RP/TUX 6.5, TUX 6.51 - Rogue connection attack causes unwanted disconnections (Doc ID 772493.1)

Last updated on NOVEMBER 04, 2016

Applies to:

Oracle Tuxedo / Tuxedo / 6.5, 6.51
Information in this document applies to any platform

Goal

The test case consists of 3 domains:
"dom1" and "dom2" connect normally, with CONNECTION_POLICY ON_STARTUP and SECURITY DM_PW.
"domr" ("r" stands for "rogue") is configured exactly as dom2, but does not know the
connection passwords.
When "domr" attempts to connect to "dom1", "dom1" disconnects the real "dom2",
then fails to connect "domr" (configured as a fake "dom2").
As "domr" and "dom2" are configured the same, the connection attempts from "dom2" are
regularly torn down by "domr".

Solution

Sign In with your My Oracle Support account

Don't have a My Oracle Support account? Click to get started

My Oracle Support provides customers with access to over a
Million Knowledge Articles and hundreds of Community platforms