bgnori / isokaze

isokazeの管理情報。中身は空だよ〜
1 stars 0 forks source link

moshがほしい #16

Open supermomonga opened 11 years ago

supermomonga commented 11 years ago

ほしいです!

バージョン: 特に指定なし 公式サイトにあるUbuntu用のインストール方法(apt-get)とかで

理由: WiMAXなせいかSSHにおける反応の遅延が(isokazeに限らず)割とあるので、少しでも改善したい。

bgnori commented 11 years ago

Portあける必要があるとか、ホールパンチングしてくれないのか・・・

http://gihyo.jp/admin/serial/01/ubuntu-recipe/0220 http://d.hatena.ne.jp/karasuyamatengu/20120411/1334092521 http://blog.glidenote.com/blog/2012/04/11/mosh-on-sakura-vps/

bgnori commented 11 years ago

http://mosh.mit.edu/

bgnori commented 11 years ago

もうちょっと勉強させてね・・・

http://d.hatena.ne.jp/karasuyamatengu/20120416/1334537979

bgnori commented 11 years ago

http://iam.richardbucker.com/2012/12/07/mosh-is-still-a-bit-of-a-pit/

Well, there are a number of problems with this. The first is that PEL really only works 
in the shell itself. Once you are in vi and changing modes it is impossible to echo 
properly… and that is why most terminal emulators default to local echo off. Many
old-school applications screen scrape terminal sessions and would not be capable
of dealing with PEL as it does not effect the byte stream so much as it does the
representation in the terminal window. The demo that was presented was a command
shell which is the easiest use-case but is by no means proof or substantive.

ももんが氏はこの辺についてはどう考えてるのかな?

bgnori commented 11 years ago

http://blog.cloudpassage.com/2012/09/25/mitigating-security-risks-mosh/

2. An attacker might be able to exploit a vulnerability in a running mosh server to get in your system.

The set of attackers for #2 is pretty big, on the other hand.  Anybody on the internet with an exploit 
could start poking around on ports 60000-61000 and hit paydirt, just like they did with sshd exploits
and port 22 back in the day.
bgnori commented 11 years ago

CSIRT

http://www.csirtcv.gva.es/va/content/security-fedora-16-update-mosh-122-1fc16.html http://www.csirtcv.gva.es/va/content/security-announce-mdvsa-2013104-mosh.html