Hi,

* Peter Dolding <[email protected]> [2013-09-05 10:59:31 +1000]:
> Mosh by xmmp or equal would be useful when both of these restrictions
> apply.   This removes the computer being controlled from requiring a
> static IP address or open ports to everyone.   Only friends of the
> xmmp account that is the server could be limited to control it.

By using TCP, you'd defeat most of mosh's features. Basically
everything except the predictive local echo maybe.

> Yes every extra road block to attacking a server the better.

I'm not sure how introducing much more complexity and attack surface
(e.g. if someone can gain control over the jabber server, etc., etc.)
would make the whole system _more_ secure.

> Traffic usage will be a little higher than direct.

Transmitting data as base64 encapsulated in XML sounds like a _lot_ of
overhead to me ;)

Just my $0.02.

Florian

-- 
() ascii ribbon campaign - stop html mail    www.asciiribbon.org
/\ www.the-compiler.org  | I love long mails http://email.is-not-s.ms/
Chuck Norris' house has no doors, only walls that he walks through. 

Attachment: pgpz5WAdcSZTe.pgp
Description: PGP signature

_______________________________________________
mosh-devel mailing list
[email protected]
http://mailman.mit.edu/mailman/listinfo/mosh-devel

Reply via email to