On Nov 26, 2006, at 9:36 PM, Rakesh Midha wrote:

I accept your point that on a non-secure machine it doesn't help to have application or server level security bcoz one can anyway delete file system or do lot of bad things. In that case why do we have deploy tool asking for user/password even on local machine.

My thinking is "We put locks on our home not for thiefs (anyways thiefs can break locks), we put lock to stop others to not use open home oportunity" What I mean to say is we dont need to make applications secure on non-secure machine for felons but for ourselves that we dont delete or change our applications by mistake.

The point I was trying to make is,
1. We should consider thinking additing some additional security in hot-deployer (there are so many illigal things which can be done, but atleast our server should not facilitate them)

I still think that hot deploy should only be used in a development environment and since the only reason to use it is convenience, making it harder in any way is a bad idea.
2. Having an editable config file, doesn't make lot of sense from security point of view, can we consider encripting it?
The main purpose of the current config file format is to make it reasonably easy to edit the configuration by hand. What would encrypting the config file gain that would not be better served by appropriate OS file permissions?
3. Can we consider, making our repository only readable and not editable from outside.
What specifically do you have in mind? I thought that stuff like installing a plugin already requires you to log into the config console. Since one of the main ideas behind geronimo is to make it easy to assemble, extend, or contract a server, it seems to me that a read-only repository would create problems.

I think it would be more useful to look into authenticating that everything in the repo is what it claims to be. I imagine that this would use either jar signing for jars or signing a hash of the jar file. I don't think there is any standard way to authenticate car files (or car directories in a geronimo repo). I've heard that jar signing tends to introduce additional problems but I don't have any experience with that.

Another security improvement.... not exactly a security hole.... is that currently some Subjects are specified completely in application plans, for things like default subjects and run-as subjects. It would be much better if these subjects were produced by the same login configuration that the rest of the app is using and the plan had only the login info in it. This leads onto Simon Godik's idea of a password safe to hold the credentials needed for these default logins. I've often thought that the next step would be to require credentials to start the server (and unlock the password safe), but I haven't thought through this idea at all yet.

I might be missing the point behind your suggestions, if I have please explain in more detail.

thanks
david jencks




thanks
Rakesh


On 11/25/06, David Jencks <[EMAIL PROTECTED]> wrote:

On Nov 25, 2006, at 9:29 AM, Aaron Mulder wrote:

> On 11/25/06, David Jencks <[EMAIL PROTECTED]> wrote:
>> If your machine is unsecured, then people deploying rogue apps in
>> geronimo should probably be the least of your worries.
>>
>> If you are still concerned about the security of the hot deployer,
>> you should turn it off.
>
> Except that if the machine is really unsecured, there's little you can > do. You can turn the hot deployer service off but if someone timed it
> right they could edit config.xml and cause the hot deployer to start
> next time Geronimo was started.  Or edit the accounts in the
> administrative security realm and then just use the deploy tool. You
> could delete things from the repository but they could put them back
> there. Bottom line, if you're concerned about security, I think your > app server file permissions should be locked down, regardless of which
> product you're using.

Exactly.  I meant "If you are still concerned about the security of
the hot deployer after thoroughly securing your machine, turn the hot
deployer off."  I should have added, remove the hot deploy jar and
car from your server.

thanks
david jencks

>
> Thanks,
>     Aaron
>
>> On Nov 23, 2006, at 10:27 PM, Rakesh Midha wrote:
>>
>> > Hello
>> >
>> > I was wondering if this is a security breach.
>> >
>> > If I deploy some business critical application names myApp on
>> > Geronimo server deployed using deploy tool or hot deployer. Now
>> > with deploy tool I cannot change or uninstall this application
>> > without Geronimo username and password.
>> >
>> > If for some reason my machine is unsecured and I am dependent on
>> > Geronimo security, one can easily manuplate or uninstall my
>> > application by just placing a junk application named myApp in my
>> > hot deployer. isn't it a security breach.
>> >
>> > I think I should be allowed to
>> > 1. Configure security settings for Hot deployer
>> > 2. Start and stop hot deployment (which can be done by stopping
>> > hotdeploy module)
>> > 3. One way could be, All the hot deployer operations prompt for
>> > username and password on server console.
>> >
>> > What is your view on this? Am I missing something?
>> >
>> > Thanks
>> > Rakesh
>> >
>> >
>>
>>



Reply via email to