For most of my Linux-oriented career, the X protocol (TCP port 6000-60nn) that runs over the network has not been allowed. Most security policies ban the X protocol and have it silently blocked on network equipment. I guess I'm OK with that. I've mildly argued the point a few times but I generally accept the walls in which I must operate.
That said, there are ways to make non-secure protocols secure by tunneling them over a secure protocol such as SSH. Often, that still doesn't satisfy the powers that be. And, you also have the "purists" who believe that anything graphical is evil and the command line is the only true way to manage systems.
The extremes of opinion often give me pause. It also makes me wonder how your companies handle graphical tools and protocols with the focus here on the X protocol. Here's your chance to inform me. Have I been hilariously led astray by radical security people or have I lived my sysadmin life in the accepted mainstream of reasonable reality? I'd like to know. I've devised this little poll to help me reconcile the question of X protocol over-the-network acceptance. To that end, I pose the question for this poll: Do you allow the X protocol on your network?
Über den Autor
Ken has used Red Hat Linux since 1996 and has written ebooks, whitepapers, actual books, thousands of exam review questions, and hundreds of articles on open source and other topics. Ken also has 20+ years of experience as an enterprise sysadmin with Unix, Linux, Windows, and Virtualization.
Follow him on Twitter: @kenhess for a continuous feed of Sysadmin topics, film, and random rants.
In the evening after Ken replaces his red hat with his foil hat, he writes and makes films with varying degrees of success and acceptance. He is an award-winning filmmaker who constantly tries to convince everyone of his Renaissance Man status, also with varying degrees of success and acceptance.
Ähnliche Einträge
More than meets the eye: Behind the scenes of Red Hat Enterprise Linux 10 (Part 4)
Why should your organization standardize on Red Hat Enterprise Linux today?
AI Is Changing The Threat Landscape | Compiler
What Is Product Security? | Compiler
Nach Thema durchsuchen
Automatisierung
Das Neueste zum Thema IT-Automatisierung für Technologien, Teams und Umgebungen
Künstliche Intelligenz
Erfahren Sie das Neueste von den Plattformen, die es Kunden ermöglichen, KI-Workloads beliebig auszuführen
Open Hybrid Cloud
Erfahren Sie, wie wir eine flexiblere Zukunft mit Hybrid Clouds schaffen.
Sicherheit
Erfahren Sie, wie wir Risiken in verschiedenen Umgebungen und Technologien reduzieren
Edge Computing
Erfahren Sie das Neueste von den Plattformen, die die Operations am Edge vereinfachen
Infrastruktur
Erfahren Sie das Neueste von der weltweit führenden Linux-Plattform für Unternehmen
Anwendungen
Entdecken Sie unsere Lösungen für komplexe Herausforderungen bei Anwendungen
Virtualisierung
Erfahren Sie das Neueste über die Virtualisierung von Workloads in Cloud- oder On-Premise-Umgebungen