Re: Compliance and SSL/TLS Encryption on ODA
Date: Mon, 19 Oct 2020 08:14:21 -0700
Message-ID: <CAORjz=Pr_SYG=vmsvPQ9JZoLYnuMV=gd0kbKwMxCnst1VRgs3A_at_mail.gmail.com>
Hi Rob,
There are some good suggestions here already.
However, I would suspect you would like to be able to prove this out so as to satisfy the customer requirements.
Testing on Linux would not be too difficult.
Establish a query with marker data in the response, making it easy to find in a trace.
Then make an external connection via TCP/IP, tracing with wireshark or tshark (CLI version).
Verify that you can find your marker data in the trace.
Next, test with local only connections, and verify that the data does not leave the host.
Jared
On Sat, Oct 17, 2020 at 08:05 Robert Karch <rkarch_at_teleran.com> wrote:
> I am working with an ODA customer who has a compliance requirement to
> encrypt data on the wire. They have some applications running on the ODA
> server that they would prefer not to have the overhead of encryption and
> decryption. They also want these applications connecting to the Oracle
> listener using TCP/IP. The question that they have is if the application is
> running on the ODA host, and connecting to a TCP listener port, is the
> passed data only available in memory (and therefore still in compliance) or
> is there some possibility of leakage into the network?
>
>
>
> Kindest Regards,
>
>
>
> Rob Karch
>
> Software Architect
>
> Teleran Technologies, Inc.
>
> “Understanding Usage Is Everything”
>
>
>
-- Jared Still Certifiable Oracle DBA and Part Time Perl Evangelist Principal Consultant at Pythian Oracle ACE Alumni Pythian Blog http://www.pythian.com/blog/author/still/ Github: https://github.com/jkstill -- http://www.freelists.org/webpage/oracle-lReceived on Mon Oct 19 2020 - 17:14:21 CEST