Co:Z has a configuration option that allows you to either tunnel data
connections in the original ssh connection (the default) or to use
un-tunneled, clear sockets.  In the latter case the data is unencrypted,
which can be appropriate for secure networks.   Using un-tunneled
hipersockets really screams, since the protocol stack is very efficient.

For more details on configuration options, see:
http://dovetail.com/docs/coz/config.html#config_launcher_optional

Kirk Wolf
Dovetailed Technologies
http://dovetail.com

On Thu, May 29, 2008 at 9:20 AM, David Andrews <[EMAIL PROTECTED]> wrote:

> On Thu, 2008-05-29 at 08:25 -0500, Kirk Wolf wrote:
> > You might also consider in some cases offloading the processing to an
> > IFL or other Linux processor.
> > Our free Co:Z toolkit makes this simple to do, and in the case of an
> > IFL you can use clear-channel hipersockets.
>
> Kirk, what do you mean by "clear-channel hipersockets"?  Co:Z is using
> ssh for data transport, and ssh always encrypts... no?
>
> (A little googling suggests that encryption can be defeated if you have
> the HPN patchset installed on your OpenSSH end nodes.  Is this what
> you're referring to?)
>
> --
> David Andrews
> A. Duda and Sons, Inc.
> [EMAIL PROTECTED]
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to