Re: SNMP Monitoring

2001-11-15 Thread Waldemar Brodkorb
Hello Jason, From the keyboard of Jason, Hello, Please forgive my unsolicited intrusion, but I am looking for an SNMP Management solution. To give you some detail, we are developing in-house SNMP agents to monitor our applications/services. I require a robust and flexible Management

secure remote logging

2001-11-15 Thread Waldemar Brodkorb
Hello *, anyone using a method to do secure remote logging? I need a advice how this could be realized. I need data encryption and want to avoid misuse of the loghost. (for examble DoS) Some idea's of me: a) ipsec or cipe to tunnel the complete traffic between loghost and the other servers.

Re: SNMP Monitoring

2001-11-15 Thread Waldemar Brodkorb
Hello Jason, From the keyboard of Jason, Hello, Please forgive my unsolicited intrusion, but I am looking for an SNMP Management solution. To give you some detail, we are developing in-house SNMP agents to monitor our applications/services. I require a robust and flexible Management

secure remote logging

2001-11-15 Thread Waldemar Brodkorb
Hello *, anyone using a method to do secure remote logging? I need a advice how this could be realized. I need data encryption and want to avoid misuse of the loghost. (for examble DoS) Some idea's of me: a) ipsec or cipe to tunnel the complete traffic between loghost and the other servers.

Re: replicating, balanced web-server with *write* access?

2001-11-14 Thread Waldemar Brodkorb
Hello Christian, From the keyboard of Christian, Hi Much is written about High-Availability servers but I still didn't find a good solution how to build two load-balanced webservers _without_ connecting them both to one RAID (single point of failure). The problem with balancing between

Re: replicating, balanced web-server with *write* access?

2001-11-14 Thread Waldemar Brodkorb
Hello Christian, From the keyboard of Christian, Hi Much is written about High-Availability servers but I still didn't find a good solution how to build two load-balanced webservers _without_ connecting them both to one RAID (single point of failure). The problem with balancing between

Re: Journaling FS for Production Systems

2001-11-06 Thread Waldemar Brodkorb
Hello, From the keyboard of I., Hello All I am looking at moving some of our potato based production servers onto woody, and at the same time upgrading onto a journaling FS. I need the FS to meet the following in order of importance: - MUST BE STABLE (our income depends on

Re: Apache mod_auth_pam

2001-09-28 Thread Waldemar Brodkorb
From the keyboard of Jeremy, At the moment I'm using mod_auth_pam for userauthentication on special webfolders. /etc/shadow have to be accessed by apache And second some password-results aren't exposed like the root-pw and the accounts to maintain the machine. How the

Apache mod_auth_pam

2001-09-27 Thread Waldemar Brodkorb
Hello *, I have a small problem with the userauthentification (.htacess) with auth PAM modul for Apache. Probably it is more a problem with useradd. At the moment I'm using mod_auth_pam for userauthentication on special webfolders. /etc/shadow have to be accessed by apache userid. (chgrp

Re: Apache mod_auth_pam

2001-09-27 Thread Waldemar Brodkorb
From the keyboard of Hans, On Wednesday 26 September 2001 23:30, Waldemar Brodkorb wrote: Hello *, I have a small problem with the userauthentification (.htacess) with auth PAM modul for Apache. Probably it is more a problem with useradd. At the moment I'm using mod_auth_pam

Virtual Hosting

2001-07-25 Thread Waldemar Brodkorb
Hello *, I have a question: How do you use Proftpd to serve more then one domain? Name based Virtual Hosting seems to work only for Apache, because of the protocol (HTTP 1.1). Is the only way to use IP-Aliasing? (Have all IP's to be official?) I don't want to use Port-Based Virtual Hosting,

ispman

2001-07-11 Thread Waldemar Brodkorb
Hello debianfriends, have anyone of you tested ispman? http://www.ispman.org Anyone seen a deb-package of it? bye Waldemar -- It's naive to assume that just installing a firewall is going to protect you from all potential security threat. That assumption creates a false sense of security,