mixed system backups

Alfred alfred at mazuma.net.au
Thu Jan 3 16:40:56 EST 2002


Unless you use one of the many possible hacks to redirect the data past a
compromised machine :) (its pretty trivial to do and hard to counter).

----- Original Message -----
From: "Kim Holburn" <kim.holburn at anu.edu.au>
To: "Damien Elmes" <resolve at repose.cx>
Cc: <burn at goldweb.com.au>; <linux at samba.org>
Sent: Thursday, January 03, 2002 3:54 PM
Subject: Re: mixed system backups


> At 2:21 PM +1100 02/1/3, Damien Elmes wrote:
> >Kim Holburn <kim.holburn at anu.edu.au> writes:
> >
> >> > > Any pointers - even alternatives to rsh from the more security
wise.
> >> >
> >> >ssh with RSA or DSA keys.
> >>
> >> Forget it unless you want to have your machines spend 90% of their time
> >> encrypting and decrypting.
> >
> >depends on the speed of the machines. alternative ciphers are also
available,
> >some of which trade off some level of encryption but result in a marked
> >speedup.
> >
> >behind a company firewall it's probably not a problem, but if that data
stored
> >say, confidential billing information, it would be nice not to have other
> >employees have access to it if they're just sitting on the network.
>
> If you have switches or secure hubs then only the two endpoints of a
connection see that traffic.
>
>
>
> --
> --
> Kim Holburn  Network Consultant  P/F: +61 2 61258620 M: +61 0417820641
> Email: kim.holburn at anu.edu.au - PGP Public Key on request
>
> Life is complex - It has real and imaginary parts.
>      Andrea Leistra (rec.arts.sf.written.Robert-jordan)
>





More information about the linux mailing list