<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to mendelson OFTP2</title><link>https://sourceforge.net/p/mendelson-oftp2/wiki/mendelson%2520OFTP2/</link><description>Recent changes to mendelson OFTP2</description><atom:link href="https://sourceforge.net/p/mendelson-oftp2/wiki/mendelson%20OFTP2/feed" rel="self"/><language>en</language><lastBuildDate>Thu, 27 Mar 2014 13:39:44 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/mendelson-oftp2/wiki/mendelson%20OFTP2/feed" rel="self" type="application/rss+xml"/><item><title>mendelson OFTP2 modified by Stefan Heller</title><link>https://sourceforge.net/p/mendelson-oftp2/wiki/mendelson%2520OFTP2/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -1,8 +1,4 @@
-Welcome to your wiki!
-
-This is the default page, edit it as you see fit. To add a new page simply reference it within brackets, e.g.: [SamplePage].
-
-The wiki uses [Markdown](/p/mendelson-oftp2/wiki/markdown_syntax/) syntax.
-
+The mendelson OFTP2 is a JAVA-based open source OFTP2 solution. It contains a logging- and configuration GUI (SWING) and supports encryption, digital signatures, message compression, SSL, certificate exchange, message routing, mail notification
+[[project_screenshots]]
 [[members limit=20]]
 [[download_button]]
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Stefan Heller</dc:creator><pubDate>Thu, 27 Mar 2014 13:39:44 -0000</pubDate><guid>https://sourceforge.net2aa84628d4f18c19ef71b0825c19cf3aa7467c09</guid></item><item><title>Discussion for Home page</title><link>https://sourceforge.net/p/mendelson-oftp2/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;h2 id="mendelson-opensource-oftp2"&gt;mendelson opensource OFTP2&lt;/h2&gt;
&lt;p&gt;Thank you for choosing the mendelson opensource OFTP2 software for your OFTP2 data transmission.&lt;/p&gt;
&lt;p&gt;This OFTP2 implementation supports encryption, digital signatures, TSL and secure session authentication. It does&lt;br /&gt;
&lt;em&gt;NOT&lt;/em&gt; work with any OFTP 1.x partner station (even not with OFTP 1.x partner stations using TCP/IP),&lt;br /&gt;
OFTP2 is required.&lt;/p&gt;
&lt;h2 id="requirements"&gt;Requirements:&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;A java 1.7 (or higher) compatible JVM platform like windows, linux, solaris, mac OS X. &lt;br /&gt;
    64 bit systems are also supported, just use a 64 bit JVM. Anyway 32 JVMs will also run on 64 bit systems.&lt;/em&gt;Your system must be reachable from the internet, please open the ports 3305 or 6619 in your&lt;br /&gt;
    firewall - the ports could be configured, please see below. Beneath the inbound access of others&lt;br /&gt;
    your system must have outbound access to the internet&lt;br /&gt;
&lt;em&gt;A valid Odette Id (only for productive data exchange, this product supports any id from a technical perspective).&lt;br /&gt;
    This Odette id could be obtained from Odette, please refer to&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://forum.odette.org/service/oscar/oscar-explained" rel="nofollow"&gt;&lt;/a&gt;&lt;a href="https://forum.odette.org/service/oscar/oscar-explained" rel="nofollow"&gt;https://forum.odette.org/service/oscar/oscar-explained&lt;/a&gt; for further information&lt;/em&gt;A key/certificate - you could buy this or work with self-signed certificates. Please&lt;br /&gt;
    remember that you have to ask your partners if they accept self-signed certificats. If they dont&lt;br /&gt;
    accept them: Ask them for the list of CA they support.&lt;br /&gt;
    There is a whitepaper called "ODETTE Recommendation - OFTP2 Certificate policy" which might be worth&lt;br /&gt;
    reading: &lt;a href="http://www.odette.org/TSL/POL_OFTP2.txt" rel="nofollow"&gt;http://www.odette.org/TSL/POL_OFTP2.txt&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Hardware:&lt;br /&gt;
&lt;em&gt;A computer that is up to date - this product encrypts/signs data which could require some processing time.&lt;br /&gt;
&lt;/em&gt;About 4GB ram&lt;br /&gt;
*About 80GB harddisk&lt;/p&gt;
&lt;h2 id="installation"&gt;Installation:&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;On windows just double click the installer and follow the instructions. Afterwards start the application. The&lt;br /&gt;
    installation is out of the box&lt;/em&gt;Any other OS: Unpack the zip, install a java VM &amp;gt;= 1.7, patch the JVM with Oracles "jurisdiction strength&lt;br /&gt;
    files" (could be downloaded at the Oracle java download page), edit the start script (if required, depends &lt;br /&gt;
    on your OS), start the application. The installation for non-windows OS is not out of the box but it is &lt;br /&gt;
    possible to set it up in a short time.&lt;/p&gt;
&lt;h2 id="updating-an-existing-mendelson-opensource-oftp2-installation"&gt;Updating an existing mendelson opensource OFTP2 installation:&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Create a backup of your installation&lt;br /&gt;
&lt;/em&gt;Delete the existing jlib directories content&lt;br /&gt;
&lt;em&gt;Unpack the zip to the installation or execute the installer (windows). Do not overwrite the files that&lt;br /&gt;
    contain your personal data like certificates.p12, certificates_ssl.p12 and the notification templates&lt;/em&gt;Start the OFTP2 server - it will start an update routine for the underlaying database structure - it's done. If additional &lt;br /&gt;
    steps are required for the update process the system will inform you.&lt;br /&gt;
    If the update fails please contact us.&lt;br /&gt;
*Whenever something unexpected occurs during this update procedure just recover the directory using your backup - &lt;br /&gt;
    this will bring the server back to exact the old state&lt;/p&gt;
&lt;h2 id="quick-intro"&gt;Quick intro:&lt;/h2&gt;
&lt;p&gt;The mendelson OFTP2 solution supports encryption, digital signature, compression, TLS and secure session authentication.&lt;br /&gt;
Before communicating to your trading partners please ensure the following things as mentioned before:&lt;br /&gt;
&lt;em&gt;You must have a key/certificate to sign your outbound messages and decrypt inbound messages. The key&lt;br /&gt;
    may be self signed if your partner accepts this. If not there is the possibility to get trusted keys at the &lt;br /&gt;
    mendelson CA (http://ca.mendelson-e-c.com). Please ask your partner first if they accept keys&lt;br /&gt;
    that are trusted to this CA.&lt;br /&gt;
    This open source version does not contain a graphical key/certificate manager, please&lt;br /&gt;
    use 3rd party tools for that purpose. Download links could be found at &lt;a href="http://community.mendelson-e-c.com/links." rel="nofollow"&gt;&lt;/a&gt;&lt;a href="http://community.mendelson-e-c.com/links." rel="nofollow"&gt;http://community.mendelson-e-c.com/links.&lt;/a&gt;&lt;br /&gt;
    Even if we think that the user interface of the mendelson opensource OFTP2 server is fairly easy to use&lt;br /&gt;
    it is recommended to be informed about basic security mechanism like PKI. Having basic knowledge about&lt;br /&gt;
    security will help you setting up the system and will help you in basic themes like how to get a key&lt;br /&gt;
    or how to work with certificates and certificate authorities.&lt;br /&gt;
    If you require more information about the key/certificate/CA theme please have a look at the following links:&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://en.wikipedia.org/wiki/Public_key_infrastructure" rel="nofollow"&gt;&lt;/a&gt;&lt;a href="http://en.wikipedia.org/wiki/Public_key_infrastructure" rel="nofollow"&gt;http://en.wikipedia.org/wiki/Public_key_infrastructure&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://en.wikipedia.org/wiki/Public_key" rel="nofollow"&gt;&lt;/a&gt;&lt;a href="http://en.wikipedia.org/wiki/Public_key" rel="nofollow"&gt;http://en.wikipedia.org/wiki/Public_key&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://en.wikipedia.org/wiki/Digital_signature" rel="nofollow"&gt;&lt;/a&gt;&lt;a href="http://en.wikipedia.org/wiki/Digital_signature" rel="nofollow"&gt;http://en.wikipedia.org/wiki/Digital_signature&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://en.wikipedia.org/wiki/Certificate_authority" rel="nofollow"&gt;&lt;/a&gt;&lt;a href="http://en.wikipedia.org/wiki/Certificate_authority" rel="nofollow"&gt;http://en.wikipedia.org/wiki/Certificate_authority&lt;/a&gt;&lt;/em&gt;There are some communication parameters that are not negotiable on the protocol level for OFTP2 connections, &lt;br /&gt;
    this is for example the secure authentication. Please clearify all communication parameters with your partner.&lt;/p&gt;
&lt;p&gt;There is one local station in the partner configuration, that is you. Your trading partners need to be setup &lt;br /&gt;
as remote partner. Please aks your trading partners for their communication parameters and enter them into the&lt;br /&gt;
partner management. On the other site please clearify your own communication parameter and send them to your&lt;br /&gt;
partner.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The OFTP2 server listens by default to the ports 3305 (no SSL) and 6619 (SSL). To listen to different ports/adapters please&lt;br /&gt;
    navigate to the "Preferences" and setup the new ports at the section "Inbound ports"&lt;/em&gt;Each partner has an outbox directory. Send your files in, they will be taken and sent to the partner. For test purpose&lt;br /&gt;
    you could also send files manual using the client (file-send).&lt;br /&gt;
&lt;em&gt;To use your own certificates and keys please navigate to the certificate manager of the product (File-Certificates). The&lt;br /&gt;
    certificate manager supports&lt;br /&gt;
&lt;br /&gt;
&lt;/em&gt;Key import (from PEM, PKCS#12)&lt;br /&gt;
&lt;em&gt;Certificate and certificate chain import from your partner (.p7b, PEM, .cer), &lt;br /&gt;
        works with additional optional certificate BASE64 encoding&lt;br /&gt;
&lt;br /&gt;
&lt;/em&gt;Certificate and certificate chain export for your partner (.p7b, .cer, PEM)&lt;br /&gt;
&lt;em&gt;Key export (backup purpose, PKCS#12)&lt;br /&gt;
&lt;br /&gt;
&lt;/em&gt;Self signed key generation + integrated possibility to trust a self signed key at the mendelson CA&lt;br /&gt;
&lt;em&gt;Key and certificate handling (rename, delete, set alias, ..)&lt;br /&gt;
&lt;/em&gt;It might confuse you that you receive files from your partner without receiving an inbound connection from them&lt;br /&gt;
    but just establishing an outbound connection. OFTP2 is a push/pull protocoll, you could receive files on&lt;br /&gt;
    outbound connections.&lt;/p&gt;
&lt;h2 id="resourcesports-startup"&gt;Resources/Ports, Startup&lt;/h2&gt;
&lt;p&gt;3305 OFTP port (could be changed: "Preferences-Inbound ports")&lt;br /&gt;
6619 OFTP SSL port (could be changed: "Preferences-Inbound ports")&lt;br /&gt;
3333 Internal DB port&lt;br /&gt;
1235 Client/Server port&lt;/p&gt;
&lt;p&gt;Please keep in mind to open the firewall for the inbound ports 3305 and/or 6619.&lt;/p&gt;
&lt;p&gt;This is the usage to start the mendelson OFTP2:&lt;/p&gt;
&lt;p&gt;java de.mendelson.comm.oftp2.OFTP2 &lt;br /&gt;
Options are:&lt;br /&gt;
-lang : Language to use for the server, nonpersistent. Possible values are "en" and "de".&lt;/p&gt;
&lt;h2 id="ssl-setup"&gt;SSL setup&lt;/h2&gt;
&lt;p&gt;The SSL certificates are stored in the keystore "certificate_ssl.p12". There must be only a single&lt;br /&gt;
key in the keystore (this is the SSL key your server hosts) and certificates of all your partners.&lt;br /&gt;
If you change the SSL key in your ssl keystore you must restart the OFTP2 server. To connect to partners&lt;br /&gt;
using SSL please check the "Connect using SSL" checkbox in the partner manager and set the receivers port&lt;br /&gt;
to 6619 or the port where your trading partners OFTP2 system listens on for inbound SSL connections.&lt;br /&gt;
To debug the SSL handshake please start the server with the java option "-Djavax.net.debug=all" (a start using a &lt;br /&gt;
start script is required, this a parameter for the java command)&lt;/p&gt;
&lt;h2 id="send-files"&gt;Send files:&lt;/h2&gt;
&lt;p&gt;Each partner is assigned to a poll thread of a directory and a virtual filenames. You could add additional&lt;br /&gt;
poll threads that are assigned to user defined virtual filenames per partner. The poll interval could be configured,&lt;br /&gt;
ignore patterns are supported. You could start a user defined command per partner after a file has been send&lt;br /&gt;
(error/without error). Please dont let the system poll a directory once a second or something like this - this will&lt;br /&gt;
slow down the system.&lt;/p&gt;
&lt;h2 id="receive-files"&gt;Receive files:&lt;/h2&gt;
&lt;p&gt;Every partner could have user defined virtual filename processing. Each file with a specified virtual filename&lt;br /&gt;
will be written to a specified directory. This could defined in the partner management. &lt;br /&gt;
For a powerful integration into your process flow you could start a user defined command per partner after &lt;br /&gt;
a file has been received - either on failure or on success. These user defined commands could have access to several &lt;br /&gt;
parameters of the transmission - please have a look at the user interface (partner management-events) for&lt;br /&gt;
more information.&lt;/p&gt;
&lt;h2 id="notification"&gt;Notification:&lt;/h2&gt;
&lt;p&gt;You could set up external mail account credentials - the mendelson opensource OFTP2 server will send mails&lt;br /&gt;
for several events which could be configured, too.&lt;br /&gt;
These events are&lt;/p&gt;
&lt;p&gt;&lt;em&gt;certificate messages arrive&lt;br /&gt;
&lt;/em&gt;transmissions failed&lt;br /&gt;
*certificates are up to expire/have been expired&lt;/p&gt;
&lt;p&gt;If you enable the certificate expire notification you will be informed 10 - 5 - 1 day before the certificate&lt;br /&gt;
has been expired. If this isn't your certificate but a partner certificate this is mainly not that interesting -&lt;br /&gt;
anyway you should monitor this issue.&lt;br /&gt;
Please keep in mind that the main OFTP2 security mechanism like encryption and signatures do not work if you&lt;br /&gt;
use expired certificates.&lt;/p&gt;
&lt;h2 id="using-gateway-partnersrouting"&gt;Using gateway partners/routing:&lt;/h2&gt;
&lt;p&gt;The mendelson OFTP2 server supports full OFTP2 routing and message sending to partners who are &lt;br /&gt;
accessible via an OFTP2 gateway partner.&lt;br /&gt;
If you would like to send data to a partner that is accessible via a gateway partner just configure&lt;br /&gt;
this in the partner management - tab "send". The mendelson opensource OFTP2 server will connect to this partner&lt;br /&gt;
and tell him that the destination of the data is a routed partner. Please be aware that every partner&lt;br /&gt;
you are sending data to and receive data from must be available - and well configured - in your&lt;br /&gt;
partner management. The partner icon indicates if you will connect direct to a partner or connect to it via&lt;br /&gt;
an other partner.&lt;br /&gt;
Beneath the physical routing were you send routed data to an other system you could also create a virtual routing&lt;br /&gt;
by adding local identities to your local station. In this case your partner will see these identities as routed&lt;br /&gt;
partners but you will receive them on your instance - you could also send data using an other identity&lt;br /&gt;
Technical spoken:&lt;br /&gt;
This allows to send data with a different SFIDORIG and SSIDCOD in a single instance, this also allows to receive&lt;br /&gt;
data with a different SFIDDEST and SSIDCOD in a single instance.&lt;br /&gt;
There is no limitation in the number of routed partners in this version.&lt;/p&gt;
&lt;h2 id="exchange-certificates"&gt;Exchange certificates:&lt;/h2&gt;
&lt;p&gt;This product supports the certificate exchange messages DELIVER, REPLACE and REQUEST as defined in the&lt;br /&gt;
OFTP2 implementation guide. Please remember that this functionality goes beyond the OFTP2 protocol definition&lt;br /&gt;
of RFC5024. Certificate exchange messages are not signed and encrypted. Because of this we recommend&lt;br /&gt;
to exchange them using SSL connections.&lt;br /&gt;
Using the menu "file-certificate exchange" you could send certifiates to your partners. Please dont&lt;br /&gt;
forget to set up the mail notification in this case - you will be informed about every certificate message&lt;br /&gt;
that arrives.&lt;br /&gt;
Before enabling certificates you received by certificate exchange messages in the product please check the&lt;br /&gt;
key values of the certificate to see if you should really trust it. If you are not sure if you should trust&lt;br /&gt;
a certificate please contact your trading partner and compare the fingerprints of the keys/certificates.&lt;/p&gt;
&lt;h2 id="connection-strategies"&gt;Connection strategies:&lt;/h2&gt;
&lt;p&gt;There are three different strategies available to connect to a partner:&lt;br /&gt;
1. Connect if outbound data is available&lt;br /&gt;
    The system will create an outbound connection to the partner if any data is available for this partner. Your partners firewall must be configured&lt;br /&gt;
    for your connection to come through.&lt;br /&gt;
2. Connect to partner even if no outbound data is available (Poll n minutes option)&lt;br /&gt;
    The system will create an outbound connection even if no data is available for this partner. As OFTP2 is a push-pull protocol this will&lt;br /&gt;
    receive data from a partner without the need that the partner connects to you. (Partner uses connection strategy 3)&lt;br /&gt;
3. No outbound connection to this partner - the partner will connect&lt;br /&gt;
    Your system will never connect the partner - even if data is available for him. Your partner uses connection strategy 2. &lt;/p&gt;
&lt;h2 id="system-maintenanceadministration"&gt;System maintenance/administration:&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Its recommended to monitor the system - have a look on the user interface from time to time, let the&lt;br /&gt;
    system be monitored by Nagios (or similar), configure the systems mail notification and read these mails&lt;/em&gt;Configure the system to auto delete old transmission logs, this could be done in the system settings. We&lt;br /&gt;
    recommend to not have more than 50000 transmissions in the log as this will slow down the user interface.&lt;br /&gt;
*Please ensure not to make backups on the partition where the mendelson opensource OFTP2 system is running. The&lt;br /&gt;
    system will run into problems if there is no harddisk space left - monitoring the harddisk space is also&lt;br /&gt;
    recommended (e.g. windows could be configured to monitor the space of a partition and write mails, Nagios is&lt;br /&gt;
    also a good option in this case)&lt;/p&gt;
&lt;h2 id="upgrading-to-a-commercial-license"&gt;Upgrading to a commercial license:&lt;/h2&gt;
&lt;p&gt;If you require support and software maintenance for production use of the OFTP2 server please upgrade to a &lt;br /&gt;
commercial license. You could do this in the mendelson online shop at &lt;a href="http://shop.mendelson-e-c.com" rel="nofollow"&gt;http://shop.mendelson-e-c.com&lt;/a&gt;&lt;br /&gt;
The commercial version will work fine with the open source data, there is no need to setup a new configuration.&lt;/p&gt;
&lt;p&gt;Any questions or feedback? Please refer to the forum &lt;a href="http://community.mendelson-e-c.com/forum/oftp2" rel="nofollow"&gt;http://community.mendelson-e-c.com/forum/oftp2&lt;/a&gt;&lt;br /&gt;
We are looking forward for your comments and questions.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Stefan Heller</dc:creator><pubDate>Thu, 27 Mar 2014 13:31:27 -0000</pubDate><guid>https://sourceforge.netff85d5f532ba459bcfa77da5b82a8a5a094fe1a1</guid></item><item><title>Home modified by Stefan Heller</title><link>https://sourceforge.net/p/mendelson-oftp2/wiki/Home/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Welcome to your wiki!&lt;/p&gt;
&lt;p&gt;This is the default page, edit it as you see fit. To add a new page simply reference it within brackets, e.g.: &lt;span&gt;[SamplePage]&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;The wiki uses &lt;a class="" href="/p/mendelson-oftp2/wiki/markdown_syntax/"&gt;Markdown&lt;/a&gt; syntax.&lt;/p&gt;
&lt;p&gt;&lt;h6&gt;Project Members:&lt;/h6&gt;&lt;ul class="md-users-list"&gt;&lt;li&gt;&lt;a href="/u/mendelson/"&gt;Leo Mendelson&lt;/a&gt; (admin)&lt;/li&gt;&lt;li&gt;&lt;a href="/u/heller/"&gt;Stefan Heller&lt;/a&gt; (admin)&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;
&lt;/p&gt;&lt;p&gt;&lt;span class="download-button-517820b65fcbc979600593d6" style="margin-bottom: 1em; display: block;"&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Stefan Heller</dc:creator><pubDate>Wed, 24 Apr 2013 18:13:13 -0000</pubDate><guid>https://sourceforge.neta0e696caf6ae4dce8084e5201b3ca76ee4981099</guid></item></channel></rss>