Skip to Content.
Sympa Menu

cacert-sysadm - Re: [Cacert-sysadm] CAcert email address snafu

cacert-sysadm AT lists.cacert.org

Subject: CAcert System Admins discussion list

List archive

Re: [Cacert-sysadm] CAcert email address snafu


Chronological Thread 
  • From: Guillaume ROMAGNY - CAcert support <guillaume AT cacert.org>
  • To: cacert-sysadm AT lists.cacert.org
  • Subject: Re: [Cacert-sysadm] CAcert email address snafu
  • Date: Sun, 10 Aug 2008 21:57:23 +0200
  • List-archive: <http://lists.cacert.org/pipermail/cacert-sysadm>
  • List-id: CAcert System Admins discussion list <cacert-sysadm.lists.cacert.org>
  • Openpgp: id=EB42B796
  • Organization: CAcert Inc. support

Hi All,

Philipp Gühring a écrit :
No, the critical systems are currently located in vienna, neither BIT, Tunix, nor Daniel has access to them. The critical systems send out the emails for the email-pings and domain-pings on themselves. So neither of those parties can intercept any of those emails at the moment, due to our seperation of datacenters.

Since Tunix does not operate a firewall in front of our critical systems, I don't think that we have a difficult question here at the moment.
If we placed our critical systems behind Tunix firewalls, then we would have to start asking those questions. (Or perhaps even before ...)

So the next question, what do we plan to do after the migration of the critical systems to BIT/Ede ? Keeping the austrian current schema (firewall operated by CAcert) ? The rehosting is supposed to be underway.

--
with best regards,
Guillaume Romagny (fr_FR)
Support

CAcert.org - Free Certificates

E-mail: 
guillaume AT cacert.org
 - www.CAcert.org
Make sure to reply to 
support AT cacert.org

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature




Archive powered by MHonArc 2.6.16.

Top of Page