How secure are the ISL/ISH handlers in WLE 5.0.1

Hi,
We are looking at the possbility of allowing clients to connect on to a
V5.0.1 ISL with no SSL or other form of encryption. The clients would be
restricted by firewalls to just these two ports. While we don't care if
they are able to mess up the WLE Domain - we don't want them being able to
get any other type of access to the machine over these ports.
Any advice/pointers on how we might evaluate this risk would be appreciated,
thanks
Mark

This question should really be posted in the
weblogic.developer.interest.weblogicenterprise.
There is the possibility that the clients could connect to any other
IIOP-based system since the
ISL communicates with IIOP. In addition, it is also possible for the
clients to connect to CORBA
objects that then do invocations to other things, such as Tuxedo
applications, other CORBA objects,
etc.
Better yet, if WLS is installed behind the firewall, it is possible for them
to get access to WLS since
it too is capable of communicating over IIOP.
Finally, your going to have to "poke a hole" in the firewall to allow IIOP
traffic through. So unless
your firewall is IIOP aware and will filter traffic to only allow IIOP
destine for the ISLs through, your
probably creating a huge security hole
Paul Patrick
"Mark O'Brien" <[email protected]> wrote in message
news:[email protected]..
>
Hi,
We are looking at the possbility of allowing clients to connect on to a
V5.0.1 ISL with no SSL or other form of encryption. The clients would be
restricted by firewalls to just these two ports. While we don't care if
they are able to mess up the WLE Domain - we don't want them being able to
get any other type of access to the machine over these ports.
Any advice/pointers on how we might evaluate this risk would beappreciated,
>
thanks
Mark

Similar Messages

  • How secure are the files I upload?

    Are the files I load into my adobe account for conversion kept confidential? Could anyone else not authorized by me access these files?

    Are the files I load into my adobe account for conversion kept confidential? Could anyone else not authorized by me access these files?

  • How secure are the documents that are uploaded via the form?

    I am looking to create a form for RFP use and have added a section that allows them to upload documents.  How is this information encrypted or secured?

    Hello,
    apparently, you are concerned that no one can execute a successful right-click, or is that a misunderstanding?
    If not, should we really do that? Thereover you will find a wonderful philosophical discussion at http://webhome.idirect.com/~bowers/copy/copy1.htm
    And by the way there is the misconception that we can protect our graphics, or, or ... With little effort interested people can get to their destination.
    Hans-Günter

  • How secure are the repos

    Please read post at following: http://bbs.archlinux.org/viewtopic.php?id=70556
    Thank You

    Cross posting is against the forum rules. Please continue in your other thread.

  • HT4865 How secure are my personal emails and chats using the iCloud if my daughter just synced all our family apple devices to the cloud?

    How secure are my personal emails and chats using the iCloud if my daughter just synced all our family apple devices to the cloud?

    Welcome to the Apple Community.
    http://support.apple.com/kb/HT4865

  • IPhone Security: How secure is the iPhone?

    We just purchased iPhones for our family. However, I have a question regarding cyber security on these devices.
    Specifically, we have the phones set up to access our MobileMe accounts, and thus the MobileMe password is part of our iPhones. This leads to two questions:
    1) If someone acquires our phones, can they easily reverse engineer the phone to determine our MobileMe passwords?
    2) When we use various free wireless services (for example, while travelling at airports), how secure is the password data as it is passed from our iPhones to MobileMe over the RF spectrum? Could someone easily “listen in” to the communication and sniff out the passwords?
    It’s not that crucial now since it is just our MobileMe account, but I would like to use my iPhone for work e-mail and am not sure if this is safe or not.
    In addition to these questions, any advice, comments, or other sources on iPhone security would be greatly appreciated.
    Thank you very much for sharing your expertise!!!

    CharPatton wrote:
    2) When we use various free wireless services (for example, while travelling at airports), how secure is the password data as it is passed from our iPhones to MobileMe over the RF spectrum? Could someone easily “listen in” to the communication and sniff out the passwords?
    It depends on what the website does, and the rules are the same as using a wifi laptop:
    A) If a site uses regular HTTP with no encryption, any text data can be intercepted.
    B) Using HTTPS encryption like banks do, data can be sniffed but cannot be read unless a sophisticated hacker can unencrypt the sniffed data.
    C) Using a secure VPN for your iPhone (like HotSpot Shield), you can encrypt traffic between the iPhone and the VPN service so that all your communications are secured regardless of what the website does.
    I don't have a MobileMe account, so I don't know whether they layer any encryption over the login, but if they're like many sites, they probably do. As for what happens after login, this article is not very encouraging if the info is still current. That is why I use a VPN.

  • I have lost my iPad. How secure are my data ?

    I have lost my iPad.
    Unfortunately I have not activated the Search my iPad function.
    The iPad is locked with the code.
    How secure are my data ? Is it possible, that someone get into my data ?

    Anything is possible, but having it locked is good. You need to change your Apple password. The finder may reset to factory settings which will delete all your data.
    These links may be helpful.
    How to Track and Report Stolen iPad
    http://www.ipadastic.com/tutorials/how-to-track-and-report-stolen-ipad
    Reporting a lost or stolen Apple product
    http://support.apple.com/kb/ht2526
    Report Stolen iPad Tips and iPad Theft Prevention
    http://www.stolen-property.com/report-stolen-ipad.php
    How to recover a lost or stolen iPad
    http://ipadhelp.com/ipad-help/how-to-recover-a-lost-or-stolen-ipad/
    How to Find a Stolen iPad
    http://www.ehow.com/how_7586429_stolen-ipad.html
    Apple Product Lost or Stolen
    http://sites.google.com/site/appleclubfhs/support/advice-and-articles/lost-or-st olen
    Oops! iForgot My New iPad On the Plane; Now What?
    http://online.wsj.com/article/SB10001424052702303459004577362194012634000.html
    If you don't know your lost/stolen iPad's serial number, use the instructions below. The S/N is also on the iPad's box.
    How to Find Your iPad Serial Number
    http://www.ipadastic.com/tutorials/how-to-find-your-ipad-serial-number
     Cheers, Tom

  • How secure is the DocumentRevisions-V100 data for versions?

    How secure is the DocumentRevisions-V100 data for versions? Im concerned that if I open and work on a Numbers or Pages document from an encrypted disk image, Versions would save an unencrypted version within the database, making the encryption useless. Does anyone know if this is a problem or not? If so, is it fixed with Mountain Lion?

    hnanji wrote:
    I do not need the precise location or address, but a general description of how the data is maintained would be helpful. Security is absolutely essential, hence the reason why I am asking. To assume it is simply secure because it's a product by Apple, is not only only ignorant but foolish. If you do not know the answer then no need to reply.
    Your question is just as foolish as your request to know details. You will not get them and that is the answer that I do know. You will not get ANY details, ever. When somebody says that "Apple knows details" -kind of funny to me, cause Apple does not exist in that sense - Apple is corporation and corporation uses people, so there are people who know answer to any question, they just will not disclose secure information. So anybody, even me or pvonk, for expample, can know, But people who does, will not release that info. My answer is not intended to help you, just to let you know that you will not get any info. Not foolish person would take a hint, you didn't.

  • How secure is the password manager?

    How secure is the password manager?
    Can someone hack into it and steal my password?

    You can protect stored password using master password. See:
    * https://support.mozilla.com/en-US/kb/Protecting%20stored%20passwords%20using%20a%20master%20password

  • Cl58: How Secure are passwords stored on Firefox

    Without divulging anything to sensitive. How protected are the passwords we have stored on firefox. Thanks!

    The names and passwords are encrypted by a Triple-DES key that is stored in key3.db and a master password adds an additional level to that encryption.
    If you do not use a master password then having access to key3.db and signons.sqlite is sufficient to have access to the encrypted names and passwords.
    So use a strong master password (e.g at least 12 characters) that can't be easily guessed or found via a dictionary lookup or a script then you should be safe.
    Make sure that you remember that master password or all passwords are lost.
    See http://en.wikipedia.org/wiki/Triple_DES - TripleDES (CBC mode)

  • How pervasive are the iPad 3's Wi-Fi problems?

    Obviously, a lot of people are having problems with iPad 3 Wi-Fi. But of course only a tiny fraction of iPad 3 users have ever reported such a difficulty.
    So before I buy an iPad myself, I'm wondering -- how widespread are the problems? There surely are more iPad users who don't see the problems than who do -- but are the ones with the problems a large minority? A small one? A tiny fraction?
    By the way, I'd only consider an LTE version. And I live in the United States.
    Thanks!

    I'm pretty new to Apple let alone the iPad, but I have not experienced any serious problems in the ~3 weeks I've used it. A few stutters and some slow connections, but not consistently. No worse than my Acer/Win 7 laptop. I would much rather have a hard wired ethernet connector than wifi most of the time, though. My cable sped is significantly aster than the wireless.
    I've only experienced minor issues, mostly with apps. So far I really like the iPad and might seriously consider a Mac laptop next.

  • How durable are the Apple EarPods?

    Hi,
    I was wondering how durable the apple EarPods are to being broken.
    When I. Say broken I mean how vulnerable are the speakers to being blown?
    I like my music loud and so not want to destroy these headphones.
    Thanks in advance,
    -Ebony

    they are more a product that they include to include it
    if they didn't make iphones they would not make the headsets
    and people without iphones never buy the headsets even though they works apart from the button and mic part
    read a review that said the new type was much better then the old type but still garbage if I agree I donno
    but still have my first ipod touch 1g headset and it will works

  • How strong are the iPhone 4's internals?

    I know how britle the glass is on the outside, but how strong are the indies due to drops, bumps, etc?

    If you mean from your carrier you call them. If you forgot your password, see here: http://support.apple.com/kb/HT1212

  • How Secure Are We?

    Hello there, Arch users.
    I'm a fairly secure user of Windows and Android operating systems. I've also recently wanted to further expand and harden my privacy and security out of a need, as I live under not-so-favorable conditions.
    I've switched my desktop OS to Linux less than a couple of months ago. Started with Linux Mint Debian Edition (a Debian "rolling release"). Was a fine learning experience and I've got to administer my home Linux box in a secure manner until it broke (nothing related to security, just that proprietary drivers broke over an update.. too lazy to fix it)
    Now I intend to install Arch after testing Antergos and getting to use the Arch environment. I'm interested in reading good tips on how to secure is the system and how to further increase security in terms of remote exploitation specifically. Should I depend on Arch as a daily *secure* driver for everyday needs? I need to address that firstly as it's the uncontrollable part; unlike human-infrastructure type of attacks. I did read the Security wiki, but I also need more tips from experience as what can be installed or what should be avoided.
    Some guidance questions:
    1- As this is a rolling release OS, is it more or less secure than long-support release systems?
    2- What specific tips can we use to further secure our systems?
    I'm currently using Antergos, but I intend to switch to full Arch install in about 2 weeks (will have free time by then). I like the Arch environment (and forums) and I'm interested in ways to further secure it.
    Also, a good tip would be like: you need to install ufw and gufw and run
    # sudo gufw
    and turn ufw on.
    3- How long, on average, does it usually take to patch vulnerabilities found in Linux, from your experience? i.e. Is it usually faster or slower than other distros? An educated guesstimate would work, as I don't expect to find standardized info.
    4- AUR! I need someone to go on all day about anything related to security about AUR. Awesome ArchWiki doesn't have much on this.
    For example:
    - When a package I installed is updated from vendors/authors, does my package pull from the source vendor and immediately update (most importantly, Google Chrome), or does my system have to wait for the package maintainer to actually update his work for yaourt to pull from? i.e. Does the system update packages as soon as the vendor updates them, or as soon as the maintainer updates them?
    - When I pacman -Syu, does this include updating AUR? Here
    5- What VPN do you guys use?
    # mod edit: less inflammatory title
    Last edited by jasonwryan (2015-01-28 20:22:08)

    Mars wrote:1- As this is a rolling release OS, is it more or less secure than long-support release systems?
    Two totally different things; "LTS" distributions aim to provide support to a generally "fixed" set of packages (ie, same major kernel, same major toolchain etc), usually back-porting security fixes to those packages where required. Rolling release aims to provide the latest packages of everything -- this can lead to a lot more breakages than an "LTS" distro if not managed properly. LTS is generally more forgiving of "lazy" management.
    As far a security goes, it's difficult to compare. LTS releases generally get security patches back-ported, but sometimes they may not, especially towards the end of the LTS life cycle, or if implementing the fix would significantly change expected behaviour of the software. On a Rolling Release, you'll get the latest which includes any security fixes, but also includes any NEW security issues (probably not even discovered yet) introduced in recent versions.
    Mars wrote:2- What specific tips can we use to further secure our systems?
    This is the same regardless of your distribution. The standard list applies: minimize your attack surface (use a firewall, disable services you don't need), use good passwords, enforce MAC instead of DAC (eg, SELinux or AppArmour).
    Mars wrote:3- How long, on average, does it usually take to patch vulnerabilities found in Linux, from your experience? i.e. Is it usually faster or slower than other distros? An educated guesstimate would work, as I don't expect to find standardized info.
    You say "in Linux" then "other distros" -- are you wanting to compare Linux to other operating systems, or Arch to other distributions? If it's the later, then Arch is generally quite on the ball. Looking at recent vulnerabilities:
    http://allanmcrae.com/2015/01/who-you-gonna-call/
    http://allanmcrae.com/2014/09/shellshoc … rch-linux/
    Mars wrote:- When a package I installed is updated from vendors/authors, does my package pull from the source vendor and immediately update (most importantly, Google Chrome), or does my system have to wait for the package maintainer to actually update his work for yaourt to pull from? i.e. Does the system update packages as soon as the vendor updates them, or as soon as the maintainer updates them?
    makepkg will do whatever the PKGBUILD tells it to do. If the PKGBUILD is for a specific version of a package (as is generally the case) then that is what it will build. You are free to download the PKGBUILD from the AUR and modify it yourself if it is not the version you want/latest version. This is fairly straightforward generally, and there is lots of information in the wiki, on man pages and generally around the web.
    The exception to this is git packages, which often pull the latest git tree before building, which means you'll *really* have the latest version, probably not even a version that has been released by the upstream developer.
    Mars wrote:- When I pacman -Syu, does this include updating AUR? Here
    No, read up on the wiki the difference between the official repos, the community repo and the AUR.
    Mars wrote:5- What VPN do you guys use?
    OpenVPN to my own VPS.

  • How secure are livecycle designer ES2 forms?

    When a form is created using livecycle ES2 - are the responses submitted over email then secure?
    Ie. when both submitted or attached (as required with yahoo & hotmail accounts)

    Does anyone have any tips on how to resolve this?  My LiveCycle form is a dynamic form.  It seems like livecycle Designer ES2 has corrupted it or designer ES2 has a bug that makes reader and acrobat print engine not recognize the pages.
    Any help would be great.
    Thanks,
    Josh

Maybe you are looking for

  • How to import a war file using JB_x

    Hi I need to move a few of *.war files from other IDE to JB_x, and further implement them (they are struts web-apps). I'm wondering how to import each of them (each war is a small project). I've tried extracting war, then creating new project to impo

  • Paste image from clipboard into image item in Forms10

    Hi all! procedure PASTE_REGION work in Forms6 for image item, but i can't paste in Forms10. This function is no longer available? Valeriy

  • HT1918 Trying to update my credit card information and getting message TRY AGAIN LATER....when later? I've been trying for 3 days!!!

    I haven't been able to update my card information. Everytime I click done I get a message to try again later...am I doing something wrong? If not when is later? I've been trying for 3 days. Later as in a week, a month a year?

  • All Adobe Products Render Crash!

    I have a problem with Adobe Media Encoder, After Effects, and Premiere Pro (All CS6) when rendering. I get around the halfway mark on any length of video (From 2 to 20 minutes I have tried) and it will crash, and present me with this error The detail

  • BM 3.9 Access Rules

    Hi!, Im having a problem with BM 3.9 access rules. When I create a Rule and then I try to modify the rule I only have a blank Screen and I couldn't modify the rules. and in Logger screen I see Device Choosen is null. Any Idea. I have BM 3.9 on Netwar