Connectivity Options
Bluefin support for Decryptx connectivity.
Bluefin supports two methods of connectivity to the Decryptx service:
- Managed services
- Internet
Managed Services
While the Internet has proven very reliable for decryption processing, those seeking guaranteed delivery to Bluefin’s Decryptx platform should consider a dedicated, managed service. Bluefin has partnered with Transaction Network Services (TNS) for clients requiring high transaction per second and low latency. Transactions over the managed service are sent via https. TNS offers numerous connectivity options. Additional information can be found here.
In Bluefin's recommended configuration, transport to Bluefin will be via diverse telecommunication providers. This guarantees both hardware and connectivity diversity for the Decryptx service.
Internet Connectivity
Clients may also connect to Bluefin over the Internet via HTTPS. The Internet connectivity option is intended for the following types of clients:
- Clients who do not require a communications SLA since packet delivery over the Internet cannot be guaranteed.
- Clients who do not have the infrastructure to support dedicated hardware. For example, clients who use AWS or other "cloud" based infrastructure for their service delivery.
- Clients who are not sensitive to the inherent latency of the Internet.
Clients connecting to either the Decryptx certification or production environments must provide their source IP addresses to Bluefin. Client IP addresses must be whitelisted for connectivity to the Decryptx environment.
Important
For maintenance and processing availability purposes, clients connecting over the Internet are REQUIRED to support DNS resolution for the processing URL https://secure-prod.decryptx.com/api
Best Practices for Persistent HTTP Connections
Overview
Persistent HTTP connections, also known as HTTP keep-alive, are a mechanism that allows the same TCP connection to send and receive multiple HTTP requests and responses. This can significantly reduce latency for consecutive requests, as well as lower CPU and memory use, since there's no need to set up a new connection for each request.
However, we strongly recommend against setting up persistent HTTP connections to our platform with an indefinite keep-alive timeout.
Why Not to Use Indefinite Keep-Alive Connections
DNS-based Traffic Routing
Our platform uses DNS-based traffic routing for maintenance, vulnerability scans, and code deployments. An indefinite keep-alive connection can interfere with this routing strategy, causing your application to miss real-time updates and possibly send requests to retired or less optimal endpoints.
Latency
While persistent connections can initially be advantageous for reducing latency, they can become less efficient over time. Your initially optimal network path might become suboptimal, increasing the latency of the http requests.
Security Risks
Longer-lived connections offer an extended window for potential attackers to exploit vulnerabilities, leading to unauthorized access or data breaches.
Our Recommendations
5-Minute Timeout
Please set a 5-minute timeout on all persistent connections to our platform.
Stagger Connection Pooling
If your application uses connection pooling, stagger your persistent connections. This helps ensure that you always have some connections that are "fresh" and more likely to be routed optimally.
Sample Request with 5-minute Timeout
Here is how you can configure your HTTP request to have a 5-minute keep-alive timeout:
POST /api/device/validate HTTP/1.1
Host: secure-prod.decryptx.com
Connection: keep-alive
Keep-Alive: timeout=300
Content-Type: application/json
Content-Length: 86
{
"partnerId" : "bluefin",
"partnerKey" : “<REDACTED>"
}
By setting the Connection
header to keep-alive
and specifying a Keep-Alive: timeout=300
(300 seconds is equivalent to 5 minutes), you can maintain a persistent connection while adhering to our platform's guidelines.
Inactivity Termination
Note that all connections to our platform will be terminated after 5 minutes of inactivity. Please design your applications to handle this gracefully.
By following these guidelines, you help ensure that your interactions with our platform are efficient, secure, and reliable.
Decryptx Internet IP Addresses
Decryptx clients processing over the Internet who wish to whitelist the Decryptx IP addresses in their firewalls should contact Bluefin Bluefin support for a list of IP addresses that should be included in their firewall's configuration.
Updated about 1 year ago