On Thu, Oct 9, 2014 at 7:21 AM, Duncan Patton a Campbell <campb...@neotext.ca> wrote: > On Tue, 7 Oct 2014 07:08:54 +0000 > "C. L. Martinez" <carlopm...@gmail.com> wrote: > >> On Mon, Oct 6, 2014 at 11:52 PM, Duncan Patton a Campbell >> <campb...@neotext.ca> wrote: >> > The most basic consideration in computer security has nothing to >> > do with technology and computers. Do the people you need to keep >> > out of the know need to know enough to come and break legs? >> > >> > If so, don't bother encrypting. They may not just break legs. >> > >> > Dhu >> > >> > On Mon, 06 Oct 2014 13:48:33 -0600 >> > chester.t.fi...@hushmail.com wrote: >> > >> >> Very true, filling your subterranean data server with angry hornets >> >> certainly seems like a good idea but it's really not, most AC >> >> maintenance contractors will charge you extra (usually per sting!). >> >> >> >> Chester T. Field >> >> >> >> And remember when I left all the meat out because I saw Mr. David Lynch >> >> “I’m on TV” do it, >> >> and he got on TV from doin’ it, and I did it and didn’t get on TV from >> >> doin’ it? - Gandhi >> >> >> >> On 10/6/2014 at 1:37 PM, "Matti Karnaattu" <mkarnaa...@gmail.com> wrote: >> >> > >> >> >>Yes, my goal is to secure the >> >> >>infrastructure as much as possible. >> >> > >> >> >I don't know details but it sounds overly complex. And complexity >> >> >may cause other issues, without any benefit for security. >> >> > >> >> >Example, you don't have to encrypt your whole hard disk if the hard >> >> >disk is located in guarded bunker. But if you do that, it will >> >> >increase >> >> >security in theory but that may cause service outtage if you have >> >> >to >> >> >always locally type your crypt password if machine crashes. >> >> > >> >> >I would put this effort to ease maintainability, ease monitoring, >> >> >use stateful firewall, deploy honeypot etc. and avoid complexity. >> >> >> >> Thanks guys for your answers. I know it: our it sec. dept. adds a >> complexity to our infrastructure, but they are determined to do so. >> >> Searching via google I found this: >> >> http://www.safenet-inc.com/data-encryption/ >> >> HSM: hardware security modules ... But exists another problem. If I >> would like to use some SSL/TLS or IPSec based solution, how can I >> authenticate these servers between them without compromise host >> security?? >> >> Any ideas?? >> >> > > Is "man 8 iked" what you are looking for? > > Dhu
Uhmm . .. I don't understand your question Duncan... To use IPsec is a possibility.