[EMAIL PROTECTED] says:
> Hello Jun Mao, since you wrote:
> 
> > Some users require for transfering files i.e. cp,... which need to
> > be encrypted through network between cells. Has anyone managed
> > this before?
> 
> The short answer is: put the ecryption into the presentation layer of the
> network, that is where it belongs - see any good book on Networking, for
> example A.S.Tanenbaum ... (You are, of course using the OSI Networking
> model :-0) ?

There is strong evidence that the network layer may be more
appropriate -- see the recent IP security proposals.

> The long answer is that you can write encrypting applications (although 
> calling commands like cp an application is stretching it a bit ...) and
> then you can have all the management fun of keeping tables of which hosts
> you should use encrypting cp to and which hosts not.

Public key encryption and appropriate network databses fix that.
However, this is going far afield of the topic.

However, I'll point out that the MIT kerberos utilities have an
encrypted authenticated rcp already written for you, and this should
likely solve the stated problem nicely.

Perry

Reply via email to