[ 
https://issues.apache.org/jira/browse/ARIES-1613?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15512484#comment-15512484
 ] 

Timothy Ward commented on ARIES-1613:
-------------------------------------

{quote} 
The people responsible for security often like to avoid connections that are 
initiated from the outside or dmz and have a target in the intranet.
{quote}

Any request made to the front end that requires information from the back end 
must initiate a connection from DMZ to the intranet. I agree that the number of 
connections should be minimised and the firewall as strict as possible, but it 
can't be avoided entirely.

{quote}
The feeding mechanism could either be driven by the individual intranet servers 
that host the services or by a separate bridge software that only talks with 
the two zookeeper instances. I think it makes sense for us to at least design 
both scenarios. I personally do not currently plan to implement any scenario 
but maybe someone can jump in there.

For me the important part is that we provide the hooks in Aries RSA so such an 
implementation can be plugged in at any time.
{quote}

This model is already provided by the RSA specification. If you want to have 
two separate discovery providers configured then you can! Simply do the 
following:

1. Have the Exporting Remote Service Admin generate two Endpoint Descriptions, 
one which is "secure" (i.e. uses the proxy) and one which is not
2. Have two configured discovery providers, one which is for the dmz, and has a 
"(secure=true)"  (or equivalent) filter on its EndpointEventListener, and 
another discovery for the internal zookeeper
3. Configure the "internal" Topology managers to prefer the internal endpoint 
to the secure endpoint


In this model the internal servers have the choice of what they use and the DMZ 
servers never discover anything other than the "secure" endpoint.

I'm not sure that I agree that this is more secure than the model where the DMZ 
topology manager chooses to ignore the internal endpoints, as you have a much 
bigger DMZ attack surface (an extra zookeeper which is trusted by the internal 
network), but it does what you're asking. Importantly, Aries doesn't need (and 
shouldn't have) special hooks to solve this, otherwise you end up with Aries 
RSA not interoperating with other implementations.

> DiscoveryPlugin interface not exported
> --------------------------------------
>
>                 Key: ARIES-1613
>                 URL: https://issues.apache.org/jira/browse/ARIES-1613
>             Project: Aries
>          Issue Type: Bug
>          Components: Remote Service Admin
>    Affects Versions: rsa-1.9.0
>            Reporter: Panu Hämäläinen
>
> The package containing the interface 
> org.apache.cxf.dosgi.discovery.zookeeper.publish.DiscoveryPlugin is not 
> exported (MANIFEST.MF) from bundle cxf-dosgi-ri-discovery-distributed (1.7.0) 
> which makes it impossible to implement 3rd party discovery plugins.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to