摘要:
Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.
摘要:
Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.
摘要:
Policy filtering services are built into security processing of an execution environment for resolving how to handle a digital security certificate of a communicating entity without requiring a local copy of a root certificate that is associated with the entity through a certificate authority (“CA”) chain. Policy may be specified using a set of rules (or other policy format) indicating conditions for certificate filtering. This filtering is preferably invoked during handshaking, upon determining that a needed root CA certificate is not available. In one approach, the policy uses rules specifying conditions under which a certificate is permitted (i.e., treated as if it is validated) and other rules specifying conditions under which a certificate is blocked (i.e., treated as if it is invalid). Preferably, policy rules are evaluated and enforced in order of most-specific to least-specific.
摘要:
A method, system and computer program product for providing a seamless transition for resizing virtual machines from a development environment to a production environment. An administrative server receives an instruction from a customer to resize a virtual machine running on a cloud computing node, where the resized virtual machine requires physical resources (e.g., twenty physical processor cores) to be utilized in the production environment. Instead of the administrative server utilizing the same number of physical resources in the development environment that need to be utilized in the production environment, the administrative server utilizes a fewer number of physical resources by also utilizing virtual resources (e.g., twenty virtual processor cores and only two physical processor cores) so as to provide a development environment with the same resource capacity as the production environment but with fewer physical resources thereby more efficiently utilizing the physical resources on the cloud computing node.
摘要:
Methods and systems for providing non-proxy Secure Sockets Layer and Transport Layer Security (SSL/TLS) support in a content-based load balancer are described. A Transmission Control Protocol (TCP) connection is accepted from a client, and an SSL/TLS connection is established with the client such that random data used in key generation is created. A request is received from the client, and the request is decrypted. The request is processed, a target stack is selected, and the TCP connection, the SSL/TLS connection, and the random data are transferred to the selected target stack such that the client and selected target stack maintain an end-to-end TCP connection with a non-proxy SSL/TLS connection.
摘要:
Methods and systems for providing end-to-end content-based load balancing are described. A Transmission Control Protocol (TCP) connection is accepted from a client and a request is received from the client. The request is processed, a target stack is selected, and the TCP connection is transferred to the selected target stack such that the client and selected target stack maintain an end-to-end TCP connection. In an exemplary embodiment, the request can be processed in a TCP kernel. In another preferred embodiment, the TCP connection can include TCP data packets and the request can include request data packets. The TCP connection transfer can be performed by replaying the TCP data packets and the request data packets to the selected target stack.
摘要:
Embodiments of the present invention provide a method, system and computer program product for Mobile IPv6 binding cache support for a load balanced sysplex. In one embodiment of the invention, a load balancing sysplex can be configured for mobile device binding cache support. The sysplex can include a distributor coupled to different targets in a load balancing arrangement, where each of the targets can support a correspondent node enabled to communicate with a mobile device. A master binding cache can be coupled to the distributor and a binding cache manager can be coupled to the distributor. Notably, the binding cache manager can perform return routability with the mobile device and can provide a corresponding entry in the master binding cache for use by a target supporting a correspondent node for the mobile device. In one aspect of the embodiment, a replica of the master binding cache can be provided in each of the targets for use by supported correspondent nodes in communicating with different mobile devices associated with binding cache entries in the replica.
摘要:
A method, system and computer program product for providing a seamless transition for resizing virtual machines from a development environment to a production environment. An administrative server receives an instruction from a customer to resize a virtual machine running on a cloud computing node, where the resized virtual machine requires physical resources (e.g., twenty physical processor cores) to be utilized in the production environment. Instead of the administrative server utilizing the same number of physical resources in the development environment that need to be utilized in the production environment, the administrative server utilizes a fewer number of physical resources by also utilizing virtual resources (e.g., twenty virtual processor cores and only two physical processor cores) so as to provide a development environment with the same resource capacity as the production environment but with fewer physical resources thereby more efficiently utilizing the physical resources on the cloud computing node.
摘要:
Methods, systems and computer program products for load balancing using Mobile Internet Protocol (IP) Version 6 are provided. A request for a connection is received from a client at a routing stack. A Mobile IP Version 6 Binding Update message is transmitted from the routing stack to the client responsive to the received request. The Binding Update message identifies a selected target stack so as to allow the client to communicate directly with the target stack bypassing the routing stack.
摘要:
Improvements in security processing are disclosed which enable security processing to be transparent to the application. Security processing (such as Secure Sockets Layer, or “SSL”, or Transport Layer Security, or “TLS”) is performed in (or controlled by) the stack. A decision to enable security processing on a connection can be based on configuration data or security policy, and can also be controlled using explicit enablement directives. Directives may also be provided for allowing applications to communicate with the security processing in the stack for other purposes. Functions within the protocol stack that need access to clear text can now be supported without loss of security processing capability. No modifications to application code, or in some cases only minor modifications (such as inclusion of code to invoke directives), are required to provide this security processing. Improved offloading of security processing is also disclosed, which provides processing efficiencies over prior art offloading techniques.