Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

ActiveMQ and HTTP Transport

Posted on 2014-03-28
1
Medium Priority
?
598 Views
Last Modified: 2014-03-31
I am reading this site:

http://activemq.apache.org/http-and-https-transports-reference.html 

I think what it is saying is that if you use this transport, JMS messages will leave ActiveMQ within the HTTP tunnel...

BUT also that there is no need for an external tunneling service like stunnel or some other proxy/tunnel service

Is this correct.  Does this transport both send and receive and perform the wrapping and unwrapping for you without need of an extern tunneling agent or program in the DMZ or other area

njd
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 36

Accepted Solution

by:
mccarl earned 2000 total points
ID: 39964449
I think that they are using the term tunnel very loosely here. A tunnel to me means that one protocol is carried transparently within another, ie. ActiveMQ has its native TCP protocol and if the actual bytes of this were carried as the payload of the HTTP protocol, then I would call it a tunnel. But they mention in that link that the payload is XML, so I would just call this an alternative protocol rather than a tunnel.

I think that their use of the word tunnel is more in reference to the perceived functionality, ie. the fact that this protocol can fairly transparently transit through proxies, firewalls, etc. rather than the actual technical implementation.

But I guess to fully answer your question, no you shouldn't need to encapsulate this within another tunnel, especially if you are using HTTPS. While it is slightly different than an SSH-based tunnel, it should provide similar security.
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If your site has a few sections that need to be secure when data is transmitted between the server and local computer, such as a /order/ section for ordering or /customer/ which contains customer data, etc it would of course be recommended to secure…
In this post we will learn different types of Android Layout and some basics of an Android App.
Viewers learn about the third conditional statement “else if” and use it in an example program. Then additional information about conditional statements is provided, covering the topic thoroughly. Viewers learn about the third conditional statement …
Viewers will learn one way to get user input in Java. Introduce the Scanner object: Declare the variable that stores the user input: An example prompting the user for input: Methods you need to invoke in order to properly get  user input:
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question