Perhaps the simplest way to get SSL support is to use a reverse proxy. You
can run nginx or IIS and have it forward the request to jhs



On Mon, Dec 1, 2014 at 3:11 PM, Raul Miller <[email protected]> wrote:

> https requires certificate support, and that has a variety of related
> issues (access to the certificate grants essentially the same powers).
> And then there's the matter of user authentication. Getting that right
> takes a lot of care and attention.
>
> On the other hand, most of that work has already been done. For
> example, you could use the TOR software to gate access to a JHS
> server. Doing this, you would explicitly not be trying to gain
> anonymity Instead, you would simply be using it to route the traffic
> through otherwise untrusted servers. (You would still need to make
> sure that both endpoints are secure, since anyone with access to the
> endpoints gets full control. But that's something of an issue,
> regardless of what you have implemented.
>
> That said, it would be nice to have a "user identification" mechanism
> supported by jhs, even if it's only basic authentication.
>
> Thanks,
>
> --
> Raul
>
> On Mon, Dec 1, 2014 at 12:03 PM, John Baker <[email protected]> wrote:
> > I have been thinking about a few useful additions to the foreign calls of
> > J. I am sure everyone has their own list of additions but here are mine.
> > To keep this fun let’s restrain our lists to at most three items. Here
> are
> > my top two.
> >
> > 1)      *Efficient support for HTTPS in JHS.*  Post Snowden running
> without
> > encryption is just asking for it. Hacking a J engine confers god like
> > powers on the hacker.  Support for HTTPS would make it a lot easier to
> > deploy JHS solutions in increasingly paranoid corporate environments.
> >
> > 2)      *High performance compression tuned to J data types.*  There a
> few
> > addons that make a stab at this but one could achieve much higher
> > performance if it was an integral 3!:x verb that exploited J’s knowledge
> of
> > its internal data types. A good example is compressing Booleans.  Knowing
> > the data is Boolean, rather than byte, allows much faster and more
> compact
> > results.
> >
> > --
> > John D. Baker
> > [email protected]
> > ----------------------------------------------------------------------
> > For information about J forums see http://www.jsoftware.com/forums.htm
> ----------------------------------------------------------------------
> For information about J forums see http://www.jsoftware.com/forums.htm
>
----------------------------------------------------------------------
For information about J forums see http://www.jsoftware.com/forums.htm

Reply via email to