Phil,
I've run it on a 7.x JDK.  You have to tweak a few of its security setting. That fixed some bugs and introduced others.  Things start getting ugly on a 8.x JDK.  Of course Tomcat will have it's own idea about which JDK should be used.
In my opinion these types of updates don't actually do much for (internal)Â security. Appropriate firewalls, private subnets, secured servers and files systems, properly configured proxy services... these are the things that will actually protect an application like PHINMS. Â But I understand the "placate" factor (sigh).
Also keep in mind PHINMS makes use of several rather old jar libraries that have at least as much influence as the JDK/Tomcat does on security, and is still using triple DES as the primary payload encryption algorithm.  That of course is coded into the application and independent of JDK, OS, etc.
).We use PHINMS with Tomcat 7 + APR and JDK 8 on CentOS and Amazon Linux.
We have a zip based release that includes some fixes we had to make (for mysql etc).
Program is in /opt, configuration in /etc and logging in /var/log.
Seems to work well.
Thanks,
Frans
Frans,
Could you expound on the nature/details of your "zip release" and "fixes"? Are these things people could manage from a standard CDC distribution? Are there published patches or instructions available? I imagine Phil would appreciate knowing if this was something he could practically expect to do himself given the resources available to him.
The last time I checked with CDC (admittedly a few years back), PHINMS could not be "freely distributed", either in original, partial, or derived form. I could probably dig up the email exchange if anyone wanted to see the exact request and CDC response.
My interest at the time was to provide a pre-configured PHINMS installer to clients rather than make them struggle through the client configuration for specific receivers. Similarly I might be inspired to post packages using newer JVM's and/or Web Containers were that allowed. That of course is what led me to write open sourced Phineas now on GITHUB.
Alas, the world has moved on and PHINMS appears to be at "end of life". It will be interesting to see exactly how long inertia carries it (and this group) forward.
cheers
Tom
All good points and I totally agree (hence PHINMS "inertia").  OTOH, CDC has said "no more PHINMS updates" and Phil (original post) has presented a real world issue that many folks will be forced to deal with.  Who do your clients call when their server group say "move PHINMS to MS server 2013"? Whether real or perceived, they may not get 3-5 years to address their organizations or clients (updated) security requirements.
With the CDC focus on MTS there appears to be a growing "gap" in support for health messaging.  Who and how do we go about addressing that as a community (as I was alluding to in my reply to Frans), and get real solutions to folks like Phil?
Tom