On Fri, Jan 26, 2001 at 10:39:46AM -0600, Patrick Goetz wrote:
> 
> Thanks for the response.
> 
> On Thu, 25 Jan 2001, Jeremy D. Zawodny wrote:
> > > It just occurred to me, however, that this becomes a much bigger
> > > problem when the web server(s) and the database server are running
> > > on different machines.
> > 
> > Only if they're on different networks. Ideally, you could put the web
> > server(s) and database server on different ports of a high-speed
> > switch.
> 
> This must assume some kind of hardware firewall, then (i.e. inside
> the switch), else how would this provide any kind of security?  All
> the switches I currently use essentially just act as repeaters, so
> anyone with a physical connection to the switch (i.e. the whole
> Internet, more or less) can grab the packets passing between the 2
> machines.

The difference between a hub in and a switch is that the hub will
allow any port to see the data transmitted by any other port. A
network switch will not do that. It's true circuit switching, just
like a telephone switch. Thus the name "switch".

> > Simply putting one of the servers behind a firewall does nothing to
> > stop a packet sniffer.
> 
> This point I don't see at all.  If your network is configured like
> this:
> 
> 
>                        {Web Server Pool}
>                           /
>                          /
>                        E1
>       Internet ------- E2:Firewall
>                        E3
>                          \
>                           \
>                         Database Server   
> 
> 
> you simply create firewall rules which prevent any packets from passing
> between interfaces E2 and E3  (i.e. any packets originating from E3 are
> only allowed to pass through E1 to the web server pool.

You misread (or misunderstood) what I wrote. I said "simply putting
ONE of the servers..." But your diagram shows ALL of the servers
behind a firewall. Of course that makes sense. But your original note
said " is this usually handled by simply putting the database server
behind a firewall?" That implied that the database server would be
behind the firewall but the web servers would not be.

> > What you really want is some sort of encrypted network
> > connection. I'd suggest using SSH to do it. I've run replication
> > across the country via an SSH tunnel before.
> 
> So this must be some sort of TCP wrapper?  Where could I find some
> good documentation on how to implement this?

SSH (Secure Shell) is a telnet/rsh replacement that provides
encryption and the ability to forward arbitrary TCP ports from one
machine to another over an encrypted connection.

To find info:

    http://www.google.com/search?q=ssh

Jeremy
-- 
Jeremy D. Zawodny, <[EMAIL PROTECTED]>
Technical Yahoo - Yahoo Finance
Desk: (408) 328-7878    Fax: (408) 530-5454
Cell: (408) 439-9951

---------------------------------------------------------------------
Before posting, please check:
   http://www.mysql.com/manual.php   (the manual)
   http://lists.mysql.com/           (the list archive)

To request this thread, e-mail <[EMAIL PROTECTED]>
To unsubscribe, e-mail <[EMAIL PROTECTED]>
Trouble unsubscribing? Try: http://lists.mysql.com/php/unsubscribe.php

Reply via email to