[prev in list] [next in list] [prev in thread] [next in thread] 

List:       kde-devel
Subject:    Re: X11 exploit info
From:       Dave Feustel <dfeustel () mindspring ! com>
Date:       2006-02-12 12:44:55
Message-ID: 200602120744.55778.dfeustel () mindspring ! com
[Download RAW message or body]

On Sunday 12 February 2006 07:38, Christian Mueller wrote:
> I'm talking about the things my ssh client *doesn't* ever get to see 
> let alone send it to a compromised server counterpart, for example 
> passwords I enter in my locally running browser. This too can 
> be snooped if X11 forwarding is on (because the X11 API allows it 
> and "ssh -X" forwards the X11 requests).  

Your passwords can be recovered by exploits running in user mode
independent of ssh and/or x11 forwarding. x11 is beginning to look
to me as about as secure as Microsoft Windows.
-- 
Lose, v., experience a loss, get rid of, "lose the weight"
Loose, adj., not tight, let go, free, "loose clothing"
 
>> Visit http://mail.kde.org/mailman/listinfo/kde-devel#unsub to unsubscribe <<

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic