?
Solved

ActiveMQ and HTTP Transport

Posted on 2014-03-28
1
Medium Priority
?
557 Views
Last Modified: 2014-03-31
I am reading this site:

http://activemq.apache.org/http-and-https-transports-reference.html 

I think what it is saying is that if you use this transport, JMS messages will leave ActiveMQ within the HTTP tunnel...

BUT also that there is no need for an external tunneling service like stunnel or some other proxy/tunnel service

Is this correct.  Does this transport both send and receive and perform the wrapping and unwrapping for you without need of an extern tunneling agent or program in the DMZ or other area

njd
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 36

Accepted Solution

by:
mccarl earned 2000 total points
ID: 39964449
I think that they are using the term tunnel very loosely here. A tunnel to me means that one protocol is carried transparently within another, ie. ActiveMQ has its native TCP protocol and if the actual bytes of this were carried as the payload of the HTTP protocol, then I would call it a tunnel. But they mention in that link that the payload is XML, so I would just call this an alternative protocol rather than a tunnel.

I think that their use of the word tunnel is more in reference to the perceived functionality, ie. the fact that this protocol can fairly transparently transit through proxies, firewalls, etc. rather than the actual technical implementation.

But I guess to fully answer your question, no you shouldn't need to encapsulate this within another tunnel, especially if you are using HTTPS. While it is slightly different than an SSH-based tunnel, it should provide similar security.
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For beginner Java programmers or at least those new to the Eclipse IDE, the following tutorial will show some (four) ways in which you can import your Java projects to your Eclipse workbench. Introduction While learning Java can be done with…
In this post we will learn how to connect and configure Android Device (Smartphone etc.) with Android Studio. After that we will run a simple Hello World Program.
This tutorial covers a step-by-step guide to install VisualVM launcher in eclipse.
This tutorial will introduce the viewer to VisualVM for the Java platform application. This video explains an example program and covers the Overview, Monitor, and Heap Dump tabs.
Suggested Courses
Course of the Month9 days, 23 hours left to enroll

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question