Abstract:
Methods, terminal and a data center gateway are provided for allowing efficient debugging and troubleshooting of data session encrypted with Perfect Forward Secrecy (PFS) encryption techniques such as for example the Transport Layer Security (TLS) protocol version 1.3. Embodiments of the invention allow the user terminal to authorize a data center gateway to persistently store one or more encryption keys associated with the data session for use to access the recorded data session and troubleshooting it after the session ended, when faults are detected. When a fault is detected, the user terminal provides authorization to the gateway to persistently store the data session along with one or more encryption key(s). With this, the gateway allows for the data session to be later decrypted and faults to be investigated despite the data session being encrypted with PFS techniques.
Abstract:
A method and device for sending a request (R) from a requesting machine (H) to a domain name server (1, 2, 3). A prior test of the validity of the destination telephone number (NTEL) of the request (R) is executed automatically and locally to the requesting machine (H) relative to a database (BD) local to said requesting machine (H) in order to forward the request (R) from the requesting machine (H) to the domain name server (1, 2, 3) only if its telephone number (NTEL) passes said test.
Abstract:
A domain server that comprises: means (10) for receiving a query transmitted from a client device (CL1) for obtaining DNS data; a zone file (FZ1, zone) comprising one or more distribution rules defining a partitioning of the domain into sub-zones, DNS data of said sub-zones being associated with a pair of partition keys specific to said sub-zone; means (20) for obtaining from said zone file a useful piece of information sufficient for identifying the pair of the partition keys associated with the required DNS data; and means (10) for transmitting to the client device (CL1): the required DNS data, the value of the signature of said data produced by means of the private component (ZSK2[pr]) of the pair of partition keys; and the useful piece of information.
Abstract:
Systems and methods for maintaining privacy of security protocol parameters are provided. A node receives an encrypted packet and determines if the Security Parameters Index (SPI) value has been updated. The node can modify its stored SPI value(s) accordingly and process the encrypted packet.
Abstract:
A domain server that comprises: means (10) for receiving a query transmitted from a client device (CL1) for obtaining DNS data; a zone file (FZ1, zone) comprising one or more distribution rules defining a partitioning of the domain into sub-zones, DNS data of said sub-zones being associated with a pair of partition keys specific to said sub-zone; means (20) for obtaining from said zone file a useful piece of information sufficient for identifying the pair of the partition keys associated with the required DNS data; and means (10) for transmitting to the client device (CL1): the required DNS data, the value of the signature of said data produced by means of the private component (ZSK2[pr]) of the pair of partition keys; and the useful piece of information.
Abstract:
The invention relates to a method for accessing via a first device a predetermined piece of information duplicated in several server devices, each server device implementing a sub-assembly of safety mechanisms from a predetermined set of safety mechanisms in order to provide a predetermined safety level for accessing the predetermined piece of information, wherein said method comprises the following steps: a) transmission (40) by the first device of at least one access request adapted for receiving the list of safety mechanisms implemented by the server devices; b) transmission (46) by the first device to at least one of said server devices of an access request to the predetermined piece of information, said request using the safety mechanisms implemented by the and at least one of said server devices.
Abstract:
Systems and methods for processing inbound and outbound secure packet traffic are provided herein. A first lookup operation can be performed to identify a security association corresponding to a received packet. A second lookup operation can be performed to determine a security parameters index associated with the packet and the identified security association. The packet can be processed in accordance with the security association and the security parameters index.
Abstract:
A domain name server includes a zone file containing partitioning rules that define the partitioning of all subfolders of this domain into subzones. The DNS data of each of these subzones is hosted by a partition server that is able to obtain from the zone file information for identifying the partition server able to respond to a query sent by a client to obtain a DNS folder.
Abstract:
The invention concerns a telecommunications system including a database DBS comprising a reference server REFS containing data associated with at least one domain name, and at least one first and second auxiliary server CFS and PBS intended to contain data CONFD and PUBD respectively provided with a first and second degree of confidentiality. At least one of the auxiliary servers is provided with identification means IDMC, IDMP for preventing any access to the data that it contains by terminals not having access authorisation compatible with the degree of confidentiality attributed to the data contained in this auxiliary server. The invention provides respect for the confidential character which certain data CONFD stored in a database DBS accessible by means of a terminal TER0, TER1 or TER2 via a public network could have.
Abstract:
Systems and methods for virtualizing edge node functionality as a service for handling content delivery are described herein. An edge node receives a packet and determines if it associated with an established session and if it should be offloaded for processing. An offload status indicator and/or session context information can be added to the offloaded packet and it is transmitted to a subsequent edge node.