Shuks, when I read the email I thought I was in for a serious flaming... phew. Sorry to say, but I am working alone
- I really do regret that, however, all principles have been checked and are probably as secure as they will be. Secret protocol as well + two way authentication (using SSL certs for which we hold both the CAs's private keys on an a non-internet connected machine). Well, there are other jazz as well.
atm the load is not too bad, probably won't ever go over a hundred or so similtanious connections but I'll monitor that as we go along. CPU usage shoots up to 100 % at points (well,actually if this didn't happen it would be a problem since a CPU is either working or not). But usually (with 4 incomming connections) its sitting under 10 % on a Pentium mmx 200MHz with 64MB Ram.
The data is coming from all kinds of weird places, truth be told, no one knows excactly where it'll come from - and by no one I really mean no one - well, not anyone human anyway.
If you could just point me in a direction, it'll help. What I know about TLS and SSL is limited. I know the ideas behind the whole protocol, hand shaking and proving about holding the private keys etc ... establishing a session key for something like triple des or whatever it is your using. As I understand it TLS is just the newer version of SSL. Or at least the one supposed to have the "standards". Please correct me if I'm wrong.