On Tue, Sep 15, 2009 at 12:05 PM, Darren J Moffat <Darren.Moffat at sun.com> 
wrote:
> How does this work when the Solaris system is running with Trusted
> Extensions enabled ? In particular given that the screensaver is a trusted
> path concept and cut and paste is intercepted on trusted path and subject to
> authorisation.
>
> I was surprised you said there was no authentication or authorisation, but
> then the upstream page on "Security" says this:
>
> "Synergy does not do any authentication or encryption. Any computer can
> connect to the synergy server if it provides a screen name known to the
> server"
>
> Scarey! ?Does that really mean what it says ? ?If I run synergy on my
> Solaris desktop anything that can make a network connection to it can grab
> the keyboard and mouse ? ?That is scarey! ? I can't find out from the

Reality isn't that bad AFAIK. The server process (synergys) is run on
machine with you physical keyboard/mouse. And client processes
(synergyc) are connected to it from other machines. synergyc doesn't
grab you keyboard and mouse, but rather server injects events to the
client. So if anyone fakes a client identification and connect to you
machine with server running she becomes controlled by you, rather than
vice versa.

> project home page how port numbers are selected and if it is possible to
> force it to bind to localhost only (so that if can be run over SSH and not
> still exposed unencrypted).

synergy documentation provides a recipe on how to implement it via SSH

-- 
Regards,
        Cyril

Reply via email to