Resin 3.2 Reference

Total Page:16

File Type:pdf, Size:1020Kb

Resin 3.2 Reference Contents 1 Overview 3 1.1 Features - Resin and Resin Professional . .3 2 Installation 11 2.1 Resin Installation Quick Start . 11 2.2 Resin Installation . 16 2.3 Resin Web Server . 16 2.4 Resin with Apache . 22 2.5 Resin with IIS . 34 2.6 How the Plugins Dispatch to Resin . 44 3 Command-Line 47 3.1 Command-Line Configuration . 47 4 Admin Guide 51 4.1 User Guide: Administration . 51 5 Watchdog 63 5.1 Resin Watchdog . 63 6 Virtual Hosts 73 6.1 Virtual Hosting . 73 7 Clustering 89 7.1 Resin Clustering . 89 8 Web Applications 109 8.1 An Overview of Web Applications . 109 9 Logging 137 9.1 Log . 137 10 Administration 163 10.1 Resin Administration . 163 1 CONTENTS 11 Deployment 177 11.1 Packaging/Deployment . 177 12 Proxy Caching 181 12.1 Server Caching . 181 13 Quercus 193 13.1 Quercus: PHP in Java . 193 14 Security 217 14.1 Resin Security . 217 15 Inversion of Control 271 15.1 Resin IoC . 271 15.2 Scheduled Task . 308 16 Amber 327 16.1 Amber . 327 17 Embedding Resin 355 17.1 Embedding Resin . 355 18 Filters 367 18.1 Filters . 367 19 BAM 379 19.1 BAM . 379 20 Comet 405 20.1 Comet/Server-Push Servlet . 405 21 Remoting 411 21.1 Resin Remoting . 411 21.2 Hessian . 417 22 Messaging 423 22.1 Resin Messaging . 423 23 JSF - Java Server Faces 435 23.1 JSF - Java Server Faces . 435 24 Configuration Tags 445 24.1 cluster: Cluster tag configuration . 445 24.1.1 <access-log> ......................... 445 24.1.2 <cache> ........................... 445 24.1.3 <cluster> ........................... 447 24.1.4 <cluster-default> ...................... 450 24.1.5 <connection-error-page> .................. 450 2 CONTENTS 24.1.6 <development-mode-error-page> .............. 451 24.1.7 <ear-default> ........................ 451 24.1.8 <error-page> ......................... 451 24.1.9 <host> ............................ 451 24.1.10 <host-default> ........................ 452 24.1.11 <host-deploy> ........................ 452 24.1.12 <ignore-client-disconnect> ................. 453 24.1.13 <invocation-cache-size> ................... 453 24.1.14 <invocation-cache-max-url-length> ............ 453 24.1.15 <persistent-store> ...................... 454 24.1.16 <ping> ............................ 457 24.1.17 Resource Tags . 459 24.1.18 <rewrite-dispatch> ..................... 459 24.1.19 <root-directory> ....................... 460 24.1.20 <server> ........................... 460 24.1.21 <server-default> ....................... 465 24.1.22 <server-header> ....................... 465 24.1.23 <session-cookie> ....................... 466 24.1.24 <session-sticky-disable> ................... 466 24.1.25 <session-url-prefix> ..................... 466 24.1.26 <ssl-session-cookie> ..................... 467 24.1.27 <url-character-encoding> .................. 467 24.1.28 <web-app-default> ..................... 467 24.2 database: Database tag configuration . 468 24.2.1 <connection-wait-time> ................... 468 24.2.2 <close-dangling-connections> ................ 468 24.2.3 <driver> ........................... 468 24.2.4 <database> .......................... 469 24.2.5 <max-active-time> ..................... 470 24.2.6 <max-close-statements> ................... 470 24.2.7 <max-connections> ..................... 470 24.2.8 <max-create-connections> ................. 471 24.2.9 <max-idle-time> ....................... 471 24.2.10 <max-pool-time> ...................... 471 24.2.11 <password> ......................... 471 24.2.12 <ping> ............................ 471 24.2.13 <ping-table> ......................... 472 24.2.14 <ping-query> ........................ 472 24.2.15 <ping-interval> ....................... 472 24.2.16 <prepared-statement-cache-size> .............. 472 24.2.17 <save-allocation-stack-trace> ................ 472 24.2.18 <spy> ............................. 473 24.2.19 <transaction-timeout> ................... 473 24.3 <host>: Virtual Host configuration . 473 24.3.1 <access-log> ......................... 473 24.3.2 <ear-deploy> ......................... 476 3 CONTENTS 24.3.3 <error-page> ......................... 477 24.3.4 <host> ............................ 477 24.3.5 <host-alias> ......................... 479 24.3.6 <host-alias-regexp> ..................... 479 24.3.7 <host-default> ........................ 480 24.3.8 <host-deploy> ........................ 480 24.3.9 <host-name> ......................... 481 24.3.10 <redeploy-mode> ...................... 481 24.3.11 Resources . 482 24.3.12 <rewrite-dispatch> ..................... 482 24.3.13 <root-directory> ....................... 483 24.3.14 <secure-host-name> ..................... 483 24.3.15 <startup-mode> ....................... 483 24.3.16 <web-app> .......................... 484 24.3.17 <web-app-default> ..................... 486 24.3.18 <web-app-deploy> ...................... 486 24.4 port: Port tag configuration . 489 24.4.1 <accept-listen-backlog> ................... 489 24.4.2 <accept-thread-max> .................... 489 24.4.3 <accept-thread-min> .................... 489 24.4.4 <address> .......................... 489 24.4.5 <ca-certificate-file> (OpenSSL) . 490 24.4.6 <ca-certificate-path> (OpenSSL) . 490 24.4.7 <ca-revocation-file> (OpenSSL) . 490 24.4.8 <ca-revocation-path> (OpenSSL) . 490 24.4.9 <certificate-file> (OpenSSL) . 490 24.4.10 <certificate-chain-file> (OpenSSL) . 490 24.4.11 <certificate-key-file> (OpenSSL) . 490 24.4.12 <cipher-suite> (OpenSSL) . 490 24.4.13 <cluster-port> ........................ 491 24.4.14 <connection-max> ...................... 491 24.4.15 <http> ............................ 491 24.4.16 <jsse-ssl> ........................... 492 24.4.17 <keepalive-max> ....................... 493 24.4.18 <openssl> .......................... 493 24.4.19 <password> (OpenSSL) . 494 24.4.20 <port> ............................ 494 24.4.21 <protocol> .......................... 494 24.4.22 <protocol> (OpenSSL) . 495 24.4.23 <session-cache> (OpenSSL) . 495 24.4.24 <session-cache-timeout> (OpenSSL) . 495 24.4.25 <socket-timeout> ...................... 495 24.4.26 <tcp-no-delay> ........................ 495 24.4.27 <unclean-shutdown> (OpenSSL) . 495 24.4.28 <verify-client> (OpenSSL) . 496 24.4.29 <verify-depth> (OpenSSL) . 496 4 CONTENTS 24.5 Resources: class loaders, environment and IoC . 496 24.5.1 <authenticator> ....................... 496 24.5.2 <bam-service> ........................ 498 24.5.3 <bean> ............................ 499 24.5.4 <case-insensitive> ...................... 500 24.5.5 <character-encoding> .................... 501 24.5.6 <class-loader> ........................ 502 24.5.7 <compiling-loader> ..................... 503 24.5.8 <component> ........................ 504 24.5.9 <connection-factory> .................... 505 24.5.10 <database> .......................... 507 24.5.11 <database-default> ..................... 512 24.5.12 <dependency> ........................ 513 24.5.13 <dependency-check-interval> ................ 514 24.5.14 <ejb-message-bean> ..................... 514 24.5.15 <ejb-server> ......................... 516 24.5.16 <ejb-stateful-bean> ..................... 517 24.5.17 <ejb-stateless-bean> ..................... 518 24.5.18 <env-entry> ......................... 519 24.5.19 <fileset> ........................... 521 24.5.20 <javac> ............................ 523 24.5.21 <jms-connection-factory> .................. 525 24.5.22 <jms-queue> ......................... 525 24.5.23 <jms-topic> ......................... 526 24.5.24 <jndi-link> .......................... 527 24.5.25 <jpa-persistence> ...................... 529 24.5.26 <library-loader> ....................... 530 24.5.27 <log> ............................. 531 24.5.28 <logger> ........................... 533 24.5.29 <mail> ............................ 533 24.5.30 <reference> .......................... 535 24.5.31 <remote-client> ....................... 536 24.5.32 <resin:choose> ........................ 537 24.5.33 <resin:if> ........................... 541 24.5.34 <resin:import> ........................ 541 24.5.35 <resin:message> ....................... 544 24.5.36 <resin:set> .......................... 544 24.5.37 <resource> .......................... 545 24.5.38 <resource-adapter> ..................... 546 24.5.39 <resource-deploy> ...................... 547 24.5.40 <resource-ref> ........................ 548 24.5.41 <scheduled-task> ...................... 549 24.5.42 <servlet-hack> ........................ 551 24.5.43 <simple-loader> ....................... 552 24.5.44 <stderr-log> ......................... 553 24.5.45 <stdout-log> ......................... 554 5 CONTENTS 24.5.46 <system-property> ..................... 555 24.5.47 <temp-dir> .......................... 556 24.5.48 <tree-loader> ........................ 557 24.5.49 <work-dir> .......................... 558 24.6 URL rewrite tags . 559 24.6.1 <and> ............................ 559 24.6.2 auth-type . 559 24.6.3 cookie . 559 24.6.4 disable-at . 560 24.6.5 <dispatch> .......................... 560 24.6.6 dispatch-type . 561 24.6.7 enable-at . 561 24.6.8 enabled . 561 24.6.9 <forbidden> ......................... 561 24.6.10 <forward> .......................... 562 24.6.11 header . 563 24.6.12 <gone> ............................ 563 24.6.13 <import> ........................... 564 24.6.14 <load-balance> ....................... 566 24.6.15 locale . 568 24.6.16 local-port . 568 24.6.17 method . 569 24.6.18 <match> ........................... 569 24.6.19 <moved-permanently> ................... 570 24.6.20 name . 571 24.6.21 <not> ............................. 571 24.6.22 <or> ............................. 571 24.6.23 <not-found> ........................
Recommended publications
  • Table of Contents
    TABLE OF CONTENTS I. EXECUTIVE SUMMARY ...............................................................................................3 A. Recommendations ..............................................................................................................................................3 1. Future Governance board ................................................................................................................................3 2. Integration Models ..........................................................................................................................................3 3. CCIS and JIS Review by Infinity Software Development Inc. .......................................................................4 4. Catalog of Common Data Elements................................................................................................................4 5. Data Exchange Standards and Protocol...........................................................................................................4 6. Infrastructure and Network Standards and Protocol........................................................................................4 7. Security and Access Standards and Protocol...................................................................................................5 8. Unified Statute Table ......................................................................................................................................6 9. Minimum Data Elements for Policy Oversight ...............................................................................................6
    [Show full text]
  • PHP Programming Cookbook I
    PHP Programming Cookbook i PHP Programming Cookbook PHP Programming Cookbook ii Contents 1 PHP Tutorial for Beginners 1 1.1 Introduction......................................................1 1.1.1 Where is PHP used?.............................................1 1.1.2 Why PHP?..................................................2 1.2 XAMPP Setup....................................................3 1.3 PHP Language Basics.................................................5 1.3.1 Escaping to PHP...............................................5 1.3.2 Commenting PHP..............................................5 1.3.3 Hello World..................................................6 1.3.4 Variables in PHP...............................................6 1.3.5 Conditional Statements in PHP........................................7 1.3.6 Loops in PHP.................................................8 1.4 PHP Arrays...................................................... 10 1.5 PHP Functions.................................................... 12 1.6 Connecting to a Database............................................... 14 1.6.1 Connecting to MySQL Databases...................................... 14 1.6.2 Connecting to MySQLi Databases (Procedurial).............................. 14 1.6.3 Connecting to MySQLi databases (Object-Oriented)............................ 15 1.6.4 Connecting to PDO Databases........................................ 15 1.7 PHP Form Handling................................................. 15 1.8 PHP Include & Require Statements.........................................
    [Show full text]
  • Design Patterns in PHP and Laravel — Kelt Dockins Design Patterns in PHP and Laravel
    Design Patterns in PHP and Laravel — Kelt Dockins Design Patterns in PHP and Laravel Kelt Dockins [email protected] Design Patterns in PHP and Laravel Kelt Dockins Dolph, Arkansas USA ISBN-13 (pbk): 978-1-4842-2450-2 ISBN-13 (electronic): 978-1-4842-2451-9 DOI 10.1007/978-1-4842-2451-9 Library of Congress Control Number: 2016961807 Copyright © 2017 by Kelt Dockins This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made.
    [Show full text]
  • Vulnerable Web Application Framework
    University of Rhode Island DigitalCommons@URI Open Access Master's Theses 2015 Vulnerable Web Application Framework Nicholas J. Giannini University of Rhode Island, [email protected] Follow this and additional works at: https://digitalcommons.uri.edu/theses Recommended Citation Giannini, Nicholas J., "Vulnerable Web Application Framework" (2015). Open Access Master's Theses. Paper 629. https://digitalcommons.uri.edu/theses/629 This Thesis is brought to you for free and open access by DigitalCommons@URI. It has been accepted for inclusion in Open Access Master's Theses by an authorized administrator of DigitalCommons@URI. For more information, please contact [email protected]. VULNERABLE WEB APPLICATION FRAMEWORK BY NICHOLAS J. GIANNINI A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE AND STATISTICS UNIVERSITY OF RHODE ISLAND 2015 MASTER OF SCIENCE THESIS OF NICHOLAS GIANNINI APPROVED: Thesis Committee: Major Professor Victor Fay-Wolfe Lisa DiPippo Haibo He Nasser H. Zawia DEAN OF THE GRADUATE SCHOOL UNIVERSITY OF RHODE ISLAND 2015 ABSTRACT Utilizing intentionally vulnerable web applications to teach and practice cyber security principles and techniques provides a unique hands-on experience that is otherwise unobtainable without working in the real world. Creating such applications that emulate those of actual businesses and organizations without exposing actual businesses to inadvertent security risks can be a daunting task. To address these issues, this project has created Porous, an open source framework specifically for creating intentionally vulnerable web applications. The implementation of Porous offers a simplified approach to building realistic vulnerable web applications that may be tailored to the needs of specific cyber challenges or classroom exercises.
    [Show full text]
  • Revize Installation Guide
    INSTALLATION GUIDE © 2001-2003 Idetix Software Systems Revize Installation Guide TABLE OF CONTENTS Installation Guide ...........................................................1 Table of Contents ..........................................................2 1 Overview.................................................................5 1.1 Assumptions....................................................5 1.2 Typographic Conventions................................6 2 System Requirements ............................................7 2.1 Server Hardware Requirements......................7 2.2 Operating System Requirements ....................8 2.3 Database Requirements..................................9 2.4 Web Server Requirements ..............................9 2.5 Web Browser Requirements .........................10 3 Stand-Alone installation........................................11 3.1 System Requirements ...................................11 3.2 Installation Steps ...........................................11 © 2001-2003 Idetix Software Systems Page 2 Revize Installation Guide 4 Network Installation ............................................. 22 4.1 Windows NT 4.0 / 2000 ................................ 22 4.2 Redhat Linux / Solaris 8 (Sparc)................... 22 4.2.1 Redhat 6.2/Solaris 8 Installation (GUI).. 23 4.2.2 Solaris 8/Redhat 6.2 Console Installation 24 4.2.3 Redhat Linux 7.2 (and later) Installation 25 5 Installation Verification......................................... 27 5.1 Administration Center ..................................
    [Show full text]
  • Next Generation Web Scanning Presentation
    Next generation web scanning New Zealand: A case study First presented at KIWICON III 2009 By Andrew Horton aka urbanadventurer NZ Web Recon Goal: To scan all of New Zealand's web-space to see what's there. Requirements: – Targets – Scanning – Analysis Sounds easy, right? urbanadventurer (Andrew Horton) www.morningstarsecurity.com Targets urbanadventurer (Andrew Horton) www.morningstarsecurity.com Targets What does 'NZ web-space' mean? It could mean: •Geographically within NZ regardless of the TLD •The .nz TLD hosted anywhere •All of the above For this scan it means, IPs geographically within NZ urbanadventurer (Andrew Horton) www.morningstarsecurity.com Finding Targets We need creative methods to find targets urbanadventurer (Andrew Horton) www.morningstarsecurity.com DNS Zone Transfer urbanadventurer (Andrew Horton) www.morningstarsecurity.com Find IP addresses on IRC and by resolving lots of NZ websites 58.*.*.* 60.*.*.* 65.*.*.* 91.*.*.* 110.*.*.* 111.*.*.* 113.*.*.* 114.*.*.* 115.*.*.* 116.*.*.* 117.*.*.* 118.*.*.* 119.*.*.* 120.*.*.* 121.*.*.* 122.*.*.* 123.*.*.* 124.*.*.* 125.*.*.* 130.*.*.* 131.*.*.* 132.*.*.* 138.*.*.* 139.*.*.* 143.*.*.* 144.*.*.* 146.*.*.* 150.*.*.* 153.*.*.* 156.*.*.* 161.*.*.* 162.*.*.* 163.*.*.* 165.*.*.* 166.*.*.* 167.*.*.* 192.*.*.* 198.*.*.* 202.*.*.* 203.*.*.* 210.*.*.* 218.*.*.* 219.*.*.* 222.*.*.* 729,580,500 IPs. More than we want to try. urbanadventurer (Andrew Horton) www.morningstarsecurity.com IP address blocks in the IANA IPv4 Address Space Registry Prefix Designation Date Whois Status [1] -----
    [Show full text]
  • "Yii 2.0 Cookbook"
    Contents 0.1 Preface...............................1 1 Unnoticed basics3 2 Logging and error handling5 2.1 Logging: problems and solutions................5 3 Web essentials 11 3.1 URLs with variable number of parameters........... 11 3.2 Working with different response types............. 12 3.3 Managing cookies......................... 17 3.4 Handling incoming third party POST requests......... 19 4 SEO essentials 23 4.1 Enable pretty URLs....................... 23 4.2 Pagination pretty URLs..................... 24 4.3 Adding SEO tags......................... 25 4.4 Canonical URLs......................... 26 4.5 Using redirects.......................... 27 4.6 Using slugs............................ 28 4.7 Handling trailing slash in URLs................. 30 5 Forms 33 5.1 Using and customizing CAPTCHA............... 33 5.2 Working with ActiveForm via JavaScript............ 36 5.3 Uploading files.......................... 38 5.4 Custom validator for multiple attributes............ 41 6 Security 47 6.1 SQL injection........................... 47 6.2 XSS................................ 48 6.3 RBAC............................... 49 6.4 CSRF............................... 56 iii iv CONTENTS 7 Structuring and organizing code 59 7.1 Structure: backend and frontend via modules......... 59 7.2 Asset processing with Grunt................... 60 7.3 Using global functions...................... 64 7.4 Processing text.......................... 65 7.5 Implementing typed collections................. 66 7.6 MVC................................ 68 7.7 SOLID............................... 69 7.8 Dependencies........................... 70 8 View 73 8.1 Reusing views via partials.................... 73 8.2 Switching themes dynamically.................. 75 8.3 Post-processing response..................... 76 9 Models 77 10 Active Record 79 10.1 Single table inheritance..................... 79 11 i18n 83 11.1 Selecting application language.................. 83 11.2 Using IDs as translation source................. 87 12 Performance 89 12.1 Implementing backgroud tasks (cronjobs)..........
    [Show full text]
  • Cakephp Cookbook Documentation Release 4.X
    CakePHP Cookbook Documentation Release 4.x Cake Software Foundation Sep 25, 2021 Contents 1 CakePHP at a Glance 1 Conventions Over Configuration........................................1 The Model Layer................................................1 The View Layer.................................................2 The Controller Layer..............................................2 CakePHP Request Cycle............................................3 Just the Start...................................................4 Additional Reading...............................................4 2 Quick Start Guide 13 Content Management Tutorial......................................... 13 CMS Tutorial - Creating the Database..................................... 15 CMS Tutorial - Creating the Articles Controller................................ 19 3 4.0 Migration Guide 29 Deprecated Features Removed......................................... 29 Deprecations.................................................. 29 Breaking Changes................................................ 31 New Features.................................................. 37 4 Tutorials & Examples 41 Content Management Tutorial......................................... 41 CMS Tutorial - Creating the Database..................................... 43 CMS Tutorial - Creating the Articles Controller................................ 47 CMS Tutorial - Tags and Users......................................... 56 CMS Tutorial - Authentication......................................... 64 CMS Tutorial - Authorization.........................................
    [Show full text]
  • Virtual Wishlist
    Virtual Wishlist Figure 1: Welcome Page of the Virtual Wishlist Group project carried out by Josua Dietrich, Nils Braune and Tino Canziani created 2011 at D-ITET, ETH Zürich 21.12.2011 Contents 1 Introduction and Background 3 1.1 Idea . .3 1.2 Related Work . .3 1.3 Tools . .3 2 Concept 5 2.1 Core functions . .5 2.2 Website Layout . .5 2.3 Sessions & Proles . .7 3 Implementation 8 3.1 HTML/Login/Session (Welcome.html) . .8 3.2 MySQL server: creating a database . .9 3.3 setupConnection.php . 11 3.4 $.ajax(), getWishlists() .................. 12 3.5 Adding a prole picture . 14 4 Results and Future Steps 16 4.1 Results . 16 4.1.1 Welcome Page . 16 4.1.2 Prole Page . 16 4.1.3 my Wishes menu . 16 4.1.4 my Friends and Search Friends Menu . 16 4.1.5 Settings menu . 17 4.1.6 Friend Page . 17 4.1.7 Terms, Privacy, About, Help Page . 17 4.1.8 Process of fullling and getting wishes fullled . 17 4.1.9 Security . 17 4.2 Future steps . 18 A Server/PHP functions 20 B Screenshot of the prole page 21 C Setting up the Virtual Wishlist step by step 22 D Endnotes 23 1 Abstract In this group project we designed and implemented a virtual wish list as a social media service on the web. It enables its users to maintain a personal prole, create their own wish lists or opt to grant other friends their specic wishes. The use case of this virtual wish list will mostly tend to birthday and christmas events, social gatherings, leisure activities or work related events.
    [Show full text]
  • Web Development Frameworks Ruby on Rails VS Google Web Toolkit
    Bachelor thesis Web Development Frameworks Ruby on Rails VS Google Web Toolkit Author: Carlos Gallardo Adrián Extremera Supervisor: Welf Löwe Semester: Spring 2011 Course code: 2DV00E SE-391 82 Kalmar / SE-351 95 Växjö Tel +46 (0)772-28 80 00 [email protected] Lnu.se/dfm Abstract Web programming is getting more and more important every day and as a consequence, many new tools are created in order to help developers design and construct applications quicker, easier and better structured. Apart from different IDEs and Technologies, nowadays Web Frameworks are gaining popularity amongst users since they offer a large range of methods, classes, etc. that allow programmers to create and maintain solid Web systems. This research focuses on two different Web Frameworks: Ruby on Rails and Google Web Toolkit and within this document we will examine some of the most important differences between them during a Web development. Keywords web frameworks, Ruby, Rails, Model-View-Controller, web programming, Java, Google Web Toolkit, web development, code lines i List of Figures Figure 2.1. mraible - History of Web Frameworks....................................................4 Figure 2.2. Java BluePrints - MVC Pattern..............................................................6 Figure 2.3. Libros Web - MVC Architecture.............................................................7 Figure 2.4. Ruby on Rails - Logo.............................................................................8 Figure 2.5. Windaroo Consulting Inc - Ruby on Rails Structure.............................10
    [Show full text]
  • TRANSPORT LAYER SECURITY (TLS) Lokesh Phani Bodavula
    TRANSPORT LAYER SECURITY (TLS) Lokesh Phani Bodavula October 2015 Abstract 1 Introduction The security of Electronic commerce is completely in the hands of Cryptogra- phy. Most of the transactions through e-commerce sites, auction sites, on-line banking, stock trading and many more are exchanged over the network. SSL or TLS are the additional layers that are required in order to obtain authen- tication, privacy and integrity for all kinds of communication going through network. This paper focuses on the additional layer (TLS) which is responsi- ble for the whole communication. Transport Layer Security is a protocol that is responsible for offering privacy between the communicating applications and their users on Internet. TLS is inserted between the application layer and the network layer-where the session layer is in the OSI model TLS, however, requires a reliable transport channel-typically TCP. 2 History Instead of the end-to-end argument and the S-HTTP proposal the developers at Netscape Communications introduced an interesting secured connection concept of low-layer and high-layer security. For achieving this type of security there em- ployed a new intermediate layer between the transport layer and the application layer which is called as Secure Sockets Layer (SSL). SSL is the starting stage for the evolution of different transport layer security protocols. Technically SSL protocol is assigned to the transport layer because of its functionality is deeply inter-winded with the one of a transport layer protocol like TCP. Coming to history of Transport layer protocols as soon as the National Center for Super- computing Application (NCSA) released the first popular Web browser called Mosaic 1.0 in 1993, Netscape Communications started working on SSL protocol.
    [Show full text]
  • Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1)
    Page 1 of 9 Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1) Enhanced Virtual Hosting view online Overview This guide explains the usage of enhanced virtual hosting (EVH). This will help in enabling the virtual hosting on virtual service irrespective of SNI. Virtual service can be of two main types, namely, * Non-virtual hosting enabled virtual service * Virtual hosting enabled virtual service Non-Virtual Hosting enabled Virtual Service If you uncheck Virtual Hosting VS checkbox, in Virtual Service window, then that particular virtual service would be non- virtual hosting enabled virtual service. Virtual Hosting enabled Virtual Service SNI Virtual Hosting Virtual service have a configuration option to enable virtual hosting support. Enabling this option within a virtual service indicates the virtual service is a parent or child of another service, in a server name indication (SNI) deployment. Server Name Indication, or SNI, is a method of virtual hosting multiple domain names for an SSL enabled virtual IP. For more details on virtual hosting enabled virtual service, refer to Server Name Indication, Wildcard SNI Matching for Virtual Hosting user guides. Enhanced Virtual Hosting Virtual service have a configuration option to enable virtual hosting support. Enabling this option within a virtual service indicates the virtual service is a parent or child of another service. If the type of a virtual service is either parent or child, it is considered a virtual hosting enabled virtual service. Copyright © 2021 Avi Networks, Inc. Page 2 of 9 Enhanced Virtual Hosting Avi Networks — Technical Reference (20.1) The virtual service placement for EVH service follow the same conditions as SNI parent child.
    [Show full text]