My Oracle Support Banner

RP/TUX 6.5, TUX 6.51 - Rogue connection attack causes unwanted disconnections (Doc ID 772493.1)

Last updated on JANUARY 19, 2018

Applies to:

Oracle Tuxedo / Tuxedo / 6.5, 6.51
Information in this document applies to any platform


The test case consists of 3 domains:
"dom1" and "dom2" connect normally, with CONNECTION_POLICY ON_STARTUP and SECURITY DM_PW.
"domr" ("r" stands for "rogue") is configured exactly as dom2, but does not know the
connection passwords.
When "domr" attempts to connect to "dom1", "dom1" disconnects the real "dom2",
then fails to connect "domr" (configured as a fake "dom2").
As "domr" and "dom2" are configured the same, the connection attempts from "dom2" are
regularly torn down by "domr".


To view full details, sign in with your My Oracle Support account.

Don't have a My Oracle Support account? Click to get started!

In this Document

My Oracle Support provides customers with access to over a million knowledge articles and a vibrant support community of peers and Oracle experts.