Why is WPA2 still being used??

This a message I wrote recently in a forum that brought up my idea from a couple of years and every year I see new products/WIFI being released, but not changes so here it is again....and hopefully someone who works with the WIFI alliance can bring this to the table.
I think WPA 3 or 4 needs to come out...I have written on this in different areas and attempted to contact the Wifi Alliance (Austin Texas) with no luck because I can't afford a $15,000 membership... Also linked a stack exchange post I made talking about the SIMPLE change/additions and the post was deleted....SO here it goes
Current PSK formula is
DK = PBKDF2(HMAC−SHA1, passphrase, ssid, 4096, 256)
What this means is it uses HMAC-SHA1 with your passphrase/ssid, 4096 iterations, and produces a 256 bit key
So for the past 10+ years people have been able to create databases/rainbow tables, etc because your only solving for 1 piece of the formula.
First thing that needs to change is the number of iterations, 10+ years ago hardware could only bruteforce 100-300 passwords a second. The number of iterations needs to be increased in order to bring that change back in effect. Currently with GPU's this number reaches the 10's of thousands (actually more).
The next thing would be to change the salt to include the mac of the ***router or client/both so that each router brute forced would require starting from scratch
DK = PBKDF2(HMAC−SHA1, passphrase, ssid + Router mac***, 4096000, 256) *iterations are 100 times current..not sure if hardware can take this, again it would have to be tested, the number shown is just for illustration purposes.
Next we need to take the HUMAN element out of the Equation.
1) a password of 12 or more needs to be implemented
2) if not already present in the password entered, the router would then GIVE the user a couple of permutations that include at least TWO upper/TWO lower/TWO special characters/TWO numbers and make them choose one. In other words the router would not allow anything less than a more "sophisticated" password.
Another option would be that after the first formula is used and the client connects successfully the FIRST TIME.... the router then "remembers" that mac address and now the formula changes to
DK = PBKDF2(HMAC−SHA1, passphrase, ssid + Router Mac, RND, 256)
Where RND is a random number generated by the router 6-8 digits long for the iterations. Unless a "Hacker" just happened to catch the first handshake and then ran through the set standard 500,000 iteration formula and happened to find the password (being able to decrypt the aes256 exchange of RND), from that point on the formula would be different. This could be the same for the router, or even more secure, for each client connected. So the router would keep a table of Client macs and RND so when the client says "HELLO I want to connect" it would be done using the RND value/formula. If someone was to find how the RND value was saved on the client (physical access to the client) then it would be different for each client. After X many days/X many hours this could be re-set/established again using the first formula and AES256 as an option.
So this is just some Ideas, with todays technology/hardware it shouldn't be that hard to do. WPA2 is old and getting easier to crack. Many wordlists have been created that easily go up to 10 if not more... "hackers" have been generating wordlists for YEARS. Making the first formula iterations high enough to slow down the brute force attack, and then making the hacker start from scratch with the combination of SSID + Router Mac, PLUS add the fact that after the client is first set up/connected to that router making the number of iterations RND (6-8+ digits)........this just makes it VERY VERY VERY difficult for a wardriver to accomplish finding the password.
One last thing to add would be to encrypt the DEAUTH packets.. Currently a "wardriver" can deauth the client and when the connection is regained it captures the 4 way handshake...prevent this and again it would be a little more difficult to capture that handshake. Also even if it is captured and its not the FIRST time... it would be a RND value so the "wardriver" wouldn't know where to start, but from scratch. This time with every combination of a 12 character min password, and for each RND 6-8* digit of iterations...
Honestly with something like this implemented (which isn't too far fetched, especially the simple formula change adding router mac***), and possibly the Random Iterations, wardriving would almost become worthless. Currently a wardriver knows the formula and nothing changes so there is SOME hope that the user used a really easy password, but with the option above even trying the correct password wouldn't work (unless was the first time or a re-authentication time). Even still it would be with a new formula that uses 12 min password/more iterations.
Hopefully I don't get trashed on this post, all criticisms/ideas/opinions are open.

thank you for your reply..
Hopefully it will change... back when this idea was originally thought of (when attempting to vb.net a PSK just for fun), I took into account costs...thats why the changes are pretty simple depending on hardware.  I remember when WPA, WPA 2 first came out it, it was just the cost of a router/new devices (back then lots of money, now routers/hardware is less expensive), depending on the current hardware a simple coding could just be updated (firmware)...example the new WIFI Passport system could be implemented on older hardware once tested/certified...at least according to WiFi alliance.
The other reason for the change again is the 10+ years of using the same system, i understand it "secure" but with all the computer breaches/security breaches this is just one method to prevent it.  I would definitely upgrade if a newer secure encryption came out...however this really isn't a new encryption, same scheme, basically same formula with a different implementation, which is why I think a simple upgrade would be great...
so a real world example of the implementation..
Client says "Hello"
Router uses DK1 = PBKDF2(HMAC−SHA1, passphrase, ssid + Router Mac, 24576, 256) to encrypt a random number between 15000-30000 and uses it to send its message AES(16745 & message authentication, DK1).
Client uses DK1 to reverse it to get 16745/message authentication and now uses DK2 = PBKDF2(HMAC−SHA1, passphrase, ssid + Router Mac, 16745, 256) to AES(original message, DK2) in order to show the router that I have the original key/and have recived the new iterations.
The router now stores 16745 and the client stores 16745 from that point on when wanting to communicate with that mac address.  makes it totally random except the first formula.
anyway just a concept.. thanks for your reply again.

Similar Messages

  • Is code still being used

    We have a large database, with many stored procedures, packages, functions and views that have built up over such a long time that we no longer know which code is still being used.
    Is there any way of finding out if a procedure/package/view/function has recently been executed.
    The only way I could think of was to take away the privileges and see who shouts... but that's probably not the best idea.

    Find objects, that don't have other objects dependant on themDepending on how the database is used, this may or may not prove anything. Procedures that are called from SQL*Plus sessions or DBMS_JOBS wouldn't show up. Searching the text of your front-end application may be a chore as well.
    A similar caveat apllies to trawling the cache. You'd want to make sure you didn't drop procedures that are run once a month or once a quarter or once a year.
    In the absence of adequate documentation the only sound approach is to keep everything. Punishing your users - by removing their rights - for the incompetence of the support team is so wrong.
    Why do you want to get id of somne procedures? They are not like tables, they don't take up much space. Procedures that are not run don't have reported bugs, so they don't generate much additional work. The only issue I can see is when you have to do global work e.g. upgrading the database or applying some generic fix. That is additional work, I agree, but that's the price you have to pay for not having properly documented applications.
    We all do this (or rather don't do this) and we all end up having to do work we suspect is unnecessary but can't prove that's the case. Do we learn? Heck, no.
    Good luck, APC

  • Within a web browser I click on a Covert PDF to MS Word, and successfully log-in with my Creative Cloud account .. so why am I still being asked to subscribe to Adobe Export PDF???

    Within a web browser I click on a Covert PDF to MS Word, and successfully log-in with my Creative Cloud account .. so why am I still being asked to subscribe to Adobe Export PDF???

    Hi dwhitnackphilly,
    The ExportPDF subscription isn't included in a Creative Cloud membership. However, if you have Acrobat as part of your subscription, you can use it to save directly to Word format (as well as a host of other formats). In Acrobat, just choose Save as Other...
    Please let us know if you have additional questions.
    Best,
    Sara

  • Error: The logical component X is still being used

    Hi,
    In Transaction SMSY, i want to delete a Logical Component. So, pre-condition is to check whether it is mapped to any Projects/Solutions. By right-clicking - Where used list , i have seen that it is mapped to a Project. So, in transaction SOLAR_PROJECT_ADMIN under tab System Landscape, i tried to delete the Logical Component but receiving the error message - The logical component X is still being used.
    Please help.
    Many Thanks,
    Mohan.

    Hello Mohan,
    You can also solve this by using the "Replace Logical Component" button in the system landscape within SOLAR_PROJECT_ADMIN.
    Thus you can replace all the occurances of the Z_ logical component by e.g. an existing standard SAP logical component.
    Afterwards you will be able to delete your Z_ logical component in SMSY (or in LMDB from 7.1 SP9 on).
    Best regards,
    Peter

  • Theft of phone and skype account still being used!...

    Hi.
    My wifes phone was stolen on th 19th of April during a camping trip.
    We reported the theft to the police.
    I have gone onto skype today, and the account is still being used.
    My wife said the only two places skype is installed is on her stolen phone and on her laptop, which isn't on at the moment as she is at work!!
    So whoever stole the phone is using the skype account right now!!!
    I need to find out the IP addresses that have been logged against the user [Redacted for privacy] since the 19th of April.
    I have tried to email support, but the contact form keeps giving an error, so please someone respond as soon as possible so I can relay info to the police please!!
    Kind regards,
    Glenn.

    Hi, Glenn, and welcome to the Community,
    These two commands, when entered into a chat window, may prove helpful:
    /remotelogout
    Sign out all other instances except the current one. This will also stop push notifications on all other instances.
    /showplaces
    Lists other instances where this Skype name is currently signed in.
    Important: Always make sure you are using the latest version of Skype. Some of these commands may not be supported in older versions.
    Here is a link to the original FAQ article:
    https://support.skype.com/en/faq/FA10042/what-are-chat-commands-and-roles?
    If your wife still has access to her account, she should consider signing on to her account details and removing any saved payment methods on file. 
    Skype does not release IP addresses except upon request from law enforcement agencies, who can file to receive this information via official channels.
    Regards,
    Elaine
    Was your question answered? Please click on the Accept as a Solution link so everyone can quickly find what works! Like a post or want to say, "Thank You" - ?? Click on the Kudos button!
    Trustworthy information: Brian Krebs: 3 Basic Rules for Online Safety and Consumer Reports: Guide to Internet Security Online Safety Tip: Change your passwords often!

  • HT4203 I have turned off the Data use on the I-phone 4s but am told by AT&T that data is still being used for applications.  How is this possible. Can someone help me understand this.  Thanks.

    I have turned off the Data use on the I-phone 4s but am told by AT&T that data is still being used for applications.  How is this possible. Can someone help me understand this. 

    I assume you are including the STIX font as part of your epub files?     
    Perhaps the folks who do this blog might be able to help -- they have done some work with font embedding:
    http://www.pigsgourdsandwikis.com/2011/04/embedding-fonts-in-epub-ipad-iphone-an d.html

  • HT1391 Can a stolen Iphone be traced by using the serial number to see if it is still being used. I have had the handset locked but have been told it can be over ridden.

    Can a stolen Iphone be traced by using the serial number to see if it is still being used. I have had the handset locked but have been told it can be over ridden.

    No.
    Contact yoru carrier. They may be able to blacklist it.

  • TS3772 On my iphone 5 i have two iTunes ID, one is no longer in use, but keeps asking for a password which I no longer have, whilst the other is still being used. How do I delete the old ID?

    On my iphone 5 i have two iTunes ID, one is no longer in use, but keeps asking for a password which I no longer have, whilst the other is still being used. How do I delete the old ID?

    Hello steveod2
    The main thing to do is to sign out all services on your iPhone, like iCloud, iTunes & App Store, iMessage and FaceTIme. Check out the article below for more information.
    iOS 7: If you're asked for the password to your previous Apple ID when signing out of iCloud
    http://support.apple.com/kb/ts5223
    Regards,
    -Norm G.

  • Why is 6GB ram being used with barely anything going on?

    So I'm looking at my Activity Monitor for the first time since I got the late 2013 Macbook Pro.
    To my amazement it's showing 6GB being used or 75% of my 8GB?!
    But looking at the activity monitor is showing that the highest ram use is Kernel Monitor at 600MB.
    After that it's com.apple.ServiceAgent @ 170MB and Google Chrome at 140MB.
    Than there are like 15 "Google Chrome Helpers" ranging from like 100-30MB. What in the world is "Google Chrome Helpers" this seems like some kind of operating system bug to me...
    I have about 13 Google Chrome tabs open but even more Helpers than tabs in the Activity Monitor...
    There's no way a small Google Chrome session should take up well over 1gb ram?!
    Even still, if I estimate all the Memory usage displayed in my Activity monitor it should be low 2GB, defenitely less than 3GB.
    So why is it saying 6GB in use? The MAC OS couldn't possibly be 3 GB right???
    This is crazy and I've noticed my MAC is pretty sluggish today while I'm trying to work. What in the world is going on here?
    Can I manually cancel all those " Google Chrome Helpers" for starters?
    On Windows 7 I could have literally 100's of internet tabs open and see less than 6GB ram useage no joke! Need help here please.

    That all sounds great in theory but I'm looking at my Activity Monitor right now and it says:
    Compressed: 0 bytes
    So it sounds like I'm not getting any of the benefits with the compression from that article?
    My other stats are looking like:
    App Memory: 3.41 GB
    File Cache : 2.05 GB
    Wired Memory: ~1GB
    My memory pressure looks about 20% at least even with 6.65 GB active.
    Is there a reason why I have no compressed memory? It sounds like that was the whole point of this system but it's not doing anything for me? Or does that only kick in once you use up all 8GB?
    I'm not sure about all this. I've been a PC guy all my life and overall I'm EXTREMELY satisfied with both my macbook pro and the iPad air I just got. But I got this stuff so I can develope games for iOS using Unity 3D, and I need a laptop. So I didn't make this purchase for the heck of it, this is business to me. And recently I've noticed that Unity 3D and Monodevelop are becoming increasingly sluggish. Because I'm having some lag problems even with just using Monodevelop which is a simple IDE for my C# work, I have been trying to figure out what's the problem here.
    Apparently lots of others are having trouble with Mac OS Maverick when using Unity 3D. I'm just hoping this stuff gets sorted out and doing my best to see if I can improve the performance.
    Are there any guides for optimizing a macbook pro for faster performance? It's not acceptable for me to have lag while I work. Right now I'm trying to work only on the macbook pro so I get used to it and can hopefully work nearly as fast as the PC even without using duel monitors so I can work on the go.
    Just such a big difference from PC where I am quite profficient. On MAC I have no clue what I can do to fix lag.
    Is there a way to modify what progams launch on start up similar to on PC typing "msconfig" in start bar allows you to edit this kind of thing?
    Unity 3D is a pretty big deal for iOS and MAC development so hopefully if it is just some kind of code problems with Unity and Maverick this get's sorted out ASAP. Until then I'm doing my best to see if there's any thing I can do on my end.
    The huge RAM usage was a big red flag to me on first glance, but I guess you guys are saying this is fine. Still seems strange to me how much RAM is being used, on PC I can't imagine ever needing more than 8GB Ram, on Mac it seems like this could be pretty easy to accomplish, which explains why there is 16GB RAM models which to me seemed excessive.
    So I'm guessing it's normal to have that many "Google Chrome Helpers" active at once?

  • Why is index not being used?

    I need some help in trying to work out why an index isn't being used. I hope someone here can help.
    Table definition for ACT_TOTALS includes
    STARTTIME TIMESTAMP(6)
    There is an index on to_char(starttime, 'YYYY-MM-DD HH24')
    There is a vew definition ACT_TOTALS_HOURLY2 which includes
    select to_char(starttime, 'YYYY-MM-DD HH24') STARTTIMSE
    from ACT_TOTALS
    group by to_char(starttime, 'YYYY-MM'DD HH24'), TRANSTYPE
    I have run a query
    select starttime from ACT_TOTALS_HOURLY2
    where starttime <= to_char(sysdate, 'YYYY-MM-DD HH24');
    The table access comes out as full despite there being > 2 million rows in the table.
    The predicate looks like
    TO_CHAR(INTERNAL_FUNCTION(''STARTTIME''), 'YYYY-MM-DD HH24')<= ..........
    I thinkg the INTERNAL_FUNCTION is an implicit cast from DATE to TIMESTAMP.
    Can anyone please throw any light on why the index on the table wouldn't be used in this case?
    Thanks in advance for any help.

    Can you supply a test case for that?
    This is what I have done to engeneer your case
    drop table t1;
    create table t1 (n1 number, d1 date, STARTTIME TIMESTAMP(6));
    insert into t1(n1,d1, starttime)  select rownum, trunc(sysdate) + rownum, sysdate
    from dual connect by level <= 2e6;
    create or replace view t1_v as select n1, d1, to_char(starttime, 'YYYY-MM-DD HH24') starttimse
    from t1;
    SQL> explain plan for
      2  select starttimse from t1_v
      3  where starttimse <= to_char(sysdate, 'YYYY-MM-DD HH24');
    Explained.
    SQL> select * from table(dbms_xplan.display);
    Plan hash value: 838529891
    | Id  | Operation         | Name | Rows  | Bytes | Cost (%CPU)| Time     |
    |   0 | SELECT STATEMENT  |      |   109K|  1394K|  2004  (14)| 00:00:12 |
    |*  1 |  TABLE ACCESS FULL| T1   |   109K|  1394K|  2004  (14)| 00:00:12 |
    Predicate Information (identified by operation id):
       1 - filter(TO_CHAR(INTERNAL_FUNCTION("STARTTIME"),'YYYY-MM-DD
                  HH24')<=TO_CHAR(SYSDATE@!,'YYYY-MM-DD HH24'))
    Note
       - dynamic sampling used for this statement
    SQL> create index t1_ind on t1 (to_char(starttime, 'YYYY-MM-DD HH24'));
    Index created.
    SQL> explain plan for
      2  select starttimse from t1_v
      3  where starttimse <= to_char(sysdate, 'YYYY-MM-DD HH24');
    Explained.
    SQL> select * from table(dbms_xplan.display);
    Plan hash value: 3884685049
    | Id  | Operation        | Name   | Rows  | Bytes | Cost (%CPU)| Time     |
    |   0 | SELECT STATEMENT |        |   109K|  1394K|    68   (2)| 00:00:01 |
    |*  1 |  INDEX RANGE SCAN| T1_IND |   109K|  1394K|    68   (2)| 00:00:01 |
    Predicate Information (identified by operation id):
       1 - access(TO_CHAR(INTERNAL_FUNCTION("STARTTIME"),'YYYY-MM-DD
                  HH24')<=TO_CHAR(SYSDATE@!,'YYYY-MM-DD HH24'))
    Note
       - dynamic sampling used for this statement
    The above selects are done against the view t1_v.
    While the following one is done against the table t1
    SQL> set autotrace traceonly explain
    SQL> select starttime from t1
      2  where starttime <= to_char(sysdate, 'YYYY-MM-DD HH24');
    Execution Plan
    Plan hash value: 838529891
    | Id  | Operation         | Name | Rows  | Bytes | Cost (%CPU)| Time     |
    |   0 | SELECT STATEMENT  |      | 29875 |   379K|  1790   (4)| 00:00:11 |
    |*  1 |  TABLE ACCESS FULL| T1   | 29875 |   379K|  1790   (4)| 00:00:11 |
    Predicate Information (identified by operation id):
       1 - filter("STARTTIME"<=TO_TIMESTAMP(TO_CHAR(SYSDATE@!,'YYYY-MM-DD
                  HH24')))
    If you can post a clear test case of your issue may be one of us can help you
    Best regards
    Mohamed Houri
    www.hourim.wordpress.com

  • Reintalled OS, but disk space is still being used from old files?

    I tried reinstalling the OS after my macbook would freeze when i tried to log in. I first tried to archive and install and then it said it couldn't complete that.I then put in the 2nd OS disc and it created a new user profile and my computer is working fine. The only thing is that a few alias are still being picked up from the old users and there is only 60 GB of space left on the hard drive. None of the information on the old user files is totally important so I can do without it, but I would like all my hard drive space back

    if you don't need the old user go to system preferences->accounts and delete the old user. also, check to see if you have a Previous System,s folder at the top level of the hard drive. delete that too and empty trash.

  • Why Isn't xmlindex being used in slow query on binary xml table eval?

    I am running a slow simple query on Oracle database server 11.2.0.1 that is not using an xmlindex. Instead, a full table scan against the eval binary xml table occurs. Here is the query:
    select -- /*+ NO_XMLINDEX_REWRITE no_parallel(eval)*/
          defid from eval,
          XMLTable(XMLNAMESPACES(DEFAULT 'http://www.cigna.com/acme/domains/eval/2010/03',
          'http://www.cigna.com/acme/domains/derived/fact/2010/03' AS "ns7"),
          '$doc/eval/derivedFacts/ns7:derivedFact' passing eval.object_value as "doc" columns defid varchar2(100) path 'ns7:defId'
           ) eval_xml
    where eval_xml.defid in ('59543','55208'); The predicate is not selective at all - the returned row count is the same as the table row count (325,550 xml documents in the eval table). When different values are used bringing the row count down to ~ 33%, the xmlindex still isn't used - as would be expected in a purely relational nonXML environment.
    My question is why would'nt the xmlindex be used in a fast full scan manner versus a full table scan traversing the xml in each eval table document record?
    Would a FFS hint be applicable to an xmlindex domain-type index?
    Here is the xmlindex definition:
    CREATE INDEX "EVAL_XMLINDEX_IX" ON "EVAL" (OBJECT_VALUE)
      INDEXTYPE IS "XDB"."XMLINDEX" PARAMETERS
      ('XMLTable eval_idx_tab XMLNamespaces(DEFAULT ''http://www.cigna.com/acme/domains/eval/2010/03'',
      ''http://www.cigna.com/acme/domains/derived/fact/2010/03'' AS "ns7"),''/eval''
           COLUMNS defId VARCHAR2(100) path ''/derivedFacts/ns7:derivedFact/ns7:defId''');Here is the eval table definition:
    CREATE
      TABLE "N98991"."EVAL" OF XMLTYPE
        CONSTRAINT "EVAL_ID_PK" PRIMARY KEY ("EVAL_ID") USING INDEX PCTFREE 10
        INITRANS 4 MAXTRANS 255 COMPUTE STATISTICS STORAGE(INITIAL 65536 NEXT
        1048576 MINEXTENTS 1 MAXEXTENTS 2147483645 PCTINCREASE 0 FREELISTS 1
        FREELIST GROUPS 1 BUFFER_POOL DEFAULT FLASH_CACHE DEFAULT CELL_FLASH_CACHE
        DEFAULT) TABLESPACE "ACME_DATA" ENABLE
      XMLTYPE STORE AS SECUREFILE BINARY XML
        TABLESPACE "ACME_DATA" ENABLE STORAGE IN ROW CHUNK 8192 CACHE NOCOMPRESS
        KEEP_DUPLICATES STORAGE(INITIAL 106496 NEXT 1048576 MINEXTENTS 1 MAXEXTENTS
        2147483645 PCTINCREASE 0 BUFFER_POOL DEFAULT FLASH_CACHE DEFAULT
        CELL_FLASH_CACHE DEFAULT)
      ALLOW NONSCHEMA ALLOW ANYSCHEMA VIRTUAL COLUMNS
        "EVAL_DT" AS (SYS_EXTRACT_UTC(CAST(TO_TIMESTAMP_TZ(SYS_XQ_UPKXML2SQL(
        SYS_XQEXVAL(XMLQUERY(
        'declare default element namespace "http://www.cigna.com/acme/domains/eval/2010/03"; (::)
    /eval/@eval_dt'
        PASSING BY VALUE SYS_MAKEXML(128,"XMLDATA") RETURNING CONTENT ),0,0,
        16777216,0),50,1,2),'SYYYY-MM-DD"T"HH24:MI:SS.FFTZH:TZM') AS TIMESTAMP
    WITH
      TIME ZONE))),
        "EVAL_CAT" AS (CAST(SYS_XQ_UPKXML2SQL(SYS_XQEXVAL(XMLQUERY(
        'declare default element namespace "http://www.cigna.com/acme/domains/eval/2010/03";/eval/@category'
        PASSING BY VALUE SYS_MAKEXML(128,"XMLDATA") RETURNING CONTENT ),0,0,
        16777216,0),50,1,2) AS VARCHAR2(50))),
        "ACME_MBR_ID" AS (CAST(SYS_XQ_UPKXML2SQL(SYS_XQEXVAL(XMLQUERY(
        'declare default element namespace "http://www.cigna.com/acme/domains/eval/2010/03";/eval/@acmeMemberId'
        PASSING BY VALUE SYS_MAKEXML(128,"XMLDATA") RETURNING CONTENT ),0,0,
        16777216,0),50,1,2) AS VARCHAR2(50))),
        "EVAL_ID" AS (CAST(SYS_XQ_UPKXML2SQL(SYS_XQEXVAL(XMLQUERY(
        'declare default element namespace "http://www.cigna.com/acme/domains/eval/2010/03";/eval/@evalId'
        PASSING BY VALUE SYS_MAKEXML(128,"XMLDATA") RETURNING CONTENT ),0,0,
        16777216,0),50,1,2) AS VARCHAR2(50)))
      PCTFREE 0 PCTUSED 80 INITRANS 4 MAXTRANS 255 NOCOMPRESS LOGGING STORAGE
        INITIAL 65536 NEXT 1048576 MINEXTENTS 1 MAXEXTENTS 2147483645 PCTINCREASE 0
        FREELISTS 1 FREELIST GROUPS 1 BUFFER_POOL DEFAULT FLASH_CACHE DEFAULT
        CELL_FLASH_CACHE DEFAULT
      TABLESPACE "ACME_DATA" ; Sample cleansed xml snippet:
    <?xml version = '1.0' encoding = 'UTF-8' standalone = 'yes'?><eval createdById="xxxx" hhhhMemberId="37e6f05a-88dc-41e9-a8df-2a2ac6d822c9" category="eeeeeeee" eval_dt="2012-02-11T23:47:02.645Z" evalId="12e007f5-b7c3-4da2-b8b8-4bf066675d1a" xmlns="http://www.xxxxx.com/vvvv/domains/eval/2010/03" xmlns:ns2="http://www.cigna.com/nnnn/domains/derived/fact/2010/03" xmlns:ns3="http://www.xxxxx.com/vvvv/domains/common/2010/03">
       <derivedFacts>
          <ns2:derivedFact>
             <ns2:defId>12345</ns2:defId>
             <ns2:defUrn>urn:mmmmrunner:Medical:Definition:DerivedFact:52657:1</ns2:defUrn>
             <ns2:factSource>tttt Member</ns2:factSource>
             <ns2:origInferred_dt>2012-02-11T23:47:02.645Z</ns2:origInferred_dt>
             <ns2:factValue>
                <ns2:type>boolean</ns2:type>
                <ns2:value>true</ns2:value>
             </ns2:factValue>
          </ns2:derivedFact>
          <ns2:derivedFact>
             <ns2:defId>52600</ns2:defId>
             <ns2:defUrn>urn:ddddrunner:Medical:Definition:DerivedFact:52600:2</ns2:defUrn>
             <ns2:factSource>cccc Member</ns2:factSource>
             <ns2:origInferred_dt>2012-02-11T23:47:02.645Z</ns2:origInferred_dt>
             <ns2:factValue>
                <ns2:type>string</ns2:type>
                <ns2:value>null</ns2:value>
             </ns2:factValue>
          </ns2:derivedFact>
          <ns2:derivedFact>
             <ns2:defId>59543</ns2:defId>
             <ns2:defUrn>urn:ddddunner:Medical:Definition:DerivedFact:52599:1</ns2:defUrn>
             <ns2:factSource>dddd Member</ns2:factSource>
             <ns2:origInferred_dt>2012-02-11T23:47:02.645Z</ns2:origInferred_dt>
             <ns2:factValue>
                <ns2:type>string</ns2:type>
                <ns2:value>INT</ns2:value>
             </ns2:factValue>
          </ns2:derivedFact>
                With the repeating <ns2:derivedFact> element continuing under the <derivedFacts>The Oracle XML DB Developer's Guide 11g Release 2 isn't helping much...
    Any assitance much appreciated.
    Regards,
    Rick Blanchard

    odie 63, et. al.;
    Attached is the reworked select query, xmlindex, and 2ndary indexes. Note: though namespaces are used; we're not registering any schema defns.
    SELECT /*+ NO_USE_HASH(eval) +/ --/*+ NO_QUERY_REWRITE no_parallel(eval)*/
    eval_xml.eval_catt, df.defid FROM eval,
    --df.defid FROM eval,
    XMLTable(XMLNamespaces( DEFAULT 'http://www.cigna.com/acme/domains/eval/2010/03',
                            'http://www.cigna.com/acme/domains/derived/fact/2010/03' AS "ns7" ),
            '/eval' passing eval.object_value
             COLUMNS
               eval_catt VARCHAR2(50) path '@category',
               derivedFact XMLTYPE path '/derivedFacts/ns7:derivedFact')eval_xml,
    XMLTable(XMLNamespaces('http://www.cigna.com/acme/domains/derived/fact/2010/03' AS "ns7",
                              DEFAULT 'http://www.cigna.com/acme/domains/eval/2010/03'),
            '/ns7:derivedFact' passing eval_xml.derivedFact
             COLUMNS
               defid VARCHAR2(100) path 'ns7:defId') df
    WHERE df.defid IN ('52657','52599') AND eval_xml.eval_catt LIKE 'external';
    --where df.defid = '52657';
    SELECT /*+ NO_USE_HASH(eval +/ --/*+ NO_QUERY_REWRITE no_parallel(eval)*/
    eval_xml.eval_catt, df.defid FROM eval,
    --df.defid FROM eval,
    XMLTable(XMLNamespaces( DEFAULT 'http://www.cigna.com/acme/domains/eval/2010/03',
                            'http://www.cigna.com/acme/domains/derived/fact/2010/03' AS "ns7" ),
            '/eval' passing eval.object_value
             COLUMNS
               eval_catt VARCHAR2(50) path '@category',
               derivedFact XMLTYPE path '/derivedFacts/ns7:derivedFact')eval_xml,
    XMLTable(XMLNamespaces('http://www.cigna.com/acme/domains/derived/fact/2010/03' AS "ns7",
                              DEFAULT 'http://www.cigna.com/acme/domains/eval/2010/03'),
            '/ns7:derivedFact' passing eval_xml.derivedFact
             COLUMNS
               defid VARCHAR2(100) path 'ns7:defId') df
    WHERE df.defid IN ('52657','52599') AND eval_xml.eval_catt LIKE 'external';
    --where df.defid = '52657'; create index defid_2ndary_ix on eval_idx_tab_II (defID);
         eval_catt VARCHAR2(50) path ''@CATEGORY''');
    create index eval_catt_2ndary_ix on eval_idx_tab_I (eval_catt);The xmlindex is getting picked up but a couple of problesm:
    1. In the developemnt environment, no xml source records for defid '52657' or '52599' are being displayed - just an empty output set occurs; in spite of these values being present and stored in the source xml.
    This really has me stumped, as can query the eval table to see the actual xml defid vaues '52657' and '52599' exist. Something appears off with the query - which didn't return records even before the corrresponding xml index was created.
    2. The query still performs slowly, in spite of using the xmlindex. The execution plan shows a full table scan of eval occurring whether or not a HASH JOIN or MERGE JOIN (gets used in place of the HASH JOIN when the NO_USE_HASH(eval) int is used.
    3. Single column 2ndary indexes created respectively for eval_catt and defid are not used in the execution plan - which may be expected upon further consideration.
    In the process of running stats at this moment, to see if performance improves....
    At this point, really after why item '1.' is occurring?
    Edited by: RickBlanchardSRSCigna on Apr 16, 2012 1:33 PM

  • Ram still being used after quitting

    hi, I know Mavericks handles Ram in a more effective way but why is it that I have programmes still running in the activity Monitor even though I have quit them?

    If an applications appears in the Activity Monitor then it is still running. This would indicate one of two things: 1) the program isn't responding. Usually programs that have stopped responding will have a message next to their name indicating that and/or appear in red text. 2) You closed all the windows of the program which, in Windows, would quit the application. But this is not typical Mac behavior. To quit a program on the Mac you must select Quit from the Application menu or use command Q.

  • Memory still being used but no songs playlists being shown

    I went to charge my I-pod, using the adapter, and when I went back later to start playing songs, it showed that all the songs were gone (or not being shown) and no playlists!
    But the weird thing is, my I-pod is still using the same amount of memory. I did the manual reset and still it's the same!
    Anyone can explain this or help me out?
    Cheers!

    First thing to check is if the songs show up when you connect your iPod to you computer and open iTunes.
    If they do not, you will need to Restore your iPod using the iPod Updater. NOTE: this WILL ERASE all music on your iPod.
    The disappearance of your music is usually caused by corrupt iPod software. The restore will fix things.

  • I cancelled my creative cloud membership on the 29th of janurary but I've just been sent an invoice for the bill of this years payment. Luckily there isn't enough money in my bank account for it to go through. But why am I still being billed?

    I don't know why Im being billed for it when i spoke to the online service team he told me that i wouldn't be billed for this year and now they are trying to charge me for it. I'm a student and I don't have that kind of money to pay for it so I'm not keeping anything in my card account to make sure that it can't be taken out. How do I tell them again that I'm not paying for it anymore
    Seriously annoyed

    This is an open forum, not Adobe support... You need Adobe support to cancel a subscription
    -start here https://forums.adobe.com/thread/1703848
    -or by telephone http://helpx.adobe.com/x-productkb/global/phone-support-orders.html
    --and two links which may provide more details, if the above links don't help you
    -http://helpx.adobe.com/x-productkb/policy-pricing/return-cancel-or-change-order.html
    -http://helpx.adobe.com/x-productkb/policy-pricing/cancel-membership-subscription.html

Maybe you are looking for