If the technology he's developing is comparable in nature to that of a Google Search Appliance, then I could see how this would be the case. For example, the internal index may use database schemas (or data) that should not be accessible to the customer. Additionally, any PHP/CGI/etc code loaded on the machine would be good to have hidden from prying eyes to prevent code theft.

If I were building something akin to a Google Search Appliance, i.e. something that you bring into an isolated network, plug it in, then treat it as a "black box" appliance, then I would probably be asking the same questions he's asking. However, I doubt even the Googles of the world go to the extreme of actually encrypting the hard disk just to protect the data and code. A well-engineered firewall and system configuration that prevents access to confidential data and code is probably enough to keep most casual observers out. Anybody nefarious enough to rip the hard disk out of the box to try and get to the data is probably determined enough to get around any encryption scheme that would be implemented.

Companies that purchase "black box" servers like this aren't in the business of stealing code...that's why they buy a "black box", turn it on, and expect it to "just work".

Paul Krizak                         7171 Southwest Pkwy MS B400.2A
Advanced Micro Devices              Austin, TX  78735
Linux/Unix Systems Engineering      Desk:  (512) 602-8775
Silicon Design Division             Cell:  (512) 791-0686


John Summerfield wrote:
Ahmed Kamal wrote:
oh! No, the hardware is *not* my concern. It's the data! Let me quickly
recap. Let's try points this time

- The Linux system I build will be on someone else's network (mostly other
potentially hostile companies)
- The system provides a web interface to a database that users should access
& use
- The users should not be able to steal/mount the disk, to dump my database
or look at my code
- I know such setup will never be 100% secure, I just need to make stealing
the data as hard as possible

Hope that's clear. I apologize if I was not too clear earlier


Nothing you've said so far tells me why you must have confidential data on local storage or why you can't run these "kiosk" machines of a server located in a secure location.




On Jan 18, 2008 5:46 PM, J E <[EMAIL PROTECTED]> wrote:

On Jan 18, 2008, at 10:27 AM, John Summerfield wrote:

Ahmed Kamal wrote:
Perhaps I misused the word "kiosk" and was not clear describing the
role of
the nodes. They will not be on my network. They will be on someone
else's
network (some other company, or some other organization). The nodes
will be
providing network services (Custom databases, accessible through a
browser),
sometimes some ldap services.
Again, the people around the machine should use it as intended, no
one
should be able to steal/mount the disk to dump data (at least not
easily)
I think we need better information about the problem you're trying
to solve.

Agreed. If your main worry is that the hardware will be stolen, cheap
hardware abounds in the marketplace. I'd not invest heavily in systems
that aren't going to be monitored - probably better to treat them as
throwaways if you aren't going to lock them in some form of cabinet.
And don't rule out hardware terminal servers like those available from
HP starting at $200.

If it's the data that you are worried about, the fact that you have to
ask how best to protect it should tell you that doing it with local
storage is probably a very bad idea.

jef

_______________________________________________
rhelv5-list mailing list
rhelv5-list@redhat.com
https://www.redhat.com/mailman/listinfo/rhelv5-list



------------------------------------------------------------------------

_______________________________________________
rhelv5-list mailing list
rhelv5-list@redhat.com
https://www.redhat.com/mailman/listinfo/rhelv5-list




_______________________________________________
rhelv5-list mailing list
rhelv5-list@redhat.com
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to