Cyril Plisko wrote:
> On Tue, Sep 15, 2009 at 12:05 PM, Darren J Moffat <Darren.Moffat at sun.com> 
> wrote:
>> How does this work when the Solaris system is running with Trusted
>> Extensions enabled ? In particular given that the screensaver is a trusted
>> path concept and cut and paste is intercepted on trusted path and subject to
>> authorisation.
>>
>> I was surprised you said there was no authentication or authorisation, but
>> then the upstream page on "Security" says this:
>>
>> "Synergy does not do any authentication or encryption. Any computer can
>> connect to the synergy server if it provides a screen name known to the
>> server"
>>
>> Scarey!  Does that really mean what it says ?  If I run synergy on my
>> Solaris desktop anything that can make a network connection to it can grab
>> the keyboard and mouse ?  That is scarey!   I can't find out from the
> 
> Reality isn't that bad AFAIK. The server process (synergys) is run on
> machine with you physical keyboard/mouse. And client processes
> (synergyc) are connected to it from other machines.

So there is a process running on my machine listening for network 
connections.

 > synergyc doesn't
> grab you keyboard and mouse, but rather server injects events to the
> client. So if anyone fakes a client identification and connect to you
> machine with server running she becomes controlled by you, rather than
> vice versa.

Understood, but that doesn't answer my questions.

>> project home page how port numbers are selected and if it is possible to
>> force it to bind to localhost only (so that if can be run over SSH and not
>> still exposed unencrypted).
> 
> synergy documentation provides a recipe on how to implement it via SSH

I read that, what I couldn't find was how to force synergy to only bind 
to localhost.  If it doesn't bind to localhost then I need to ensure 
that there are ipfilter rules in place to block it.

-- 
Darren J Moffat

Reply via email to