On Mon, 2005-06-20 at 16:54 -0700, David Busby wrote:
> Gurus,
>    In this hypothetical situation how would someone break in or view the data 
> transmitted?
[snip]
>    Since traffic is limited to IPs that I trust and everyone must have a 
> certificate signed by my CA how can jerks break 
> into my box?  Seems to be to be pretty solid, so I must be missing something.

1. Change my ip to one that you trust.
2. Break into a box you trust which may not be so locked down as yours
is...

maybe :)
-- 
Iain Buchanan <[EMAIL PROTECTED]>

-- 
gentoo-user@gentoo.org mailing list

Reply via email to