Extend + symmetric encryption

Hello

I am trying to configure a proxy extend to use symmetric encryption filter, so am copy the tangosol - coherence.xml from the pot to be ahead of the coherence.jar in the classpath edit filters-using the Proxy service as follows:
      <service id="7">
        <service-type>Proxy</service-type>
        <service-component>ProxyService</service-component>
        <use-filters>
          <filter-name>symmetric-encryption</filter-name>
        </use-filters>
        <init-params>
          <init-param id="1">
            <param-name>acceptor-config</param-name>
            <param-value></param-value>
          </init-param>
          <init-param id="2">
            <param-name>proxy-config</param-name>
            <param-value></param-value>
          </init-param>
          <init-param id="3">
            <param-name>thread-count</param-name>
            <param-value system-property="tangosol.coherence.proxy.threads">0</param-value>
          </init-param>
          <init-param id="4">
            <param-name>task-hung-threshold</param-name>
            <param-value system-property="tangosol.coherence.proxy.task.hung"></param-value>
          </init-param>
          <init-param id="5">
            <param-name>task-timeout</param-name>
            <param-value system-property="tangosol.coherence.proxy.task.timeout"></param-value>
          </init-param>
          <init-param id="6">
            <param-name>request-timeout</param-name>
            <param-value system-property="tangosol.coherence.proxy.request.timeout"></param-value>
          </init-param>
          <init-param id="7">
            <param-name>serializer</param-name>
            <param-value></param-value>
          </init-param>
        </init-params>
      </service>
I then start a cache server with a cache config defining an instance of the proxy service that throws an exception, which suggests that a password was not resolved, great! I therefore put the JVM arg - Dtangosol.coherence.security.password = < pwd > and restart the cache server, and it is now upward and execution to extend the proxy server bound to TCP port then have some assurance that the filter is used.

When I then start a CacheFactory instance with a client configuration by using a remote system with the details of the proxy above, I can connect without requiring the same password or suggesting the use of a filter of symmetric encryption. My hope was I would be denied a connection to the proxy server without using the same password, am I missing something?

Thank you
. Jamie

Jamie-

Sorry for the delay. I needed to check with a member of the senior team.

Intro: The proxy has two separate communication layers; the client layer (extend) and the cluster layer (tcmp).

The use filters added to the element of service-pane proxyservice in tangosol - coherence.xml configure the proxy server to use
encryption for the cluster layer; Proxy-proxy communication will be through an encrypted channel. This does nothing to configure
the client layer.

To configure the client proxy (client layer) communication via encrypted channel, the filters use should be added to the initiator of the client-config
element and the acceptor-config of the proxy element. In the client configuration validated, the filters use is misplaced in the outgoing-message Manager
element.

For more information, see the following:

http://coherence.Oracle.com/display/COH35UG/configuring+and+using+coherence+extend

http://coherence.Oracle.com/display/COH35UG/initiator-config

http://coherence.Oracle.com/display/COH35UG/Acceptor-config

/ Mark

Tags: Fusion Middleware

Similar Questions

  • Asymmetric encryption of the symmetric encryption

    I read through a few documents and see that IPsec uses asymmetric key cryptography in Phase 1 to create SAs ike and encryption to the symmetric key for IPsec security associations that are data in bulk.

    Please can someone confirm if this is true. What key (symmetric key or asymmetric) set for pre shared key counterpart specific belngs to.

    Thanks in advance

    Following a simple rule: whenever userdata must be protected, symmetric cryptography is used because it is built for this task and is much faster then asymmetric crypto. Asymmetric cryptography is not built to protect large amounts of data.

    With this, IPsec security associations use only the symmetric algorithms to protect data.

    For Phase 1, it depends on how authentication is performed.

    If you are using PSK and ROUTER1 wants to authenticate ROUTER2, there are the following (slightly simplified) process:

    1. R1 sends a nonce to R2. It is essentially a random number.
    2. R2 takes this value for single use, axe with the PSK and sends the result to R1.
    3. R1 uses its own generated nonce and the PSK and also calculates a hash.
    4. If the received hash and the local calculation are the same, R1 knows that R2 has made the calculation with the Nuncio as R1 provided and used the same PSK R1: R2 is authenticated.
    5. In IPsec, these authentication is done each other, also R2 authenticates R1.

    No asymmetric cryptography is involved when PSK is used which allows fast enough treatment.

    If you use digital certificates for authentication (rsa - sig in the config method) the following happens (even simpler):

    1. R1 sends a nonce to R2. This single value gets axe and the hash is encrypted with the private key of R2s (here we have asymmetric cryptography). If a hash is encrypted with a private key, the result is called a digital signature.
    2. The signature is returned to R1.
    3. R1 uses the R1 certificate to prove the correctness of the signature which is again an asymmetric cryptographic operation. Prior to this, the received certificate has be validated which also has one ore more Asymmetric cryptographic operations.
    4. And the same thing happens the other way around.

    With authentication using digital certificates we have asymmetric cryptography.

    In addition, he is also asymmetric cryptography when DH calculates keymaterial for session keys.

  • My Mac is hacked! Encryption help please!

    My Mac Pro is hacked, and this is confirmed by the engineers. Because the Mail app and even online ISP mail did not work if good PSI hunted hackers. I found files fragmented on 240 and 480 GB Intel SSD drives into the slots of the T2 drive: files named "sparse disk image...". ' and ' package of rare records...' appeared in the root of the readers. I could easily remove them. But I never put there. At the same time, Apple Mail app kept resetting ports 993/587 (course) to ports 143/25 (very insecure). Post font size 23pt appeared, ads corrupted font, file extensions book would not appear or would disappear, etc, etc, etc. The internet connection was bad too, so I called my ISP. ISP found twelve 12 computers in windows using various applications on my system. None of the computers used found languages where I live. Pirates. I also have an airport with a cap of 2 TB, and it is probably also diverted. Nothing in my system is encrypted. I just use firewall, even if it does not get somehow.

    Advise main suggested Apple should I encrypt my records. But these fragmented files were already there. Which indicates that someone somewhere on Earth was already encrypt files on my system. The adviser said fragmented files are a pretty good indication that its time to get more proactive. If my plan is to use disk utility to wipe my internal drive OS, OS X Extended (journaled encrypted). Then install OS X on the disc encrypted EAS - 256 bit.

    For those who have experience of encryption Mac

    1.) encrypt and install OS X on the encrypted drive wise?

    2.) how to clear all present airport Time Capsule content, encrypt Time Capsule and use it with my encrypted system?

    3.) how to encrypt external disks and use them with encrypted Time Capsule and encrypted internal drive?

    (4.) how to manually copy files from encrypted disks (mainly SSD external drives) of other backup disks which are normally cold (disconnected) for monthly backups of cold. "

    5.) monthly cold copies remain unencrypted?

    I worked with Mac since the 1980s. You can ignore it, but here are my thoughts: encrypt just the disk won't do much. I am surprised that the Apple engineer suggested this. If your Mac is compromised (depending on the ISP see Windows for access to the you that seems reasonable) the things MOST IMPORTANT to do is eliminate the hack code. If you encrypt the disk with the hack still there it is more likely will always have access to the data. Before going that all keep in mind that you probably allowed the hack in installation of the software on the web or by opening an attachment with the hack. So everything you try to remember what helped you ensure that you wouldn't do it again.

    You should consult your application package to see if there is something that you don't recognize or recently installed before the problem and remove before you try anything because it is possible the cut is integrated into an application. Remember that almost all hacks are hidden in the system and not easily seen so you probably won't find it. My approach is to install a charge/clean OS X, then copy your applications and your data.

    There are many approaches to this problem, but here's what I think, this is the simplest approach IF you have access to a second mac AND hack code doesn't do not part of one of your applications.  You said not what type of Mac you have or the system or if you have access to other Macs. My proposal would be based on that. Since you are in a jam here are a few options:

    If you have more than one Mac and an external hard drive:

    1. start the mac infected in target mode: restart and as soon as it chimes hold "T".

    2 connect the Mac, because I know you can't tell how. You can google it.

    3 format an external hard drive to use as a target of installation for El Capitan.

    4 download and install El Capitan on the Apple App store and install it on the external drive.

    5. after starting upwards, when asked if you want to copy applications and data to another Mac say Yes and let it copy the applications and data from the infected Mac internal drive.

    6. Once installation is complete it should start from the outside, test your system for ensure that everything works, you have all your dataand see if the problems are eliminated.

    7. If it's good, when it is started from the outside:

    8 download Super Duper or carbon copy. (I use SD).

    9. use disk utility in the folder utilities to clear the internal drive.

    10. copy your external drive to the internal drive, it will be deleted.

    11. when the copy is complete, stop the Mac and disconnect the external hard drive.

    12. start the Mac, go to Preferences-> floppy boot, then selected your internal drive system, she might want to restart. This step is optional, but if the boots aren't made can be more slow that the Mac external drive first.

    If you have access to an external hard drive:

    Remember that although it would probably be fine, there is a slight possibility that this can infect a connected drive, this is the case, you must use multiple macs above approach. But it's something you can try if you don't have a second mac.

    * Skip steps 1-2 above and do the rest on the infected mac.

    If you do not have an external drive, you can use a large USB but it will be much slower. Good luck, I hope that others will come to the top with options. But it's what I would do.

  • My disk utility has no encryption option.

    I'm trying to format a USB key that I can encrypt.  But my disk utility does not have the drop down option for encryption. Can I have a utility obsolete? OS X El Capitan 10.11.5

    In the Finder, when you attempt to encrypt, I get an error message saying "A Partition GUID (GPT) partitioning schΘma Table is necessary".

    Suggestions please.

    You must format the disk with a Table of Partition GUID.

    You can do if you erase the drive with disk utility. Choose Mac OS extended (journaled, Encrypted) format.

    If you encrypt the drive without deleting the content, it's impossible because it is already formatted with a Table of Partition GUID.

  • Player Flash editing and encryption

    In the past, I've encrypted a SanDisk thumb/flash drive with a right-click and then going to «Encrypt...» "but now, there is a problem: in a first time things seem to work, you choose a password etc, but they don't, and finally, there is a message"a Table of Partition GUID (GPT) partitioning scheme is required. »

    These Discussions to tell me to go to utilities > disk utility, select the flash player and then click on "Partition" in the option line (thought I would go ahead and choose a partition.) However, the Partition button is grayed out and is not available.

    So please, with a flash drive, how should we do about changing its formatting and encrypt?

    You must select erase. Format the drive in guid and chose the option to encrypt the drive as x OS Extended journaled encrypted.

  • How to encrypt a USB stick.

    I had already formatted the USB, but the disco utility won't let me use the partition option in the menu.  It doesn't let me format in the first two options.

    You or the other need of third party encryption software or erase and format using Mac OS X extended (journaled, Encrypted).

  • How to encrypt usb OS CAPITAN

    I have a USB and want to encrypt it. But the Capitan OS will not let me us the option of partition in disk utility.   So, what should I do?

    Which is exactly the problem that you receive?

    It seems that our goal is to present under OS extended (journaled, Encrypted)

    The question is unclear.  Is the partition in disk utility gray tab?

    If so, you must select the physical disk and not volume.

    If the disk has a map of MBR partition, it will have to be deleted and replaced by TPG.

  • El capitan | disk utility: 'format' is missing

    Dear mac'ommunity.

    You also have 'format' missing from disk on the new el capitan utility?

    I wanted to fix my external drive. with googleling I discovered, I have to 'clear' the external drive and rename it. After that I should click on 'format' to set the password. but where?

    need your help! Thank you!!!

    The format of the volume is selected to delete. Click on the clear button, and then choose a format. If you want to specify a password encrypted options, for example OS X Extended (journaled, Encrypted). You will then need to choose a password.

  • Should what format I use for my external drive for time machine?  I have a WD 2 TB that is formatted for PC new drive.

    Should what format I use for my external drive for time machine?  I have a WD 2 TB that is formatted for PC new drive.  When I got to disk utilities to erase, and then reformat the options are

    1 mac OS extended (journaled)

    2 mac OS extended (journaled, encrypted)

    3 mac OS Extended (respect for case-sensitive, journaled)

    4 mac OS extended (case-sensitive, journaled, encrypted)

    See the information below If you can not back up or restore your Mac with the help of Time Machine - Apple Support

    When you select a drive to use with Time Machine, your Mac automatically prompts you if you need to reformat the drive.

    • If you are using an external drive connected to your Mac, use disk utility to make sure that your backup disk is formatted in HFS + extended (journaled) and is the partition type GUID Partition Table (GPT).
    • If you use a time Capsule, formatting the drive for Time Machine preferences automatically formats the drive as HFS + Extended (respect for case-sensitive, journaled) with a GUID Partition Table (GPT).
  • Understanding, IKE Phase I and II

    Hi, I've been through the concept of a lot of time, but what confuses me, is encryption algorithm and a key to the DH, how they go hand in hand in IKE phase II.  I understand phase I authenticates the vpn peers and negotiates policy ISAKMP which includes Exchange Diffie-Hellman and symmetric encryption example WITH or TDES.  What I don't understand is what Exchange Diffie-Hellman (key derived from the public/private function) is used for, it encrypts the exchange of IKE2 already encrypted with DES/TDES/AES.

    Also if m do not use PFS in Phase II, would I by using the same key DH derived at the time of the phase I, if yes which is secure enough?

    Another issue is when the peers authenticate each other and then the protocol IKE phase I policy are exchanged, happens in clear text?

    Could someone please explain the process step by step in the two phases stressing precisely on the Diffie-Hellman exchange and how it is used with encryption algorithms.

    Concerning

    Sonu

    Sonu,

    Looks like you want to go back to RFC to take a peek. We have also a series of documents explaining IKEv1 and goes with debugging.

    What you miss is that in IKEv1 (main mode), messages, 5 and 6 are already encyrpted, while the previous, including Diffie-Hellman exchange are not.

    MM5 MM6 is when we exchange their identities. Those who must be protected, where the DH before negotiating.

    Phase 2 is a separate Exchange protected with the result of the phase 1. The role of DH for the phase 2 is to ensure that the encryption keys are not from previous key material.

    Start here:

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_tech_note09186a0080094203.shtml

    http://www.Cisco.com/en/us/products/ps6120/products_tech_note09186a0080bce100.shtml

    https://supportforums.Cisco.com/docs/doc-18522

    M.

  • How can I encrypt documents extended drive?

    Hello

    I use the Java API of the livecycle TO encrypt a dynamic, reader extended PDF. I get the error message:

    ALC-ENC-100-015 may not encrypt reader extended document.

    My case is the following:

    A document is sent to some users. It is encrypted with a certificate. Users enter data in the document, encryption again and send it via e-mail. The document is never sent without being encrypted. A server receiving the e-mail, extracts the document and reads the data entered by the user.

    How can I implement this use case when I can't encrypt the extended drive of the documents?

    Thanks in advance for your answer.

    Kind regards

    Arne

    The order of operations is always encrypt (first), drive to extend (second), (and if you also certify document) certifies (third-party) (when you certify a document, an "author" digital signature is applied to the document).

    There is no way around that, the document must be encrypted first, then applied RE.

    Concerning

    Steve

  • How to encrypt a USB, when I get the message "(GPT) GUID Partition Table partitioning scheme is required? '."

    I just tried to encrypt a USB drive with my Mac book (latest version) and got the message "A GUID Partition Table (GPT) partitioning schΘma required." What does this mean and suggestions on how to proceed?

    The drive must be formatted for Mac. Start in the Recvery mode. Erase the drive using disk utility (select the top icon which represents the entire disk and click clear. Partition scheme must be Mac OS (Extended) first partition GUID, which is the default value.

    If you want to install a system on it follow these steps:

    How to reinstall OS X on your Mac - Apple Support

  • Extend a network of comments with AEBS and TC set up a connection

    Hi all-

    I was wondering if anyone has had any success with that extends a network invited on two airports or more that are wired together.  I use currently a Time Capsule as my main router (802.11ac), and have it configured with DHCP and NAT like fashion.  It connects via a connection wired to an Airport Extreme Base Station (802.11ac), which is set in Bridge mode and configured with a static IP address to the primary time Capsule.  The time Capsule is configured with a network of comments that is fully functional, and the AEBS extends the primary network using the same SSID and encryption on 2.4 and 5 GHz.  However, when I turn on the AEBS remote networking reviews, I can connect to the AEBS, but cannot obtain an IP address (the computer displays an automatic address assigned).  The SSID and the encryption is the same for both networks of comments.  I tried to use "extend a wireless network" on the AEBS and that will extend the network, but it is extremely slow due to the wireless connection it creates between two access points (I have the TC and wired together AEBS to offer increased coverage, because my house is not very "friendly wifi").

    I would greatly appreciate any help or insight anyone can provide, even if it's to tell me that a cable extension of the network of comments is not possible.

    Thank you

    Mike

    Wired to the guest network feature extension is indeed possible and should be implemented and enabled automatically if you are using "Assistant" Installation from Apple to expand the networks main and guests.

    I had this set up on the 2 airports and sometimes 3 for a few years and not a single hiccup.

    Suggest that you reset the AEBS back to default settings and then use configuration Apple "Wizard" to set up the AEBS again. It automatically adapts the AEBS to expand networks main and guests.  Everything you really need to do is enter a name of device to the AEBS, the wizard takes care of everything else for you.  It is one of the simplest game ups ever.

    Once you have the updated AEBS up and running, you can assign a static unit IP address if you want to, but it should not be necessary.

    After the back if you need some advice on the use of the Apple Setup Assistant to do the work for you.

  • Unable to encrypt USB / El Capitan

    Using a Macbook Air running El Capitan 10.11.4...

    (Sorry if this is the wrong forum, but I've never understood how to navigate to the right place n communities Support from Apple).

    I tried (for literally a few hours) to find how pw - protect / encrypt a new USB key. Although I have read and followed the instructions to more than a dozen son / pages online, * nothing * works, because my system does not simply offer the options described. To cut a very long story short, I used disk utility to erase the drive, but never did have the option of "password" on the screen "next" mentioned repeatedly - there is no next screen, just a local saying 'Done '. Then I discovered several discussions mentioning the need to partition the USB key to encrypt - that seems weird to me, but I guess I'm out of my depth. Anyway, "Partition" is always grayed out. I * so * found son saying that, so the partition, I first need to choose "GUID" partition of the table - but absolutely nowhere in the process are only some sort of partition of an option. At no time do I get nothing except a NAME box, a box of FORMAT and DELETE / CANCEL.

    Oh - on another (official, Apple) help screen, he said in El Capitan, you could simply Ctrl-click on the USB in the Finder. (Interestingly, no other screen I saw didn't mention this.) Of course, that appear a box to enter a new password... followed by the error message that I must first of all put in place a GUID partition table.

    Naively, I thought this would be a three-minute operation, but I'm completely stumped.

    You can only encrypt a drive formatted for Mac.  If this isn't the case, you will need to format will erase the drive.

    In disk utility, select the drive and delete it. As the format, select Mac OS extended (journaled). That will make a table partition GUID.

  • Encrypted time machine will not go up

    Last night I "removed" my hard drive (a drive of my book), for some reason any instead of my usual path. I wanted to start over and encrypt my backup disk. I really didn't do this way. Now my drive will not mount! I've tried everything! It shows that if I open my drive utiliity. It shows both the physical disk and the logic of the os x extended volumes called 'time machine', however, that ghost. It cannot mount it through disk utility. If I try to run the first aid, the ghost volume disappears. I also tried these steps with the WD my book nothing helps utilities. I also tried to go through the restore and recovery mode, but it's just a turning wheel without end for hours and hours. Basically, it seems as if she is already encrypted. His is as if he started the process, because I chose, but he removed. But, he asks me the password during restart. A few tips on how to get back? I tried a direct contact with the computer and drive to the wall. I also tried different ports. As a last resort, I tried to erase the disc, but it also doesn't let me do. He said it is "impossible to delete the basic storage logical volume group."

    I read a few other threads here and so far, none have allowed... so I post separate in the hope of a miracle! The drive is new.

    No one is willing to answer to this?

    Of course it is a problem because of the "suppression" of the player. Because I just went out and bought a new drive. The same. Of course recognized the first and as soon as I chose encrypted and the process has started. The drive was missing and it gives the same message.

Maybe you are looking for

  • Baidu Spam - how to delete the sent message?

    Hello I was victim of the Baidu link spam. I followed your advice and changed all my passwords. I also scanned for malware, but nothing has been found (Mac). My question is: How can I delete the message send? I does ' t give me the option to delete.

  • How to trace datetime against temperature table of waveform

    Hi guys,. I try to draw data from my table and to draw a time value date on the x axis and the value of the temperature which resemble 32.5 c on the y axis on a cat of waveform. I'm new to studio measure, anyone have an example on how to proceed? I h

  • negative edge trigger

    Hello, I am designing a detector of negative edge using a d-type flip flop that gets a signal from two cascaded from the binary counters that are used to reset when the desired value is reached. The design should include a frequency of window, but I

  • Reading, writing datalog file only once

    Can someone tell me why I can only read/write to a file once datalog.  Once the file created, read and written to it will not work the second time.  I tried to adjust the position without success even if the default position is at the beginning of th

  • My speakers stopped working. Not detected in Control Panel

    My speakers just stopped working, now when I connect, I get a found new hardware message (pci device) but when I apply the wizard, he found nothing. In my control panel, it has not detected speaker. I lost my drivers somehow? I have Norton Antivirus.