SSL certificates in the Oracle Database without surprisesNelson Calero
Presentation delivered on UKOUG conference in December 2019.
Abstract: Nowadays database installations are required to use secure connections to communicate with clients, from connecting to the database listener to interact with external services (for example to send emails from the database).
Also since a couple of years ago, it has been required to use stronger protocols like TLS 1.2 (SHA2 algorithm), which requires extra configuration in older database releases.
This presentation shows how SSL certificates work from a DBA perspective, which tools are available and examples of configuring and troubleshooting their usage from the Oracle database. It also explores the implications and how to implement TLS 1.2 and common errors found in real life usage.
Automate your oracle cloud infrastructure operations v2.0 - OOW19Nelson Calero
Updated version for Oracle Open World 2019 of the same presentation done at Collaborate 2019
Abstract:
Oracle Cloud provides APIs and command-line utilities for handling your infrastructure in the cloud without using the web console. In addition, there are orchestration tools such as Terraform for building, changing, and versioning your infrastructure, enabling automation and configuration management. This session introduces Oracle Cloud Infrastructure services and APIs through examples from a DBA perspective: looking to minimize manual interventions when creating instances and containers, deploying a cluster with the Terraform Kubernetes installer, and backing up your databases. This presentation is an updated version of last year’s, including Oracle Cloud Infrastructure new-generation services and tools.
Automate your Oracle Cloud Infrastructure operationNelson Calero
The Oracle Cloud provides APIs and CLI utilities to handle your infrastructure in the cloud without using the web console. In addition, there are orchestration tools such as Terraform to build, change and version your infrastructure.
This presentation introduces to the topic through examples, minimizing manual interventions: creating instances and containers, using the REST api and opc tool, deploying a cluster using the project terraform-kubernetes-installer, and backing up your databases.
Automate the operation of your Oracle Cloud infrastructure v2.0Nelson Calero
Presentation delivered in Collaborate 19 conference in April 2019 in San Antonio
Abstract: The Oracle Cloud provides APIs and command line utilities to handle your infrastructure in the cloud without using the web console. In addition, there are orchestration tools such as Terraform to build, change and version your infrastructure, allowing automation and configuration management.
This session introduces to OCI services and APIs through examples from a DBA perspective, looking to minimize manual interventions when creating instances and containers, deploying a cluster using the project terraform-kubernetes-installer, and backing up your databases.
This is an updated version of a similar session a did last year, now focused on OCI new generation services and tools.
OpenStack is an open source cloud computing platform that provides infrastructure as a service. It consists of interrelated components that control hardware resources like processing, storage, and networking. The key components include Nova for compute, Glance for images, Cinder for block storage, Swift for object storage, Keystone for identity, Horizon for the dashboard, Ceilometer for metering, and Neutron for networking. OpenStack provides APIs and dashboards to allow users to provision resources on demand.
The document discusses OpenStack infrastructure architecture and compares OpenStack to VMware and KVM virtualization platforms. It outlines the logical and physical architecture of OpenStack, including the roles of key components like Nova, Swift, Glance, Cinder, Neutron and Keystone. It then compares the architectures of KVM and VMware and analyzes some advantages of KVM like lower costs. Finally, it presents the physical architecture and deployment of an OpenStack system.
This document provides an overview of OpenStack, including its history and key components. OpenStack is an open-source cloud operating system that controls large pools of compute, storage, and networking resources throughout a datacenter. It is used by enterprises to automate resource allocation and enable self-service provisioning through web interfaces for administrators and users.
Mirantis OpenStack 5.0 brings together the convenience of Fuel with the latest release of OpenStack, Icehouse. This presentation shows what's new, and what you can expect.
SSL, more strictly called Transport Layer Security (TLS), is a means to encrypt data that is in flight between software components, whether within your data center or between that and your end users' devices. This prevents eavesdroppers seeing confidential information, such as credit card numbers or database passwords, and ensures that components are communicating with who they they think they are. So why isn't SSL/TLS used for all electronic communications? Firstly it is, almost by definition, "slightly tricky" to configure and errors are not terribly informative when things don't work (why would you help a hacker?!). Secondly there is a performance overhead for running TLS, although with modern hardware this is probably less of a concern than it used to be.
This session describes how to configure TLS at all layers within a Fusion Middleware stack - from the front-end Oracle HTTP Server, right through to communications with the database.
This platform was first given by Simon Haslam (eProseed UK) and Jacco Landlust (ING) at the OGh Fusion Middleware Experience event in February 2016.
OpenStack Administration by Mobarak Hossain Group Organizer BangladeshMobarak Hossain
This document provides an overview of an OpenStack training organized by Mobarak Hossain. It includes details about Mobarak Hossain's background and experience working for various companies in software and telecom. It also provides a brief history of cloud computing and OpenStack, describing some of the major OpenStack services and concepts. The document concludes with information about hands-on sessions for installing and using OpenStack.
[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...DevDay Da Nang
OpenStack is an open source cloud computing platform providing infrastructure as a service (IaaS). The presentation will encapsulate the contents of OpenStack, amplified by practical demo and simple but effective guidelines to access OpenStack.
———
Speaker: Chi Le – Head of Infrastructure System at Da Nang ICT Infrastructure Development Center
Oracle has joined Kubernetes to allow applications and infrastructure to be deployed as containers across virtual machines and servers. Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. Oracle supports Kubernetes in various ways including certifying WebLogic and Docker, providing an Oracle Kubernetes Engine (OKE) service on Oracle Cloud Infrastructure (OCI), and developing tools like the WebLogic Kubernetes Operator.
Quick overview of Openstack architectureToni Ramirez
The document provides an overview of OpenStack, including:
- OpenStack is an open source cloud computing platform consisting of interrelated components that provide infrastructure as a service.
- The major components are Nova (compute), Glance (image), Swift (object storage), Cinder (block storage), Quantum (networking), Keystone (identity), and Horizon (dashboard).
- Each component has multiple sub-components that work together to provide services like compute, storage, networking, and identity/access management.
Open stack architecture overview-meetup-6-6_2013Mirantis
This document provides an overview of OpenStack architecture and components. It discusses the goals of OpenStack, including understanding its purpose, ecosystem, definition, history, and projects. It describes the logical architecture and components of OpenStack like Nova, Glance, Swift, Cinder, Quantum, Keystone, and Horizon. It explains how a virtual machine provisioning request flows through different OpenStack components.
OpenStack is an open source cloud computing platform that allows users to build private and public clouds. It provides infrastructure as a service (IaaS) and allows users to provision compute, storage, and networking resources on demand in a self-service manner. The document discusses the history and components of OpenStack, including Nova (compute), Swift (object storage), Cinder (block storage), Keystone (identity), Glance (image service), and others. It also covers OpenStack deployment models, supported hypervisors and images, and how to easily install OpenStack using PackStack.
CIS 2015- Building IAM for OpenStack- Steve MartinelliCloudIDSummit
The document discusses identity and access management (IAM) in OpenStack, focusing on the Keystone service. It provides an overview of Keystone and describes how it handles authentication, authorization, and identity management. It also discusses the different identity sources that Keystone supports, such as SQL, LDAP, and multiple backends. Authentication methods covered include password, token, and federated identity. Large scale deployments of Keystone are also described.
This document provides an overview of a training course on using the OpenStack cloud computing platform. The course covers topics such as virtualization, OpenStack architecture, installation and configuration of key OpenStack services like Nova, Glance, Neutron, and Horizon. It is divided into 18 modules that teach concepts like the OpenStack infrastructure, deployment architectures, configuration of database, message broker and identity services, and hands-on use of the Horizon dashboard to launch instances. The course aims to help students implement both Red Hat OpenStack and self-deployed OpenStack platforms.
Apache Knox is a reverse proxy and gateway for Hadoop clusters that provides proxying, authentication, and authorization services. It simplifies access to Hadoop resources by encapsulating Kerberos authentication and providing a single access point. Knox also enables centralized control, auditing, and integration with enterprise identity systems. It protects against several common web security vulnerabilities and threats.
Deep Dive into Keystone Tokens and Lessons LearnedPriti Desai
Keystone supports four different types of tokens, UUID, PKI, PKIZ, and Fernet. Let’s take a deep dive into:
Understanding token formats
Pros and Cons of each format in Production
Performance across multiple data centers
Token revocation workflow for each of the formats
Horizon usage of the different token types
We previously deployed UUID and PKI in Production and are now moving towards the latest format, Fernet. We would like to share our lessons learned with different formats and help you decide on which format is suitable for your cloud.
Openstack architecture for the enterprise (Openstack Ireland Meet-up)Keith Tobin
Synchronous
Replication
This document discusses OpenStack architecture for the enterprise. It describes using Crowbar to easily deploy OpenStack on Dell servers and networking equipment. Key aspects covered include using RabbitMQ clusters with mirrored queues for high availability, deploying Neutron on separate networking nodes, and using a Percona MySQL cluster to provide synchronous replication, data consistency, parallel applying and atomic node provisioning. The goal is an OpenStack architecture that is highly available, reliable, and can recover automatically from faults.
There are a variety of options for standing up an OpenStack private cloud platform. In this webinar, we will discuss existing design patterns for deploying OpenStack and their relative strengths and weaknesses.
Architecture Openstack for the EnterpriseKeith Tobin
1) The document discusses Dell's OpenStack architecture for enterprises, with Keith Tobin and Greg Jacobs presenting on their experience with OpenStack and Dell solutions.
2) It outlines the design goals of meeting enterprise performance expectations while providing high availability, reliability, and automatic recovery from failures.
3) The solution stack presented includes Dell servers, networking, and storage as well as OpenStack, SUSE Linux, Crowbar, Neutron, Ceph, RabbitMQ, and Percona for deployment, networking, storage, messaging, and database services.
The document provides information about installing and configuring OpenStack including:
1) It describes the hardware, software and networking requirements for the control and compute nodes when installing OpenStack.
2) It explains the different deployment options for OpenStack including all-in-one, multiple control and compute nodes, and different options for separating services.
3) It provides steps for installing OpenStack using Packstack, including generating SSH keys, editing the answer file and starting the deployment.
4) It gives an overview of the message broker services used by OpenStack and describes how to configure RabbitMQ or Qpid as the message broker.
This document provides an introduction to OpenStack, including:
- What OpenStack is and its key architectural components like Nova, Swift, Glance, Neutron, Cinder, and Horizon.
- OpenStack's upstream development process and largest contributors.
- Red Hat's involvement in OpenStack including the RDO community distribution and Red Hat Enterprise Linux OpenStack Platform.
- Examples of OpenStack deployments at large scale like CERN and its use cases for both traditional and cloud native workloads.
Deep Dive: OpenStack Summit (Red Hat Summit 2014)Stephen Gordon
This deck begins with a high-level overview of where OpenStack Compute (Nova) fits into the overall OpenStack architecture, as demonstrated in Red Hat Enterprise Linux OpenStack Platform. Before illustrating how OpenStack Compute interacts with other OpenStack components.
The session will also provide a grounding in some common Compute terminology and a deep-dive look into key areas of OpenStack Compute, including the:
Compute APIs.
Compute Scheduler.
Compute Conductor.
Compute Service.
Compute Instance lifecycle.
Intertwined with the architectural information are details on horizontally scaling and dividing compute resources as well as customization of the Compute scheduler. You’ll also learn valuable insights into key OpenStack Compute features present in OpenStack Icehouse.
In the Juno summit, Symantec presented it's perspective on securing Keystone. Security is really a mindset and process. We proposed a layered security approach starting with the process for securing Keystone architecture, followed by securing the environment where Keystone is deployed and configured. Since then we have been implementing those security measures in our production environment. In this talk, we will discuss exactly how we have made our Keystone deployment secure and what we have learnt along the way.
This document provides an overview of PL/SQL subprograms, including anonymous blocks, stored PL/SQL units like procedures and functions, and PL/SQL packages. It defines each component and provides examples. Anonymous blocks allow executing PL/SQL code without a name. Stored procedures and functions can be invoked by many users. Packages organize related objects and allow overloading subprograms. The document demonstrates package specifications that declare objects and package bodies that define objects and private components.
Oracle Berkeley DB is Oracle's open source, embeddable database designed for devices, appliances and applications. It provides low latency and high throughput storage with reliability and scalability. Berkeley DB 11gR2 offers the performance and features of a key-value store with the transactional capabilities of SQLite in a small footprint package requiring no administration. Customers across various industries have adopted Berkeley DB for its benefits over flat files such as better performance, reliability and reduced development costs.
Mirantis OpenStack 5.0 brings together the convenience of Fuel with the latest release of OpenStack, Icehouse. This presentation shows what's new, and what you can expect.
SSL, more strictly called Transport Layer Security (TLS), is a means to encrypt data that is in flight between software components, whether within your data center or between that and your end users' devices. This prevents eavesdroppers seeing confidential information, such as credit card numbers or database passwords, and ensures that components are communicating with who they they think they are. So why isn't SSL/TLS used for all electronic communications? Firstly it is, almost by definition, "slightly tricky" to configure and errors are not terribly informative when things don't work (why would you help a hacker?!). Secondly there is a performance overhead for running TLS, although with modern hardware this is probably less of a concern than it used to be.
This session describes how to configure TLS at all layers within a Fusion Middleware stack - from the front-end Oracle HTTP Server, right through to communications with the database.
This platform was first given by Simon Haslam (eProseed UK) and Jacco Landlust (ING) at the OGh Fusion Middleware Experience event in February 2016.
OpenStack Administration by Mobarak Hossain Group Organizer BangladeshMobarak Hossain
This document provides an overview of an OpenStack training organized by Mobarak Hossain. It includes details about Mobarak Hossain's background and experience working for various companies in software and telecom. It also provides a brief history of cloud computing and OpenStack, describing some of the major OpenStack services and concepts. The document concludes with information about hands-on sessions for installing and using OpenStack.
[DevDay 2016] OpenStack and approaches for new users - Speaker: Chi Le – Head...DevDay Da Nang
OpenStack is an open source cloud computing platform providing infrastructure as a service (IaaS). The presentation will encapsulate the contents of OpenStack, amplified by practical demo and simple but effective guidelines to access OpenStack.
———
Speaker: Chi Le – Head of Infrastructure System at Da Nang ICT Infrastructure Development Center
Oracle has joined Kubernetes to allow applications and infrastructure to be deployed as containers across virtual machines and servers. Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. Oracle supports Kubernetes in various ways including certifying WebLogic and Docker, providing an Oracle Kubernetes Engine (OKE) service on Oracle Cloud Infrastructure (OCI), and developing tools like the WebLogic Kubernetes Operator.
Quick overview of Openstack architectureToni Ramirez
The document provides an overview of OpenStack, including:
- OpenStack is an open source cloud computing platform consisting of interrelated components that provide infrastructure as a service.
- The major components are Nova (compute), Glance (image), Swift (object storage), Cinder (block storage), Quantum (networking), Keystone (identity), and Horizon (dashboard).
- Each component has multiple sub-components that work together to provide services like compute, storage, networking, and identity/access management.
Open stack architecture overview-meetup-6-6_2013Mirantis
This document provides an overview of OpenStack architecture and components. It discusses the goals of OpenStack, including understanding its purpose, ecosystem, definition, history, and projects. It describes the logical architecture and components of OpenStack like Nova, Glance, Swift, Cinder, Quantum, Keystone, and Horizon. It explains how a virtual machine provisioning request flows through different OpenStack components.
OpenStack is an open source cloud computing platform that allows users to build private and public clouds. It provides infrastructure as a service (IaaS) and allows users to provision compute, storage, and networking resources on demand in a self-service manner. The document discusses the history and components of OpenStack, including Nova (compute), Swift (object storage), Cinder (block storage), Keystone (identity), Glance (image service), and others. It also covers OpenStack deployment models, supported hypervisors and images, and how to easily install OpenStack using PackStack.
CIS 2015- Building IAM for OpenStack- Steve MartinelliCloudIDSummit
The document discusses identity and access management (IAM) in OpenStack, focusing on the Keystone service. It provides an overview of Keystone and describes how it handles authentication, authorization, and identity management. It also discusses the different identity sources that Keystone supports, such as SQL, LDAP, and multiple backends. Authentication methods covered include password, token, and federated identity. Large scale deployments of Keystone are also described.
This document provides an overview of a training course on using the OpenStack cloud computing platform. The course covers topics such as virtualization, OpenStack architecture, installation and configuration of key OpenStack services like Nova, Glance, Neutron, and Horizon. It is divided into 18 modules that teach concepts like the OpenStack infrastructure, deployment architectures, configuration of database, message broker and identity services, and hands-on use of the Horizon dashboard to launch instances. The course aims to help students implement both Red Hat OpenStack and self-deployed OpenStack platforms.
Apache Knox is a reverse proxy and gateway for Hadoop clusters that provides proxying, authentication, and authorization services. It simplifies access to Hadoop resources by encapsulating Kerberos authentication and providing a single access point. Knox also enables centralized control, auditing, and integration with enterprise identity systems. It protects against several common web security vulnerabilities and threats.
Deep Dive into Keystone Tokens and Lessons LearnedPriti Desai
Keystone supports four different types of tokens, UUID, PKI, PKIZ, and Fernet. Let’s take a deep dive into:
Understanding token formats
Pros and Cons of each format in Production
Performance across multiple data centers
Token revocation workflow for each of the formats
Horizon usage of the different token types
We previously deployed UUID and PKI in Production and are now moving towards the latest format, Fernet. We would like to share our lessons learned with different formats and help you decide on which format is suitable for your cloud.
Openstack architecture for the enterprise (Openstack Ireland Meet-up)Keith Tobin
Synchronous
Replication
This document discusses OpenStack architecture for the enterprise. It describes using Crowbar to easily deploy OpenStack on Dell servers and networking equipment. Key aspects covered include using RabbitMQ clusters with mirrored queues for high availability, deploying Neutron on separate networking nodes, and using a Percona MySQL cluster to provide synchronous replication, data consistency, parallel applying and atomic node provisioning. The goal is an OpenStack architecture that is highly available, reliable, and can recover automatically from faults.
There are a variety of options for standing up an OpenStack private cloud platform. In this webinar, we will discuss existing design patterns for deploying OpenStack and their relative strengths and weaknesses.
Architecture Openstack for the EnterpriseKeith Tobin
1) The document discusses Dell's OpenStack architecture for enterprises, with Keith Tobin and Greg Jacobs presenting on their experience with OpenStack and Dell solutions.
2) It outlines the design goals of meeting enterprise performance expectations while providing high availability, reliability, and automatic recovery from failures.
3) The solution stack presented includes Dell servers, networking, and storage as well as OpenStack, SUSE Linux, Crowbar, Neutron, Ceph, RabbitMQ, and Percona for deployment, networking, storage, messaging, and database services.
The document provides information about installing and configuring OpenStack including:
1) It describes the hardware, software and networking requirements for the control and compute nodes when installing OpenStack.
2) It explains the different deployment options for OpenStack including all-in-one, multiple control and compute nodes, and different options for separating services.
3) It provides steps for installing OpenStack using Packstack, including generating SSH keys, editing the answer file and starting the deployment.
4) It gives an overview of the message broker services used by OpenStack and describes how to configure RabbitMQ or Qpid as the message broker.
This document provides an introduction to OpenStack, including:
- What OpenStack is and its key architectural components like Nova, Swift, Glance, Neutron, Cinder, and Horizon.
- OpenStack's upstream development process and largest contributors.
- Red Hat's involvement in OpenStack including the RDO community distribution and Red Hat Enterprise Linux OpenStack Platform.
- Examples of OpenStack deployments at large scale like CERN and its use cases for both traditional and cloud native workloads.
Deep Dive: OpenStack Summit (Red Hat Summit 2014)Stephen Gordon
This deck begins with a high-level overview of where OpenStack Compute (Nova) fits into the overall OpenStack architecture, as demonstrated in Red Hat Enterprise Linux OpenStack Platform. Before illustrating how OpenStack Compute interacts with other OpenStack components.
The session will also provide a grounding in some common Compute terminology and a deep-dive look into key areas of OpenStack Compute, including the:
Compute APIs.
Compute Scheduler.
Compute Conductor.
Compute Service.
Compute Instance lifecycle.
Intertwined with the architectural information are details on horizontally scaling and dividing compute resources as well as customization of the Compute scheduler. You’ll also learn valuable insights into key OpenStack Compute features present in OpenStack Icehouse.
In the Juno summit, Symantec presented it's perspective on securing Keystone. Security is really a mindset and process. We proposed a layered security approach starting with the process for securing Keystone architecture, followed by securing the environment where Keystone is deployed and configured. Since then we have been implementing those security measures in our production environment. In this talk, we will discuss exactly how we have made our Keystone deployment secure and what we have learnt along the way.
This document provides an overview of PL/SQL subprograms, including anonymous blocks, stored PL/SQL units like procedures and functions, and PL/SQL packages. It defines each component and provides examples. Anonymous blocks allow executing PL/SQL code without a name. Stored procedures and functions can be invoked by many users. Packages organize related objects and allow overloading subprograms. The document demonstrates package specifications that declare objects and package bodies that define objects and private components.
Oracle Berkeley DB is Oracle's open source, embeddable database designed for devices, appliances and applications. It provides low latency and high throughput storage with reliability and scalability. Berkeley DB 11gR2 offers the performance and features of a key-value store with the transactional capabilities of SQLite in a small footprint package requiring no administration. Customers across various industries have adopted Berkeley DB for its benefits over flat files such as better performance, reliability and reduced development costs.
Webinář "Konsolidace Oracle DB na systémech s procesory M7, včetně migrace z konkurenčních serverových platforem"
Prezentuje Josef Šlahůnek, Oracle
9.3.2016
Auditing security of Oracle DB (Karel Miko)DCIT, a.s.
The document discusses auditing security of Oracle databases. It divides the audit into four technical phases:
1) Auditing the operating system level, including checking permissions on the Oracle home directory and verifying the OS account used for Oracle has appropriate privileges.
2) Auditing the Oracle RDBMS level, including validating the Oracle version and installed patches.
3) Auditing Oracle database instances, including verifying database options and privileges granted to users and roles.
4) Auditing related processes, such as the Oracle listener and associated configuration files.
http://www.opitz-consulting.com
In der Oracle Database 12c Release 1 gibt es neue Features im Bereich SQL Tuning. Ein Beispiel sind "Adaptive Plans", wo sich der Ausführungsplan noch zur Ausführungszeit aufgrund der tatsächlichen Datenmenge ändern kann.
In seinem Vortrag beim DOAG Regio Treffen NRW zum T hema Datenbank stellte unser Project Manager Dr. ANdreas Wagener einige der neuen Features vor, teilweise auch mit Live Demos.
Oracle SQL Performance Tuning and Optimization v26 chapter 1Kevin Meade
The document is a book about Oracle SQL performance tuning and optimization. It discusses foundational concepts for writing efficient SQL queries such as data modeling best practices, indexing strategies, and query tuning techniques. Specific topics covered include the filtered rows percentage method for determining join order, ways to use a query execution plan, creating indexes that optimize query performance, join types and hints to influence the query optimizer. The book provides examples and scripts to help readers understand and apply the concepts.
This document discusses Oracle database performance tuning. It covers identifying common Oracle performance issues such as CPU bottlenecks, memory issues, and inefficient SQL statements. It also outlines the Oracle performance tuning method and tools like the Automatic Database Diagnostic Monitor (ADDM) and performance page in Oracle Enterprise Manager. These tools help administrators monitor performance, identify bottlenecks, implement ADDM recommendations, and tune SQL statements reactively when issues arise.
The document provides instructions for attending an Oracle Support Advisor Webcast on troubleshooting issues with TCPS configuration and communication on databases, including how to access the recording and ask questions. It lists two options for attending - listening through computer audio or calling in by phone. It also provides the webinar ID and dial-in details needed to join the teleconference.
Let's Encrypt is a free, automated, and open certificate authority that aims to reduce barriers to secure internet communication. It allows users to generate SSL/TLS certificates at no cost by automating the key generation, certificate signing request, and domain verification processes. Certificates issued by Let's Encrypt are generally supported by modern browsers and operating systems. The service uses the ACME protocol for domain verification and has rate limits of 100 domains per certificate and 500 registrations per IP every 3 hours to prevent abuse.
This session will provide a guide to Alfresco truststores and keystores. Several live examples will be shown, including the replacement of existing cryptographic stores or certificates. Additionally, a troubleshooting configuration guide for mTLS communication will be provided.
The Easiest Way to Configure Security for Clients AND Servers (Dani Traphagen...confluent
In this baller talk, we will be addressing the elephant in the room that no one ever wants to look at or talk about: security. We generally never want to talk about configuring security because if we do, we allocate risk of penetration by exposing ourselves to exploitation. However, this leads to a lot of confusion around proper Kafka security best practices and how to appropriately lock down a cluster when you are starting out. In this talk we will demystify the elephant in the room without deconstructing it limb by limb. We will give you a notion of how to configure the following for BOTH clients and servers: * TLS or Kerberos Authentication * Encrypt your network traffic via TLS * Perform authorization via access control lists (ACLs) We will also demonstrate the above with a GitHub repo you can try out for yourself. Lastly, we will present a reference implementation of oauth if that suits your fancy. All in all you should walk away with a pretty decent understanding of the necessary aspects required for a secure Kafka environment.
This document discusses secure connections in Java using SSL/TLS. It provides information on key concepts like keystores, certificates, and truststores. It also demonstrates how to set up a basic client-server application with mutual authentication using self-signed certificates and keytool to generate and manage the certificates. Troubleshooting tips are provided for common exceptions encountered.
WebLogic in Practice: SSL ConfigurationSimon Haslam
The document provides an overview of SSL configuration in Oracle WebLogic Server. It discusses key SSL concepts like key pairs, certificates, and certificate authorities. It describes how WebLogic uses Java keystores for identity and trust, and the tools like keytool and orapki that can be used to manage keys and certificates. The document also covers best practices for SSL configuration in WebLogic like always enabling hostname verification and not using demo certificates in production.
This document discusses SSL/TLS protocols and how to set up your own certificate authority (CA) or use Let's Encrypt for free SSL certificates.
It provides a brief history of SSL and TLS protocols, outlines the key differences between versions, and lists common TLS implementations like OpenSSL. It then explains how to set up your own CA by generating root and intermediate certificates and signing server/client certificates.
Finally, it introduces Let's Encrypt as a free and automated CA that aims to promote SSL security. It explains how Let's Encrypt validates domain ownership and issues certificates to ensure communications are private, integrity is maintained, and parties can be trusted.
The document describes the steps to set up an OpenVPN server with Easy-RSA on a Linux system. It involves:
1. Installing OpenVPN and Easy-RSA packages and configuring Easy-RSA parameters and keys like CA, server, client, DH.
2. Generating certificates and keys for the OpenVPN server and client.
3. Configuring the OpenVPN server file with settings for port, protocol, network, authentication and other parameters.
4. Enabling port forwarding, starting the OpenVPN service, and verifying logs as the service starts.
This document discusses security concepts like minimizing risk, managing vulnerabilities, and monitoring logs. It then focuses on OpenSSL and cryptography, explaining how to set up an OpenSSL certificate authority (CA) to generate and sign certificates. It covers generating keys, creating certificate signing requests, signing certificates, managing certificate revocation lists, and configuring applications to use the CRL for validation.
The document discusses SSL (Secure Sockets Layer) and TLS (Transport Layer Security). It provides an overview of SSL, including its history and evolution. It describes the SSL handshake protocol and components of SSL certificates such as subjects, issuers, and digital signatures. It also discusses SSL attacks like POODLE and Heartbleed and problems with certificate authorities.
honeyTLS - Profiling and Clustering Internet-wide SSL/TLS Scans with JA3Adel Karimi
Identifying groups of attackers with similar tools or behaviors is useful for profiling and discovering the connections between them. This talk will explore how I collect JA3, a SSL/TLS client fingerprint, to profile attackers and internet-wide SSL/TLS scans. The talk will provide some interesting observations and the first identified attempt to evade SSL/TLS client fingerprinting!
Alban Diquet, Data Theorem
Thomas Sileo, Data Theorem
Over the last two years, we've received and analyzed more than three million SSL validation failure reports from more than a thousand of iOS and Android apps available on the Stores, and used all around the world. From mobile banking to music apps, each report was triggered because an unknown or unexpected certificate was being served to the app, preventing it from establishing a secure connection to its server via SSL/TLS.
We've analyzed each of these reports to understand what caused the SSL connection to fail, and then grouped similar failures into various classes of SSL incidents. Throughout this presentation, we will describe the analysis we've made and present our findings.
First, we will provide a high-level overview of where, how, and why SSL incidents are occurring across the world for iOS and Android users, and describe the various classes of incidents we've detected. Some of these types of incidents, such as corporate devices performing traffic inspection, are well-known and understood, although we will provide new insights into how widespread they are.
Then, we will take a closer look at a few notable incidents we detected, which have been caused by unexpected, or even suspicious actors. We will describe our investigations and what we found.
Lastly, we will provide real-world solutions on how to protect apps against traffic interception and attacks, as a mobile developer.
This document discusses SSL certificates, including their purpose for server/client authentication and secure data transfer. It covers the process of requesting, signing, installing and verifying certificates from both Certificate Authorities (CAs) and self-signing. The different types of SSL certificates - DV, OV and EV - are explained along with OpenSSL tools, certificate structure, chain of trust, trust stores, certificate pinning and free certificate options like Let's Encrypt.
The document discusses certification authorities (CAs) and alternatives to the current CA model. It provides background on what a CA is and how the current system works. It then discusses recent security issues with CAs and the responses to those issues. Finally, it explores some potential alternatives and enhancements to CAs, including DANE, Certificate Transparency, CAA, and public key pinning. The presentation aims to provide context around CAs while also outlining new approaches that could further improve security and trust.
Training Slides: 302 - Securing Your Cluster With SSLContinuent
This document discusses securing a Tungsten cluster with SSL. It explains what SSL is and why it is used. It then covers deploying SSL for cluster communications and for the Tungsten connector. For the cluster, SSL is enabled in tungsten.ini and certificates are generated and distributed. For the connector in proxy mode, MySQL certificates must be imported into keystores and SSL configured from the connector to the database. SSL can also be configured from the application to the connector. Successful SSL encryption is verified using tcpdump and checking the Tungsten connection status. The next steps will cover the Tungsten dashboard.
If you think they are easy, you are (probably) doing them wrong. A presentation about issues with TLS and X.509 certificates for Tampere security people (TreSec, @TreSecCommunity) meetup on 21st of March 2018.
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...ScyllaDB
Scylla includes multiple features that collectively provide a robust security model. Most recently we announced support for encryption-at-rest in Scylla Enterprise. This enables you to lock-down your data even in multi-tenant and hybrid deployments of Scylla. Join Tzach and Dejan for an overview of security in Scylla and to see how you can approach it holistically using the array of Scylla capabilities. He will review Scylla Security features, from basic to more advanced, including:
Reducing your attack surface
Authorization & Authentication
Role-Based Access Control
Encryption at Transit
Encryption at Rest, in 2019.1.1 and beyond
LDAP authentication is a common requirement for any enterprise software. It gives users consistent login procedures across multiple components of the IT infrastructure, while centralizing the control of access rights. Scylla Enterprise now supports authentication via LDAP. We will look into how to configure Scylla Enterprise for LDAP interaction and how to fine-tune access control through it.
Shameful secrets of proprietary network protocolsSlawomir Jasek
There is a big bunch of tools offering HTTP/SSL traffic interception. However, when it comes to penetration tests of specialized embedded software or thick clients, we often encounter proprietary protocols with no documentation at all. Binary TCP connections, unlike anything, impossible to be adapted by a well-known local proxy. Without disassembling the protocol, pentesting the server backend is very limited. Though, based on our experience, it very often hides a shameful secret - completely unsecured mechanisms breaking all secure coding practices.
To demonstrate, we will show a few case-studies - most interesting examples from real-life industry software, which in our opinion are a quintessence of "security by obscurity". We will challenge the security of proprietary protocols in pull printing solutions, FOREX trading software, remote desktops and home automation technologies.
Oracle Cloud ERP - where is My Data?
All about Oracle integration products and Cloud ERP:
* What are the ways to deliver it - all 3 options and obvious choice for our project
- File Based Data Import
- Web Services
* Can I trust the ERP statuses?
- Custom reporting using BI Publisher
- Security implications
* Lessons learned
- What works out of the box (provision SOA CS and, patch it)
- Security challenges
Tēmas : Trace File analyzer, live demo.
Valoda: Latviešu
Ar katru jaunu versiju Oracle ģenerē vairāk un vairāk diagnostiskās informācijas un bieži ir grūti sekot, kur tiek ierakstīta atbilstoša informācija. Vēlāk arī parādās jautājums, kā šo visu uzkopt, lai visa pieejamā vieta neaizietu nevajadzīgām lietām. Parādīšu un pastāstīšu par savu pieredzi ar TFA rīku trace/log failu pavaldīšanā, konfigurēšanā, kā arī par citām tā iespējām un zemūdens akmeņiem.
Aleksejs Nemirovskis - Manage your data using oracle BDAAndrejs Vorobjovs
Manage Your Data, Using Oracle Big Data Appliance - Tips & Tricksngest, process and manage the data, using Oracle Big Data Appliance (end-to-end BigData solution from Oracle):
- Oracle BDA architecture and componets overview - Oracle platform, Cloudera CDH, Clodera Manager and specific Oracle components;
- Advantages and additional value of an Oracle BDA;
- Challenges, faced inside whole stack (BDA, Cloudera);
- Challenges, which came from original Hadoop EcoSystem;
- Customer case (anonymized): how to utilize a power of an Oracle BDA, including external Informatica Big Data Management tool.
in LATVIAN language: Viens no galvenajiem datubāzes administratora uzdevumiem ir veikt datubāzes backup un prast no tā atjaunot datubāzi. Mysql bezmaksas versija nepiedāvā datubāzes administratoram ļoti daudz izvēles. Sava prezentācija es pastāstīšu par šādiem rīkiem:
-- MySQLdump
-- Percona XtraBackup
-- Mysql enterprise backup (MEB)
--Un citiem rīkiem kas palīdz man veikt db backup
Latvian Oracle User Group (LVOUG) ir neatkarīga organizācija, kas apvieno Oracle lietotājus, profesionāļus un citus interesantus Latvijā. Tās mērķis ir veicināt informācijas, zināšanu un pieredzes apmaiņu starp grupas dalībniekiem, informēt par Oracle produktu uzlabojumiem un jauninājumiem kā arī nodrošināt atgriezenisko saiti ar Oracle.
Par grupas dalībnieku var kļūt jebkurš interesents.
Middleware upgrade to Oracle Fusion Middleware(FMW) 12c.Real Case stories. Andrejs Vorobjovs
Tēmas apraksts: Middleware atjaunināšana līdz FMW 12c. Reālu projektu pieredze. Salīdzinoši nesen tika publicēta Oracle FMW 12c produktu līnija. Šoreiz gribu padalīties ar atjaunināšanas līdz Oracle FWM 12c pieredzi. Pamatu pamati, zemūdens akmeņi un tehniskie triki, kas var palīdzēt jums ietaupīt laiku un var būt arī saglabāt nervus.
Тема (РУ): Обновление Middleware до FMW 12c. Опыт реальных проектов.Описание: Относительно недавно вышла в свет линейка продуктов Oracle FMW 12c. В этот раз я хочу поделиться своим опытом обновления до Oracle FWM 12c.
Прописные истины, подводные камни и технические хитрости, которые помогут сберечь ваше время и, возможно и нервы.
Description(ENG): Relatively recently Orcale FMW 12c product line has been published.Today I would like to share my experience of middleware upgrade to Oracle FWM 12c.
Basics, pitfalls and technical tricks, that can save your time and nerves, may be.
Mysql ir populārākā atvērta koda datubāze un tajā ir vairāk nekā 400 parametri, bet nepieciešams uzstādīt /izmainīt tikai dažus no tiem, lai jūs nesaskartos ar problēmām jau pirmajā dienā. Šajā prezentācijā stāstīšu par parametriem, kuri ietekme datu drošību, datu atjaunošanu un datu konsistenci.
Izmantojiet iespēju piedalīties plašākajā IT nozares konferencē Baltijā Riga Dev Day 2016, kas jau otro gadu no 2. līdz 4. martam norisināsies Rīgā.
Ko iegūsiet?
Praktiski pielietojamu informāciju par IT nozares aktuālākajām un jaunākajām tēmām – mobilo ierīču aplikāciju izstrādi, Java/JVM, JavaScript jaununiem, Oracle datu bāzes risinājumiem un modernākajām tehnoloģijām.
The document outlines the agenda for the LVOUG meetup #15 on January 21, 2016 in Riga. The agenda includes an update on Oracle User group news at 16:00, followed by presentations from Aleksandrs Asafovs of Lattelecom at 16:10 and Andrey Chervonets of SIA CoMinder at 17:15. There is also information provided on the upcoming Riga Dev Day conference from March 2-4, 2016 focusing on software development, as well as contact details for the LVOUG group.
OTN tour 2015 – это семинар с участием авторитетных международных спикеров, направленный на привлечение участников с целью обмена знаниями и опытом в области применения передовых технологий. Конференция прошла 27 ноября в конференц-зале ресторана Stargorod и стала первой из серии мероприятий такого рода.
The document appears to be a collection of quotes and reflections from a long distance run. It includes brief quotes attributed to Stephen Covey about beginning with the end in mind, and W.H. Murray's quote about how committing to a course of action allows providence to move in one's favor. The reflections discuss believing in oneself, deciding to act, not being afraid, the time it took to complete the run, and finding inspiration in helping others.
OTN tour 2015 benchmarking oracle io performance with Orion by Alex GorbachevAndrejs Vorobjovs
Every time Alex demonstrates charts he produces during IO benchmarks with ORION tool (Oracle I/O Numbers), he hears "Wow! How do you build these?" In this session Alex will teach how to benchmark your storage subsystem and capacity and how to stress test it to the limits. You will learn how easy it is to setup ORION benchmark and collect I/O performance characteristics of your platform and assess scalability of small random I/Os, impact of writes on I/Operformance, impact of different RAID levels, how backups can affect your OTLP traffic, performance of outer areas of disks vs inner areas, and compare SSD with HDD performance. ORION tests are very repeatable so it's a great measuring tool in your Measure, Analyze, Change, Measure cycle.
OTN tour 2015 Oracle Enterprise Manager 12c – Proof of ConceptAndrejs Vorobjovs
Why we are talking about this
How – minimal survival kit
Database provisioning:
Database provisioning
Pluggable database provisioning
Schema provisioning
Middleware provisioning:
New instance installation
Instance cloning
Integration provisioning
Restrictions
Conclusion
Q&A
Peteris Arajs
Technology Architecture Associate Manager at Accenture
More than 15 years experience in IT industry with main focus to:
- DB design, analysis, development and performance tuning
- Oracle eBusiness Suite
- Oracle Middleware
Also experienced in all stages of software development life cycle (SDLC) from business requirements and technical definitions to development, testing and production support.
Alex Nemirovskis
Technology Architecture Associate Manager at Accenture
More than 19 years experience in IT industry with main focus to:
- DB design, analysis, development and performance tuning
- DWH / ETL / BI / Analytics
- Oracle ADF
Also experienced in all stages of software development life cycle (SDLC) from business requirements and technical definitions to development, testing and production support.
This is an introduction to the modern cloud technology landscape and what it takes to migrate Oracle databases to the cloud and operate them there. The attendees will learn about cloud concepts and what are the various options of running databases in the cloud Infrastructure as a Service (IaaS) or Platform as a Service (PaaS).
This document summarizes an OTN TOUR 2015 event held on November 27th in Riga. The agenda included welcome and introductory remarks followed by 5 sessions on topics like AWR DB performance data mining, benchmarking Oracle database I/O performance, OEM 12c, implementing SSL between Oracle DB and clients, and cloud for Oracle databases. It also provided information on an upcoming UKOUG conference in Birmingham and the Riga Dev Day conference in March 2016 with speaker details. Contact information was given for the LVOUG user group.
How to Set warnings for invoicing specific customers in odooCeline George
Odoo 16 offers a powerful platform for managing sales documents and invoicing efficiently. One of its standout features is the ability to set warnings and block messages for specific customers during the invoicing process.
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...Celine George
Analytic accounts are used to track and manage financial transactions related to specific projects, departments, or business units. They provide detailed insights into costs and revenues at a granular level, independent of the main accounting system. This helps to better understand profitability, performance, and resource allocation, making it easier to make informed financial decisions and strategic planning.
A measles outbreak originating in West Texas has been linked to confirmed cases in New Mexico, with additional cases reported in Oklahoma and Kansas. The current case count is 817 from Texas, New Mexico, Oklahoma, and Kansas. 97 individuals have required hospitalization, and 3 deaths, 2 children in Texas and one adult in New Mexico. These fatalities mark the first measles-related deaths in the United States since 2015 and the first pediatric measles death since 2003.
The YSPH Virtual Medical Operations Center Briefs (VMOC) were created as a service-learning project by faculty and graduate students at the Yale School of Public Health in response to the 2010 Haiti Earthquake. Each year, the VMOC Briefs are produced by students enrolled in Environmental Health Science Course 581 - Public Health Emergencies: Disaster Planning and Response. These briefs compile diverse information sources – including status reports, maps, news articles, and web content– into a single, easily digestible document that can be widely shared and used interactively. Key features of this report include:
- Comprehensive Overview: Provides situation updates, maps, relevant news, and web resources.
- Accessibility: Designed for easy reading, wide distribution, and interactive use.
- Collaboration: The “unlocked" format enables other responders to share, copy, and adapt seamlessly. The students learn by doing, quickly discovering how and where to find critical information and presenting it in an easily understood manner.
CURRENT CASE COUNT: 817 (As of 05/3/2025)
• Texas: 688 (+20)(62% of these cases are in Gaines County).
• New Mexico: 67 (+1 )(92.4% of the cases are from Eddy County)
• Oklahoma: 16 (+1)
• Kansas: 46 (32% of the cases are from Gray County)
HOSPITALIZATIONS: 97 (+2)
• Texas: 89 (+2) - This is 13.02% of all TX cases.
• New Mexico: 7 - This is 10.6% of all NM cases.
• Kansas: 1 - This is 2.7% of all KS cases.
DEATHS: 3
• Texas: 2 – This is 0.31% of all cases
• New Mexico: 1 – This is 1.54% of all cases
US NATIONAL CASE COUNT: 967 (Confirmed and suspected):
INTERNATIONAL SPREAD (As of 4/2/2025)
• Mexico – 865 (+58)
‒Chihuahua, Mexico: 844 (+58) cases, 3 hospitalizations, 1 fatality
• Canada: 1531 (+270) (This reflects Ontario's Outbreak, which began 11/24)
‒Ontario, Canada – 1243 (+223) cases, 84 hospitalizations.
• Europe: 6,814
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...larencebapu132
This is short and accurate description of World war-1 (1914-18)
It can give you the perfect factual conceptual clarity on the great war
Regards Simanchala Sarab
Student of BABed(ITEP, Secondary stage)in History at Guru Nanak Dev University Amritsar Punjab 🙏🙏
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schoolsdogden2
Algebra 1 is often described as a “gateway” class, a pivotal moment that can shape the rest of a student’s K–12 education. Early access is key: successfully completing Algebra 1 in middle school allows students to complete advanced math and science coursework in high school, which research shows lead to higher wages and lower rates of unemployment in adulthood.
Learn how The Atlanta Public Schools is using their data to create a more equitable enrollment in middle school Algebra classes.
Odoo Inventory Rules and Routes v17 - Odoo SlidesCeline George
Odoo's inventory management system is highly flexible and powerful, allowing businesses to efficiently manage their stock operations through the use of Rules and Routes.
Title: A Quick and Illustrated Guide to APA Style Referencing (7th Edition)
This visual and beginner-friendly guide simplifies the APA referencing style (7th edition) for academic writing. Designed especially for commerce students and research beginners, it includes:
✅ Real examples from original research papers
✅ Color-coded diagrams for clarity
✅ Key rules for in-text citation and reference list formatting
✅ Free citation tools like Mendeley & Zotero explained
Whether you're writing a college assignment, dissertation, or academic article, this guide will help you cite your sources correctly, confidently, and consistent.
Created by: Prof. Ishika Ghosh,
Faculty.
📩 For queries or feedback: [email protected]
Geography Sem II Unit 1C Correlation of Geography with other school subjectsProfDrShaikhImran
The correlation of school subjects refers to the interconnectedness and mutual reinforcement between different academic disciplines. This concept highlights how knowledge and skills in one subject can support, enhance, or overlap with learning in another. Recognizing these correlations helps in creating a more holistic and meaningful educational experience.
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessMark Soia
Boost your chances of passing the 2V0-11.25 exam with CertsExpert reliable exam dumps. Prepare effectively and ace the VMware certification on your first try
Quality dumps. Trusted results. — Visit CertsExpert Now: https://www.certsexpert.com/2V0-11.25-pdf-questions.html
Multi-currency in odoo accounting and Update exchange rates automatically in ...Celine George
Most business transactions use the currencies of several countries for financial operations. For global transactions, multi-currency management is essential for enabling international trade.
3. RAC Cluster
Project overview
SSL Listener
SEC Listener
SCAN Listeners
Developers & End
users / tools directly
connecting to DB
Main application
technology stack
OBIEE, WLS, Forms,
Reports
Integrations
Other DBs, Essbase,
Ora Net Clients
SSL Listener
SEC Listener
SSL Listener
SEC Listener
4. How does SSL/TLS work?
How does SSL/TLS work? from http://security.stackexchange.com/ => here
How does SSL work? What is an SSL handshake? from http://www.symantec.com/ => here
Transport Layer Security from https://en.wikipedia.org/ => here
5. SSL session overview (1 way)
ServerInitial request (to https://domainname.com)
Hello .... SSLv2, SSLv3, TLSv1, .... ciphers, hash function
● Server Certificate
● Server Private Key
Server Certificate (signed by Certificate Authority)
Public Key + Domain Name (subject) + Org name ....● List of Trusted
CA certificates
Establish trust ...
Agree on the symmetric encryption key ...
premaster secret
master secret & generate session keys
Use session key and agreed encryption cipher to
send data ...
6. SSL session overview (2 way)
Server
● Server Certificate
● Server Private Key● List of Trusted
CA certificates
Establish trust ...
Agree on the symmetric encryption key ...
master secret & generate session keys
Use session key and agreed encryption cipher to
send data ...
premaster secret
● Client Certificate
● Client Private Key
● List of Trusted
CA certificates
7. ● There are 3 options to obtain an SSL certificate
a. Generate your own self-signed certificate (from https://www.linux.com here)
b. Request certificate from your organisation CA
c. Request certificate from public CA
■ VeriSign
■ GeoTrust
■ ... https://en.wikipedia.org/wiki/Certificate_authority
● In A & B you or your organisation controls hashing and encryption protocols
● However no clients will recognize certificate by default
● In option C you will need to make sure your client versions supports protocols
dictated by external CA
a. Recent example => Many CAs announced that they will not support SHA-1 forcing SHA256/SHA-2
implementation
Certificate Authorities & Certificates
14. 3 Different Oracle Listeners configurations
● Default Listener (insecure)
○ Username/password are encrypted
● Secure Listener
○ Use encryption the same way as SSL Listener
○ No authentication phase (SSL handshake)
● SSL Listener
○ Use encryption
○ Could be configured with 1 way or 2 ways authentication
25. SSL & Oracle Clients setup (OCI)
Using the orapki Utility to Manage PKI Elements
https://docs.oracle.com/database/121/DBSEG/asoappf.htm#DBSEG610
26. $ ls -l /u01/app/oracle/SSL/cert/*
total 16
-rw-r--r--@ 1 yvel 5000 1365 Aug 21 2014 cwallet.sso
-rw-r--r--@ 1 yvel 5000 1288 Aug 21 2014 ewallet.p12
oracle@host:/home/oracle> orapki wallet display -wallet /u01/app/oracle/SSL/cert ; date
Oracle PKI Tool : Version 11.2.0.4.0 - Production
Copyright (c) 2004, 2013, Oracle and/or its affiliates. All rights reserved.
Requested Certificates:
User Certificates:
Subject: CN=PROD
Trusted Certificates:
Subject: OU=Class 1 Public Primary Certification Authority,O=VeriSign, Inc.,C=US
Subject: OU=Equifax Secure Certificate Authority,O=Equifax,C=US
Subject: OU=Class 3 Public Primary Certification Authority,O=VeriSign, Inc.,C=US
Subject: CN=GeoTrust Global CA,O=GeoTrust Inc.,C=US
Subject: OU=Secure Server Certification Authority,O=RSA Data Security, Inc.,C=US
Subject: OU=Class 2 Public Primary Certification Authority,O=VeriSign, Inc.,C=US
Wed Sep 9 16:27:36 PDT 2015
oracle@kpfp2:/home/oracle>
orapki wallet create -wallet $WALLET -auto_login -pwd $v_pwd
orapki wallet remove -wallet $WALLET -trusted_cert_all -pwd $v_pwd
orapki wallet display -wallet $WALLET -pwd $v_pwd
orapki wallet jks_to_pkcs12 -wallet $WALLET -keystore /full/path/to/certificate.jks -jkspwd <pwd>
orapki wallet add -wallet $WALLET -trusted_cert -cert GIAG2.crt -pwd $v_pwd
SSL & Oracle Clients setup (OCI)
27. SSL & Oracle Clients setup (OCI)
$ openssl pkcs12 -info -in /u01/app/oracle/SSL/cert/ewallet.p12
Enter Import Password:
MAC Iteration 1024
MAC verified OK
PKCS7 Encrypted data: pbeWithSHA1And3-KeyTripleDES-CBC, Iteration 1024
Certificate bag
Bag Attributes
localKeyID: E6 B6 52 DD 00 00 00 04 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 04
subject=/C=US/O=MyOrg Inc/CN=MyOrg Internet Authority G2
issuer=/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
-----BEGIN CERTIFICATE-----
MIIEBDCCAuygAwIBAgIDAjppMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT
MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i
YWwgQ0EwHhcNMTMwNDA1MTUxNTU1WhcNMTUwNDA0MTUxNTU1WjBJMQswCQYDVQQG
EwJVUzETMBEGA1UEChMKR29vZ2xlIEluYzElMCMGA1UEAxMcR29vZ2xlIEludGVy
bmV0IEF1dGhvcml0eSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB
AJwqBHdc2FCROgajguDYUEi8iT/xGXAaiEZ+4I/F8YnOIe5a/mENtzJEiaB0C1NP
VaTOgmKV7utZX8bhBYASxF6UP7xbSDj0U/ck5vuR6RXEz/RTDfRK/J9U3n2+oGtv
h8DQUB8oMANA2ghzUWx//zo8pzcGjr1LEQTrfSTe5vn8MXH7lNVg8y5Kr0LSy+rE
...
PKCS 12 => https://en.wikipedia.org/wiki/PKCS_12
It defines an archive file format for storing many cryptography objects as a single file. It is
commonly used to bundle a private key with its X.509 certificate.
28. ● JDBC Clients
○ Have it own default certificate store with preloaded trusted CA list
$ v_java_cert=/Library/Java/JavaVirtualMachines/jdk1.8.0_60.jdk/Contents/Home/jre/lib/security/cacerts
$ keytool -list -keystore $v_java_cert -storepass changeit
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 93 entries
digicertassuredidrootca, Apr 16, 2008, trustedCertEntry,
Certificate fingerprint (SHA1): 05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43
comodorsaca, May 12, 2015, trustedCertEntry,
Certificate fingerprint (SHA1): AF:E5:D2:44:A8:D1:19:42:30:FF:47:9F:E2:F8:97:BB:CD:7A:8C:B4
thawtepremiumserverca, May 26, 2015, trustedCertEntry,
Certificate fingerprint (SHA1): E0:AB:05:94:20:72:54:93:05:60:62:02:36:70:F7:CD:2E:FC:66:66
...
$ keytool -exportcert -alias digicertassuredidrootca -keystore $v_java_cert -storepass changeit -
file test.crt -rfc
$ keytool -printcert -file test.crt
Owner: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
Issuer: CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
Serial number: ce7e0e517d846fe8fe560fc1bf03039
Valid from: Thu Nov 09 16:00:00 PST 2006 until: Sun Nov 09 16:00:00 PST 2031
Certificate fingerprints:
MD5: 87:CE:0B:7B:2A:0E:49:00:E1:58:71:9B:37:A8:93:72
SSL & Oracle Clients setup (JBDC)
29. SSL & Oracle Clients setup (JDBC)
● A JRE client must be updated with the JCE to enable
TLS_RSA_WITH_AES_256_CBC_SHA cipher.
○ Download appropriate JCE archive with 2 jar files
○ Copy the jar files to $JAVA_HOME/jre/lib/security/ directory
● The JCE could be obtained from the URL below depending on a JRE version
○ 1.6 JCE
○ 1.7 JCE
○ 1.8 JCE
31. RAC Cluster
Variety of clients and versions to cover ...
SSL Listener
SEC Listener
SCAN Listeners
Developers & End
users using tools
directly connecting to
DB
Main application
technology stack
OBIEE, WLS, Forms,
Reports
Integrations
Other DBs, Essbase,
Ora Net Clients
SSL Listener
SEC Listener
SSL Listener
SEC Listener
1. 2.3.
32. Some components used old Oracle Clients
● Essbase
○ Blend in 11.1.0.7 Oracle Client
○ Challenging to update
● OBIEE
○ Presentation layer use 11.1.0.7 Oracle Client
33. SSL Listener & TCP Buffer
Problem definition
Initial:
● DB Instances doesn't register DB Services with a remote SCAN
listeners, after a new certificate has been added to server wallet
Current:
● All SSL connections from one node hangs connecting to any SSL
enabled listeners that runs on a remote node if a listener is able to
send data out quickly enough
34. SSL Listener & TCP Buffer
SSL Listener works if ….
a) strace-ing the listener process
b) turning debug logging up to a high level in the listener
c) Running the listener on a non-bonded interface
d) Having the listener increase its send buffer size from 16k (default)
to 32k or 64k on the socket
d1) We can also do this at the OS level via `echo "4096 32768 4194304" >
/proc/sys/net/ipv4/tcp_wmem'
35. SSL Listener & TCP Buffer
Normal / Expected processing
sPORT:sIP - cIP:cPORT
TCP socketTCP socket buffer
Process
owner of the socket
O_NONBLOCK
W3 W2 W1
DATA
Data writes
O_NONBLOCK
sPORT:sIP - cIP:cPORTProcess
owner of the socket
DATA
Kernel waits a bit for more data and sends it out
Buffer is full. Kernel sends EAGAIN back
5k 1k 3k
3k
W3b
2k
W3bEAGAIN
sPORT:sIP - cIP:cPORTProcess
owner of the socket
The process code handles error and keep sending the rest of the data until successful
3k
W3b
3k
Kernel refuses writes until buffer is free
36. Oracle Listener - fails to process EAGAIN
TCP socketTCP socket buffer
O_NONBLOCK
Data writes
O_NONBLOCK
sPORT:sIP - cIP:cPORTSSL Listener DATA
Buffer is full. Kernel sends EAGAIN back
3k
W3b
2k
W3bEAGAIN
sPORT:sIP - cIP:cPORTSSL Listener
Listener never re-sends the W3b part Kernel ready to process writes after some time
Oracle Listener ssl handshake function fails to process EAGAIN errors
sPORT:sIP - cIP:cPORTSSL Listener DATA
Buffer is full. Kernel sends EAGAIN back
2k
W3b
3k
W3b
The W3b part is dropped
Where is client's
response?
W3b
The W3b part is dropped
SSL Listener & TCP Buffer
38. RAC Cluster
Variety of clients and versions to cover ...
SSL Listener
SEC Listener
SCAN Listeners
Developers & End
users using tools
directly connecting to
DB
Main application
technology stack
OBIEE, WLS, Forms,
Reports
Integrations
Other DBs, Essbase,
Ora Net Clients
SSL Listener
SEC Listener
SSL Listener
SEC Listener