmitting data as base64 encapsulated in XML sounds like a _lot_ of overhead to me ;) Just my $0.02. Florian -- () ascii ribbon campaign - stop html mail www.asciiribbon.org /\ www.the-compiler.org | I love long mails http://email.is-not-s.ms/ Chuck Norris' house has no doors, only walls that he walks through.
pgpz5WAdcSZTe.pgp
Description: PGP signature
_______________________________________________ mosh-devel mailing list [email protected] http://mailman.mit.edu/mailman/listinfo/mosh-devel
