On Mon, 2005-06-20 at 16:54 -0700, David Busby wrote: > Gurus, > In this hypothetical situation how would someone break in or view the data > transmitted? [snip] > Since traffic is limited to IPs that I trust and everyone must have a > certificate signed by my CA how can jerks break > into my box? Seems to be to be pretty solid, so I must be missing something.
1. Change my ip to one that you trust. 2. Break into a box you trust which may not be so locked down as yours is... maybe :) -- Iain Buchanan <[EMAIL PROTECTED]> -- gentoo-user@gentoo.org mailing list