Our Blog

Over the past series of posts, Jeetu and myself have been discussing in depth few of the architecture related options with the SSH implementation we are putting into place.

We have seen

Client & user security notes

Existing keys vs Separate Keys for eBrainPool

Key authentication, host keys a...

Continue Reading...

The last few posts have been dealing with the ssh related security aspects to consider while putting together eBrainPool. Erle has done a good job of answering a few of the questions I raised in the post SSH integration: Points to ponder and I thought I'll make an attempt to present my understand...

Continue Reading...

Question: "Use the openssh keys of an existing user or generate new keys?"

Continuing on from the list of questions arising in our minds. Another important question comes into play here, which keys do we use. This more a matter of pure policy, but it could have fairly serious impacts on security.

...

Continue Reading...

To move things along and continue the discussion on SSH and the integration policies. "Should they run as the same user?"

The client does allow people to access other software residing in other computers running the ebrainpool client. This brings in an interesting view point. What about security?...

Continue Reading...

Hello everyone, it's been a busy few weeks with an IT consulting gig and other business. Trying to earn a living makes me wonder why I ever wanted to leave behind being a kid and grow up ;)...and then too I like to claim I'm older not necessarily wiser ;)

Of course developments with eBrainPool con...

Continue Reading...

I was at this trivia event, a fun night out with some friends. We all had to draw funny flowcharts, this one is what I came up with :)

and btw, we believe, just as in the case of any good open source, gpl'd project, 'We are doing it right' :P

  • I hate the fact that I have too put this statemen...

Continue Reading...