CryptoPage edited by willem jiang
Comment:
CAMEL-6742
Changes (4)
Full ContentCryptoAvailable as of Camel 2.3 The Crypto Data Format integrates the Java Cryptographic Extension into Camel, allowing simple and flexible encryption and decryption of messages using Camel's familiar marshall and unmarshal formatting mechanism. It assumes marshalling to mean encryption to cyphertext and unmarshalling to mean decryption back to the original plaintext. Options
Basic UsageAt its most basic all that is required to encrypt/decrypt an exchange is a shared secret key. If one or more instances of the Crypto data format are configured with this key the format can be used to encrypt the payload in one route (or part of one) and decrypted in another. For example, using the Java DSL as follows: In Spring the dataformat is configured first and then used in routes <camelContext id="camel" xmlns="http://camel.apache.org/schema/spring"> <dataFormats> <crypto id="basic" algorithm="DES" keyRef="desKey" /> </dataFormats> ... <route> <from uri="direct:basic-encryption" /> <marshal ref="basic" /> <to uri="mock:encrypted" /> <unmarshal ref="basic" /> <to uri="mock:unencrypted" /> </route> </camelContext>
Hashed Message Authentication Codes (HMAC)To avoid attacks against the encrypted data while it is in transit the CryptoDataFormat can also calculate a Message Authentication Code for the encrypted exchange contents based on a configurable MAC algorithm. The calculated HMAC is appended to the stream after encryption. It is separated from the stream in the decryption phase. The MAC is recalculated and verified against the transmitted version to insure nothing was tampered with in transit.For more information on Message Authentication Codes see http://en.wikipedia.org/wiki/HMAC or with spring. By default the HMAC is calculated using the HmacSHA1 mac algorithm though this can be easily changed by supplying a different algorithm name. See here for how to check what algorithms are available through the configured security providers or with spring. Supplying Keys DynamicallyWhen using a Recipient list or similar EIP the recipient of an exchange can vary dynamically. Using the same key across all recipients may neither be feasible or desirable. It would be useful to be able to specify keys dynamically on a per exchange basis. The exchange could then be dynamically enriched with the key of its target recipient before being processed by the data format. To facilitate this the DataFormat allow for keys to be supplied dynamically via the message headers below
or with spring. PGPDataFormat Options
PGPDataFormat Message HeadersYou can override the PGPDataFormat options by applying below headers into message dynamically.
Encrypting with PGPDataFormatThe following sample uses the popular PGP format for encrypting/decrypting files using the Bouncy Castle Java libraries: The following sample performs signing + encryption, and then signature verification + decryption. It uses the same keyring for both signing and encryption, but you can obviously use different keys: Or using Spring: To work with the previous example you need the following
Managing your keyringTo manage the keyring, I use the command line tools, I find this to be the simplest approach in managing the keys. There are also Java libraries available from http://www.bouncycastle.org/java.html if you would prefer to do it that way.
DependenciesTo use the Crypto dataformat in your camel routes you need to add the following dependency to your pom. <dependency> <groupId>org.apache.camel</groupId> <artifactId>camel-crypto</artifactId> <version>2.9.0</version> </dependency> See Also
Stop watching space
|
Change email notification preferences
View Online
|
View Changes
|
Add Comment
|
- [CONF] Apache Camel > Crypto Colm O hEigeartaigh (Confluence)
- [CONF] Apache Camel > Crypto Jakub Korab (Confluence)
- [CONF] Apache Camel > Crypto Jakub Korab (Confluence)
- [CONF] Apache Camel > Crypto willem jiang (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)