Date: Fri, 11 Aug 2006 11:49:26 -0500 From: Paul Schmehl <pauls@utdallas.edu> To: Matthew Seaman <m.seaman@infracaninophile.co.uk> Cc: "Marc G. Fournier" <scrappy@freebsd.org>, Nikolas Britton <nikolas.britton@gmail.com>, freebsd-questions@freebsd.org Subject: Re: BSDstats Project v2.0 ... Message-ID: <44DCB516.40501@utdallas.edu> In-Reply-To: <44DCAFFE.6090400@infracaninophile.co.uk> References: <20060807003815.C7522@ganymede.hub.org> <20060808201359.S7522@ganymede.hub.org> <44D91F02.90107@mawer.org> <20060808212719.L7522@ganymede.hub.org> <20060809072313.GA19441@sysadm.stc> <20060809055245.J7522@ganymede.hub.org> <44D9F9C4.4050406@utdallas.edu> <20060809130354.U7522@ganymede.hub.org> <ef10de9a0608091700x6cc268ear6566c26f93f1fdf0@mail.gmail.com> <ef10de9a0608100327r5b402d64xc4eef38a4f61ba4e@mail.gmail.com> <ef10de9a0608110342q62f81fc8p5fb4b4df37595593@mail.gmail.com> <20060811100914.U7522@ganymede.hub.org> <44DCA340.2050204@utdallas.edu> <44DCAFFE.6090400@infracaninophile.co.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] Matthew Seaman wrote: > Paul Schmehl wrote: > >> 1) encrypt the data being fed to your systems by the script - this >> should be relatively easy using keys and would ensure that a man in the >> middle attack would fail. You can connect using ssh and a unique key >> without having to reveal passwords to anyone. > > Uh... HTTPS surely? Because it's relatively simple to implement on both > client and server, doesn't require extra software installed on every client > beyond the monthly stats script itself and because of the way that HTTPS > uses a one-sided Diffie Helmann exchange to create session keys which means > that you don't have any trouble with key management on the many thousands > of client boxes out there... > I defer to your obviously greater experience and wisdom. :-) I would note that these issues appear to be impacting the project. As of right now, there are only 1612 systems reporting in, and I suspect there are a much greater number of systems distributed throughout the computing universe. Certainly some can be attributed to the newness of the project and the small amount of promotion done to date, but I can't help but think that at least some of it is due to hesitancy on the part of some to submit their data. For my part, I've submitted two public hosts. I have four others I will not submit until I'm certain the data are securely transmitted and stored. Surely I'm not alone? -- Paul Schmehl (pauls@utdallas.edu) Adjunct Information Security Officer The University of Texas at Dallas http://www.utdallas.edu/ir/security/ [-- Attachment #2 --] 0 *H 010 + 0 *H N00AA=e0 *H 010 UUS10U VeriSign, Inc.1<0:U3Class 2 Public Primary Certification Authority - G21:08U1(c) 1998 VeriSign, Inc. - For authorized use only10UVeriSign Trust Network0 990331000000Z 090330235959Z01'0%U The University of Texas System10UVeriSign Trust Network1;09U2Terms of use at https://www.verisign.com/rpa (c)991200U)Class 2 CA - OnSite Individual Subscriber1-0+U$The University of Texas at Dallas CA00 *H 0 "zھ6p`0`S/5ɨ)=d}чTxxLIA ҥ~BQNths]1)%c#Dj9FXúKzI#C2 00)U"0 010UPrivateLabel1-1400 `HB0DU =0;09`HE0*0(+
