On Tue, Sep 15, 2009 at 12:05 PM, Darren J Moffat <Darren.Moffat at sun.com> wrote: > How does this work when the Solaris system is running with Trusted > Extensions enabled ? In particular given that the screensaver is a trusted > path concept and cut and paste is intercepted on trusted path and subject to > authorisation. > > I was surprised you said there was no authentication or authorisation, but > then the upstream page on "Security" says this: > > "Synergy does not do any authentication or encryption. Any computer can > connect to the synergy server if it provides a screen name known to the > server" > > Scarey! ?Does that really mean what it says ? ?If I run synergy on my > Solaris desktop anything that can make a network connection to it can grab > the keyboard and mouse ? ?That is scarey! ? I can't find out from the
Reality isn't that bad AFAIK. The server process (synergys) is run on machine with you physical keyboard/mouse. And client processes (synergyc) are connected to it from other machines. synergyc doesn't grab you keyboard and mouse, but rather server injects events to the client. So if anyone fakes a client identification and connect to you machine with server running she becomes controlled by you, rather than vice versa. > project home page how port numbers are selected and if it is possible to > force it to bind to localhost only (so that if can be run over SSH and not > still exposed unencrypted). synergy documentation provides a recipe on how to implement it via SSH -- Regards, Cyril