<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security in VirtualVault in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-in-virtualvault/m-p/2641183#M756258</link>
    <description>Simon,&lt;BR /&gt;&lt;BR /&gt;In what ways are you trying to "secure" a already secure OS (Virtual Vault)?&lt;BR /&gt;&lt;BR /&gt;Just six months ago, I replaced our 15+ Virtual Vaults with Bastion hosts. A Bastion Host, in my case HPux 9000's (10.20 and 11.x) running Iplanet, is a normal HPux host, but with most services shut off. It's a lot easier to develop on a normal host, and you don't have to worry about the stupid Virtual Vault TGP (Trusted GateWay Proxy) dying!!!&lt;BR /&gt;&lt;BR /&gt;You can find bastion host info here (GREAT PAPER):&lt;BR /&gt;&lt;A href="http://people.hp.se/stevesk/bastion.html" target="_blank"&gt;http://people.hp.se/stevesk/bastion.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Another thing, VV is a dead product. HP doesn't even use it!!! And support for the product sucked!!!!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
    <pubDate>Wed, 09 Jan 2002 12:54:20 GMT</pubDate>
    <dc:creator>harry d brown jr</dc:creator>
    <dc:date>2002-01-09T12:54:20Z</dc:date>
    <item>
      <title>Security in VirtualVault</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-in-virtualvault/m-p/2641181#M756256</link>
      <description>Hello&lt;BR /&gt;&lt;BR /&gt;    I am working in a proyect to secure the Virtualvault web server, I'd like to know:&lt;BR /&gt;&lt;BR /&gt;    - If the certificates aren't used in the outside server the traffic could be encryted with the RSA keys or the traffic will be without encryt.</description>
      <pubDate>Wed, 09 Jan 2002 08:45:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-in-virtualvault/m-p/2641181#M756256</guid>
      <dc:creator>Simon_13</dc:creator>
      <dc:date>2002-01-09T08:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: Security in VirtualVault</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-in-virtualvault/m-p/2641182#M756257</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I am not sure about VirtualVault but for securing any webserver:&lt;BR /&gt;&lt;BR /&gt;1) use SSL-based HTTP for encrypting traffic to and fro the client and webserver.&lt;BR /&gt;&lt;BR /&gt;2) use SSL certificates for identification/non-repudiation of webserver and maintaining integrity of traffic transferred.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong&lt;BR /&gt;Brainbench MVP for Unix Admin&lt;BR /&gt;&lt;A href="http://www.brainbench.com" target="_blank"&gt;http://www.brainbench.com&lt;/A&gt;</description>
      <pubDate>Wed, 09 Jan 2002 11:05:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-in-virtualvault/m-p/2641182#M756257</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-01-09T11:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Security in VirtualVault</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-in-virtualvault/m-p/2641183#M756258</link>
      <description>Simon,&lt;BR /&gt;&lt;BR /&gt;In what ways are you trying to "secure" a already secure OS (Virtual Vault)?&lt;BR /&gt;&lt;BR /&gt;Just six months ago, I replaced our 15+ Virtual Vaults with Bastion hosts. A Bastion Host, in my case HPux 9000's (10.20 and 11.x) running Iplanet, is a normal HPux host, but with most services shut off. It's a lot easier to develop on a normal host, and you don't have to worry about the stupid Virtual Vault TGP (Trusted GateWay Proxy) dying!!!&lt;BR /&gt;&lt;BR /&gt;You can find bastion host info here (GREAT PAPER):&lt;BR /&gt;&lt;A href="http://people.hp.se/stevesk/bastion.html" target="_blank"&gt;http://people.hp.se/stevesk/bastion.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Another thing, VV is a dead product. HP doesn't even use it!!! And support for the product sucked!!!!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Wed, 09 Jan 2002 12:54:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-in-virtualvault/m-p/2641183#M756258</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2002-01-09T12:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: Security in VirtualVault</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-in-virtualvault/m-p/2641184#M756259</link>
      <description>I don't agree that VirtualVault is a dead product. VV is mainly used for Banks and other strongly secured E-commerce systems. Bastion host can't be a replacement for VirtualVault. In the last year HP released latest Virtual Vault 4.5 version with Apache Web Server.&lt;BR /&gt;&lt;BR /&gt;I agree with Harry that support for VirtualVault is not as good as it should be. There are't many VirtualVault experts. VV is very complex to configure (especially if you use cryptographic HW accelerators) and the price is quite high. &lt;BR /&gt;&lt;BR /&gt;Simon, you should use SSL and certificates to secure traffic on the outside Web Servers. You can test this with trial certificates. You can get them from Verisign for free.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Pete</description>
      <pubDate>Thu, 10 Jan 2002 08:06:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-in-virtualvault/m-p/2641184#M756259</guid>
      <dc:creator>Peter Cvar</dc:creator>
      <dc:date>2002-01-10T08:06:23Z</dc:date>
    </item>
  </channel>
</rss>

