14.11.2015 23:16, Jim Starkey wrote:
> So here's a simple scheme.  The basic idea of a redundant set of
> lightweight key servers running at various points in the network. When a
> database wants to start up, it runs through a list of key server
> addresses looking for one that is actually running.  If it finds one, it
> establishes a secure connection and asks for the decryption key.  The
> key server notes the IP address of the requester and returns the
> appropriate key.  Probably a good idea to toss in a database name as well.

   If no single key server is accessible, the database is locked up.
   Static "white" IP address on client side is required.
   Database on a laptop is inaccessible completely.

   I'm afraid that that's not what customers would pay for.

-- 
   WBR, SD.

------------------------------------------------------------------------------
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to