* Technology Strategic Planning <Technology> writes:
> "Nick (Keith) Fish" <[EMAIL PROTECTED]> 
>> Stephen Froehlich wrote:

Do you read your mail from bottom to top? If not, why do you start your
reply on top of the original mail?

>>> In the near future, I'll need to allow encrypted remote access.
>>> (Encrypted only.)  I have a few, relatively trusted users.  How
>>> would you go about meeting those requirements?
>>
>> Run two copies of tcpserver under supervise (well, four if you want
>> both POP and IMAP), one not encrypted and available to your local
>> network as specified in tcpserver's rules files, and the other
>> encrypted and available to anyone.  
[...]

> For one, how good is the IMAP encryption?  

That depends on your implementation.

> Is it just preventing casual browsing, serious private attempts, 

That depends on your implementation.

> or people with supercomputers?

Which interest should they have in your private mail?

> How about VPN solutions?  

That depends on your implementation.

> Is there a decent Linux server for MS's VPN?  

How do you want to write something decent for something not decent?
There are several VPN implementations (FreeS/WAN works well), but if
you're looking into VPN solutions, you'd better take a close look at
OpenBSD.

> I have an NT server (with scads of processing power), but am afraid to
> expose it to the internet in any way, shape, or form.  

MS says it's secure. Just do it. They wouldn't *sell* anything that has
bugs, right?

> The mail server will be inside of a DMZ once I get things up and
> running fully - which is a much better place to do this from.  

If you intend to run MS Exchange, it won't matter much.

> How about the PGP based IP tunneling?  Any experiences or impressions?

It works. But why would you want to do it if there are other options?

> Is this overkill?

No. Underkill.

> Should I be concerned if we have to carry it on a laptop across
> borders?

That depends on the border.
-- 
Robin S. Socha - Your Worst Network Nightmare(tm).
`In Germany, they are not referred to as network administrators. They
prefer to be called "Sons Of The Third Reich".' (Kate: www.katewerk.com)

Reply via email to