One of our partners sends to multiple states. We are slowly working towards moving to PHINMS 3.1 but it will be later in the fall. They have a mandate to move to 3.1 for another state by June 30th. I am hoping someone has instructions for installing two copies of PHINMS on a single machine so they can add version 3.1 running on a separate TOMCAT instance. That will allow them to send to both 2.9 (ours) and (3.1) until we get time to do the upgrade.
Thanks!
Phill Lowe – 360 236-4261
I have a copy of some old ones that seem to have originated with New York State. They're of early PHINMS v. 2.8.x vintage. Unfortunately only in hard-copy, at this point. The main points are to adjust port designations in Tomcat server.xml file after initial "finish the install and do nothing further," and adjust the corresponding port assignments in phinms.properties file, so as to avoid port duplications between the PHINMS instances. Then modify the appserver\bin\service.bat to alter the SERVICE_NAME and PR_DESCRIPTION for the Tomcat instance, and the sc start Tomcat instruction to match the new SERVICE_NAME, and REM out the sc stop and sc delete line for old services.
Next, run the service.bat install as altered.
Then change the hsqldb 1_install_service.bat file: REM out the sc stop and sc delete lines for the default database and save that file as changed.
Alter the wrapper.conf file in the hsqldb folder to give a new, unique description to the wrapper.ntservice.name, the wrapper.ntservice.displayname and the wrapper.ntservice.description.
Finally, return to the 1_install_service.bat: re-edit it to replace the sc start PHINMSDefaultDatabase with sc start [name change from the wrapper.ntservice.name designation], save the file, and run it.
Of course, those instructions assumed one was installing two instances of the same PHINMS version. But the alterations needed for modifying port numbers and the like for different PHINMS installation versions would just
entail making the changes in the second-install batch files identified above.
One of our partners sends to multiple states. We are slowly working towards moving to PHINMS 3.1 but it will be later in the fall. They have a mandate to move to 3.1 for another state by June 30th. I am hoping someone has instructions for installing two copies of PHINMS on a single machine so they can add version 3.1 running on a separate TOMCAT instance. That will allow them to send to both 2.9 (ours) and (3.1) until we get time to do the upgrade.
Thanks!
Phill Lowe – 360 236-4261
--
This is not one of our more technically savvy partners but they were pretty clear on the point that they needed to upgrade by June 30th so they could continue to report. Could be that Iowa is planning on requiring TLS 1.2 at that point. Do we know who to talk to there?
Phill Lowe – 360 236-4261
The original New York state instructions are attached.
I have a copy of some old ones that seem to have originated with New York State. They're of early PHINMS v. 2.8.x vintage. Unfortunately only in hard-copy, at this point. The main points are to adjust port designations in Tomcat server.xml file after initial "finish the install and do nothing further," and adjust the corresponding port assignments in phinms.properties file, so as to avoid port duplications between the PHINMS instances. Then modify the appserver\bin\service.bat to alter the SERVICE_NAME and PR_DESCRIPTION for the Tomcat instance, and the sc start Tomcat instruction to match the new SERVICE_NAME, and REM out the sc stop and sc delete line for old services.
I am going to invite the Ruvos participants (and any others who care) to address the issue of cipher suite usage, particularly in conjunction with PHINMS v. 2.7 and 2.8.
If one is not using a proxy for outbound PHINMS transmissions, in a situation where the proxy sets the available cipher suite(s) for use, I believe the level of Java's JDK is going to determine what ciphers are available for encrypting the outbound transmissions. The default available cipher suites for Java 6 and Java 7, respectively, can be found at:
https://docs.oracle.com/javase/6/docs/technotes/guides/security/SunProviders.html#SunJSSEProvider
https://docs.oracle.com/javase/7/docs/technotes/guides/security/SunProviders.html#SunJSSEProvider;
In a better world, we'd presumably be using forward secrecy in ciphers with GCM components. An interesting discussion of the general interaction between Tomcat, Java, and available connectors--which discussion is still
fairly current--can be found in Ivan Ristic's Bulletproof SSL and TLS, pages 440-451.