Re: mod_jk or mod_proxy_ajp - encryption benefits?‏

2008-03-07 Thread David Cassidy
James,

You could put the stunnel into a while loop that makes it.
perhaps you could send yourself an email each time it closed ?

stunnel is probably the easiest to setup.

I had written a secure version of mod_ajp for apache 1.3 (ie years ago) 
which did the whole ssl encryption of the traffic with 2 way
authentication it wasn't added to the tomcat source as well no one
wanted it :(

D


On Thu, 2008-03-06 at 17:54 -0500, Christopher Schultz wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 James,
 
 James Ellis wrote:
 | I have done some goog'ling on IPSec and VPN and I have found three
 | possibilities:
 |
 | 1) OpenSSH and Port Forwarding
 |
 | 2) OpenVPN
 |
 | 3) Stunnel (thanks little voice)
 |
 | What concerns me about all three options is error handling.  If my
 | OpenSSH or OpenVPN or Stunnel connection failed/timed out, the whole
 | site would go down.  There would have to be a VERY good and almost
 | instant reconnection taking place.
 |
 | I am also concerned about performance.
 |
 | Any comments?
 
 If you want encryption, you have to sacrifice performance, so just
 forget about that concern right off the bat. Your concerns about
 robustness are certainly reasonable. You should be able to find
 information about restarting connections for each of these products by
 searching their forums, help, etc. Any good VPN should have options for
 restarting them when a failure is detected (but nothing is ever foolproof).
 
 - -chris
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.8 (MingW32)
 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
 
 iEYEARECAAYFAkfQdjIACgkQ9CaO5/Lv0PCfxwCfTDsfjFquhx2Yibw8hKZyTh28
 m8sAoJ8eHlCR5KI/br4KeMwKMDNEXPRH
 =wwmj
 -END PGP SIGNATURE-
 
 -
 To start a new topic, e-mail: users@tomcat.apache.org
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 


-
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: mod_jk or mod_proxy_ajp - encryption benefits ?‏

2008-03-06 Thread James Ellis

I have done some goog'ling on IPSec and VPN and I have found three 
possibilities:
 
1) OpenSSH and Port Forwarding
 
2) OpenVPN
 
3) Stunnel (thanks little voice)
 
What concerns me about all three options is error handling.  If my OpenSSH or 
OpenVPN or Stunnel connection failed/timed out, the whole site would go down.  
There would have to be a VERY good and almost instant reconnection taking place.
 
I am also concerned about performance.
 
Any comments?
 
 

Re: mod_jk or mod_proxy_ajp - encryption benefits?‏

2008-03-06 Thread Christopher Schultz

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

James,

James Ellis wrote:
| I have done some goog'ling on IPSec and VPN and I have found three
| possibilities:
|
| 1) OpenSSH and Port Forwarding
|
| 2) OpenVPN
|
| 3) Stunnel (thanks little voice)
|
| What concerns me about all three options is error handling.  If my
| OpenSSH or OpenVPN or Stunnel connection failed/timed out, the whole
| site would go down.  There would have to be a VERY good and almost
| instant reconnection taking place.
|
| I am also concerned about performance.
|
| Any comments?

If you want encryption, you have to sacrifice performance, so just
forget about that concern right off the bat. Your concerns about
robustness are certainly reasonable. You should be able to find
information about restarting connections for each of these products by
searching their forums, help, etc. Any good VPN should have options for
restarting them when a failure is detected (but nothing is ever foolproof).

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkfQdjIACgkQ9CaO5/Lv0PCfxwCfTDsfjFquhx2Yibw8hKZyTh28
m8sAoJ8eHlCR5KI/br4KeMwKMDNEXPRH
=wwmj
-END PGP SIGNATURE-

-
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: mod_jk or mod_proxy_ajp - encryption benefits?

2008-03-05 Thread David Cassidy
cough stunnel /cough
 

On Mon, 2008-03-03 at 18:39 -0800, David Rees wrote:
 On Mon, Mar 3, 2008 at 9:26 AM, James Ellis [EMAIL PROTECTED] wrote:
  Do you think that little hollow voice can clarify how IPSec would solve this
  problem by giving an example of a software that I could implement to 
  accomplish this?
 
 Google IPSec and VPN and you will find your answer.
 
 -Dave
 
 -
 To start a new topic, e-mail: users@tomcat.apache.org
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 


-
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: mod_jk or mod_proxy_ajp - encryption benefits?

2008-03-03 Thread Mark H. Wood
A hollow voice whispers, IPSec.

-- 
Mark H. Wood, Lead System Programmer   [EMAIL PROTECTED]
Typically when a software vendor says that a product is intuitive he
means the exact opposite.



pgpXHb0gRtjuo.pgp
Description: PGP signature


RE: mod_jk or mod_proxy_ajp - encryption benefits?

2008-03-03 Thread James Ellis

Mark,
 
Do you think that little hollow voice can clarify how IPSec would solve this 
problem by giving an example of a software that I could implement to accomplish 
this?Thanks,Jim
 
 Date: Mon, 3 Mar 2008 12:03:28 -0500 From: [EMAIL PROTECTED] To: 
 users@tomcat.apache.org Subject: Re: mod_jk or mod_proxy_ajp - encryption 
 benefits?  A hollow voice whispers, IPSec.  --  Mark H. Wood, Lead 
 System Programmer [EMAIL PROTECTED] Typically when a software vendor says 
 that a product is intuitive he means the exact opposite. 

Re: mod_jk or mod_proxy_ajp - encryption benefits?

2008-03-03 Thread David Rees
On Mon, Mar 3, 2008 at 9:26 AM, James Ellis [EMAIL PROTECTED] wrote:
 Do you think that little hollow voice can clarify how IPSec would solve this
 problem by giving an example of a software that I could implement to 
 accomplish this?

Google IPSec and VPN and you will find your answer.

-Dave

-
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



mod_jk or mod_proxy_ajp - encryption benefits?

2008-03-02 Thread James Ellis

I know that mod_jk is the battle tested connector between Apache and Tomcat, 
but as I understand it the SSL connection generally terminates at the Apache 
web server and the traffic between Apache and Tomcat (to the AJP connector) is 
unencrypted.  Two questions:

1) Does mod_proxy_ajp provide for any encryption between the web server and the 
app server (Tomcat) that mod_jk does not?
2) If the answer to number 1 above is NO.  Is it possible to keep the server 
certificates on the app servers and so that the connection from the client to 
the app server is encrypted all the way through?  In this case the apache web 
server would simply function as a load balancer/failover solution.

Thanks,
Jim


Re: mod_jk or mod_proxy_ajp - encryption benefits?

2008-03-02 Thread Rainer Jung

James Ellis schrieb:

I know that mod_jk is the battle tested connector between Apache and
Tomcat, but as I understand it the SSL connection generally
terminates at the Apache web server and the traffic between Apache
and Tomcat (to the AJP connector) is unencrypted.  Two questions:

1) Does mod_proxy_ajp provide for any encryption between the web
server and the app server (Tomcat) that mod_jk does not?


No, the AJP13 protocol does not support encryption. Both connectors use 
the same protocol. If you need to use encrypted traffic with AJP13, you 
could tunnel through an encrypted channel.


 2) If the

answer to number 1 above is NO.  Is it possible to keep the server
certificates on the app servers and so that the connection from the
client to the app server is encrypted all the way through?  In this
case the apache web server would simply function as a load
balancer/failover solution.


Again no. We are talking about a reverse proxy situation and as far as I 
know, you can't reverse proxy https without having an ssl endpoint on 
the apache httpd.


For a normal (forward) proxy, httpd supports connect, but I don't know 
how well this works in the real world.


You could also ask on the httpd users list, maybe they know better.


Thanks, Jim


Regards,

Rainer


-
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: mod_jk or mod_proxy_ajp - encryption benefits?

2008-03-02 Thread James Ellis

Inline:

 Date: Sun, 2 Mar 2008 18:16:24 +0100
 From: [EMAIL PROTECTED]
 To: users@tomcat.apache.org
 Subject: Re: mod_jk or mod_proxy_ajp - encryption benefits?
 
 James Ellis schrieb:
  I know that mod_jk is the battle tested connector between Apache and
  Tomcat, but as I understand it the SSL connection generally
  terminates at the Apache web server and the traffic between Apache
  and Tomcat (to the AJP connector) is unencrypted.  Two questions:
  
  1) Does mod_proxy_ajp provide for any encryption between the web
  server and the app server (Tomcat) that mod_jk does not?
 
 No, the AJP13 protocol does not support encryption. Both connectors use 
 the same protocol. If you need to use encrypted traffic with AJP13, you 
 could tunnel through an encrypted channel.


Is this the common practice then when communicating from the web server to the 
application server?  

If not, it seems like an awfully big security hole, since the DMZ is supposed 
be only partly safe.  If someone were to crack into the DMZ and could sniff 
network traffic, then they could in theory listen in to traffic and grab all of 
it in an unencrypted state (which may include credit card information, 
usernames, passwords etc).




 
   2) If the
  answer to number 1 above is NO.  Is it possible to keep the server
  certificates on the app servers and so that the connection from the
  client to the app server is encrypted all the way through?  In this
  case the apache web server would simply function as a load
  balancer/failover solution.
 
 Again no. We are talking about a reverse proxy situation and as far as I 
 know, you can't reverse proxy https without having an ssl endpoint on 
 the apache httpd.
 
 For a normal (forward) proxy, httpd supports connect, but I don't know 
 how well this works in the real world.
 
 You could also ask on the httpd users list, maybe they know better.
 
  Thanks, Jim
 
 Regards,
 
 Rainer
 
 
 -
 To start a new topic, e-mail: users@tomcat.apache.org
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 


Re: mod_jk or mod_proxy_ajp - encryption benefits?

2008-03-02 Thread Bill Barker

James Ellis [EMAIL PROTECTED] wrote in message 
news:[EMAIL PROTECTED]

Inline:

 Date: Sun, 2 Mar 2008 18:16:24 +0100
 From: [EMAIL PROTECTED]
 To: users@tomcat.apache.org
 Subject: Re: mod_jk or mod_proxy_ajp - encryption benefits?

 James Ellis schrieb:
  I know that mod_jk is the battle tested connector between Apache and
  Tomcat, but as I understand it the SSL connection generally
  terminates at the Apache web server and the traffic between Apache
  and Tomcat (to the AJP connector) is unencrypted.  Two questions:
 
  1) Does mod_proxy_ajp provide for any encryption between the web
  server and the app server (Tomcat) that mod_jk does not?

 No, the AJP13 protocol does not support encryption. Both connectors use
 the same protocol. If you need to use encrypted traffic with AJP13, you
 could tunnel through an encrypted channel.


Is this the common practice then when communicating from the web server to 
the application server?

It is relatively uncommon (hence why encryption has taken so long to be 
added to AJP/1.3).  However, sites that have to communicate over a WAN do 
often use SSH tunneling or similar.


If not, it seems like an awfully big security hole, since the DMZ is 
supposed be only partly safe.  If someone were to crack into the DMZ and 
could sniff network traffic, then they could in theory listen in to traffic 
and grab all of it in an unencrypted state (which may include credit card 
information, usernames, passwords etc).


For most sites, if someone were to crack into the DMZ, they would probably 
be more interested in querying your DB server for the credit card 
information, usernames, passwords, etc :).  In other words, you would have 
many much bigger problems to worry about than someone sniffing AJP/1.3 
traffic.  And this is why it is relatively rare to use tunneling with 
AJP/1.3.  Your resources are usually better spent securing your DMZ.





   2) If the
  answer to number 1 above is NO.  Is it possible to keep the server
  certificates on the app servers and so that the connection from the
  client to the app server is encrypted all the way through?  In this
  case the apache web server would simply function as a load
  balancer/failover solution.

 Again no. We are talking about a reverse proxy situation and as far as I
 know, you can't reverse proxy https without having an ssl endpoint on
 the apache httpd.

 For a normal (forward) proxy, httpd supports connect, but I don't know
 how well this works in the real world.

 You could also ask on the httpd users list, maybe they know better.

  Thanks, Jim

 Regards,

 Rainer


 -
 To start a new topic, e-mail: users@tomcat.apache.org
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]





-
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: mod_jk or mod_proxy_ajp - encryption benefits?

2008-03-02 Thread James Ellis

Inline:

 To: users@tomcat.apache.org
 From: [EMAIL PROTECTED]
 Subject: Re: mod_jk or mod_proxy_ajp - encryption benefits?
 Date: Sun, 2 Mar 2008 15:31:21 -0800
 
 
 James Ellis [EMAIL PROTECTED] wrote in message 
 news:[EMAIL PROTECTED]
 
 Inline:
 
  Date: Sun, 2 Mar 2008 18:16:24 +0100
  From: [EMAIL PROTECTED]
  To: users@tomcat.apache.org
  Subject: Re: mod_jk or mod_proxy_ajp - encryption benefits?
 
  James Ellis schrieb:
   I know that mod_jk is the battle tested connector between Apache and
   Tomcat, but as I understand it the SSL connection generally
   terminates at the Apache web server and the traffic between Apache
   and Tomcat (to the AJP connector) is unencrypted.  Two questions:
  
   1) Does mod_proxy_ajp provide for any encryption between the web
   server and the app server (Tomcat) that mod_jk does not?
 
  No, the AJP13 protocol does not support encryption. Both connectors use
  the same protocol. If you need to use encrypted traffic with AJP13, you
  could tunnel through an encrypted channel.
 
 
 Is this the common practice then when communicating from the web server to 
 the application server?
 
 It is relatively uncommon (hence why encryption has taken so long to be 
 added to AJP/1.3).  However, sites that have to communicate over a WAN do 
 often use SSH tunneling or similar.
 

Wait...so encryption HAS been added or HAS NOT been added to AJP/1.3 ?


 
 If not, it seems like an awfully big security hole, since the DMZ is 
 supposed be only partly safe.  If someone were to crack into the DMZ and 
 could sniff network traffic, then they could in theory listen in to traffic 
 and grab all of it in an unencrypted state (which may include credit card 
 information, usernames, passwords etc).
 
 
 For most sites, if someone were to crack into the DMZ, they would probably 
 be more interested in querying your DB server for the credit card 
 information, usernames, passwords, etc :).  In other words, you would have 
 many much bigger problems to worry about than someone sniffing AJP/1.3 
 traffic.  And this is why it is relatively rare to use tunneling with 
 AJP/1.3.  Your resources are usually better spent securing your DMZ.
 

But in most sites, the point of the DMZ is to isolate the web server.  The 
database/application server wouldn't be in the DMZ...just the web server, so 
they couldn't query the database unless they broke through two firewalls (one 
facing internet, one facing dmz).  From what I am gathering though, they could, 
however, sniff traffic that has been decrpyted at the web server (where SSL 
ends) and being sent to the app server (probably to be saved/checked against 
the database).

Is this just an acceptable risk or do most companies use SSL tunneling?



 
 
 
 
2) If the
   answer to number 1 above is NO.  Is it possible to keep the server
   certificates on the app servers and so that the connection from the
   client to the app server is encrypted all the way through?  In this
   case the apache web server would simply function as a load
   balancer/failover solution.
 
  Again no. We are talking about a reverse proxy situation and as far as I
  know, you can't reverse proxy https without having an ssl endpoint on
  the apache httpd.
 
  For a normal (forward) proxy, httpd supports connect, but I don't know
  how well this works in the real world.
 
  You could also ask on the httpd users list, maybe they know better.
 
   Thanks, Jim
 
  Regards,
 
  Rainer
 
 
  -
  To start a new topic, e-mail: users@tomcat.apache.org
  To unsubscribe, e-mail: [EMAIL PROTECTED]
  For additional commands, e-mail: [EMAIL PROTECTED]
 
 
 
 
 
 -
 To start a new topic, e-mail: users@tomcat.apache.org
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 


Re: mod_jk or mod_proxy_ajp - encryption benefits?

2008-03-02 Thread Martin Gainty
James/Rainier

PCI-DSS calls for encryption on all channels where payment information will
be transmitted
is the configuration described here non PCI-DSS compliant?

?
Martin--
- Original Message -
From: James Ellis [EMAIL PROTECTED]
To: Tomcat Users List users@tomcat.apache.org
Sent: Sunday, March 02, 2008 7:15 PM
Subject: RE: mod_jk or mod_proxy_ajp - encryption benefits?



Inline:

 To: users@tomcat.apache.org
 From: [EMAIL PROTECTED]
 Subject: Re: mod_jk or mod_proxy_ajp - encryption benefits?
 Date: Sun, 2 Mar 2008 15:31:21 -0800


 James Ellis [EMAIL PROTECTED] wrote in message
 news:[EMAIL PROTECTED]

 Inline:
 
  Date: Sun, 2 Mar 2008 18:16:24 +0100
  From: [EMAIL PROTECTED]
  To: users@tomcat.apache.org
  Subject: Re: mod_jk or mod_proxy_ajp - encryption benefits?
 
  James Ellis schrieb:
   I know that mod_jk is the battle tested connector between Apache and
   Tomcat, but as I understand it the SSL connection generally
   terminates at the Apache web server and the traffic between Apache
   and Tomcat (to the AJP connector) is unencrypted.  Two questions:
  
   1) Does mod_proxy_ajp provide for any encryption between the web
   server and the app server (Tomcat) that mod_jk does not?
 
  No, the AJP13 protocol does not support encryption. Both connectors use
  the same protocol. If you need to use encrypted traffic with AJP13, you
  could tunnel through an encrypted channel.
 
 
 Is this the common practice then when communicating from the web server
to
 the application server?

 It is relatively uncommon (hence why encryption has taken so long to be
 added to AJP/1.3).  However, sites that have to communicate over a WAN do
 often use SSH tunneling or similar.


Wait...so encryption HAS been added or HAS NOT been added to AJP/1.3 ?


 
 If not, it seems like an awfully big security hole, since the DMZ is
 supposed be only partly safe.  If someone were to crack into the DMZ
and
 could sniff network traffic, then they could in theory listen in to
traffic
 and grab all of it in an unencrypted state (which may include credit
card
 information, usernames, passwords etc).
 

 For most sites, if someone were to crack into the DMZ, they would probably
 be more interested in querying your DB server for the credit card
 information, usernames, passwords, etc :).  In other words, you would have
 many much bigger problems to worry about than someone sniffing AJP/1.3
 traffic.  And this is why it is relatively rare to use tunneling with
 AJP/1.3.  Your resources are usually better spent securing your DMZ.


But in most sites, the point of the DMZ is to isolate the web server.  The
database/application server wouldn't be in the DMZ...just the web server, so
they couldn't query the database unless they broke through two firewalls
(one facing internet, one facing dmz).  From what I am gathering though,
they could, however, sniff traffic that has been decrpyted at the web server
(where SSL ends) and being sent to the app server (probably to be
saved/checked against the database).

Is this just an acceptable risk or do most companies use SSL tunneling?



 
 
 
 
2) If the
   answer to number 1 above is NO.  Is it possible to keep the server
   certificates on the app servers and so that the connection from the
   client to the app server is encrypted all the way through?  In this
   case the apache web server would simply function as a load
   balancer/failover solution.
 
  Again no. We are talking about a reverse proxy situation and as far as
I
  know, you can't reverse proxy https without having an ssl endpoint on
  the apache httpd.
 
  For a normal (forward) proxy, httpd supports connect, but I don't know
  how well this works in the real world.
 
  You could also ask on the httpd users list, maybe they know better.
 
   Thanks, Jim
 
  Regards,
 
  Rainer
 
 
  -
  To start a new topic, e-mail: users@tomcat.apache.org
  To unsubscribe, e-mail: [EMAIL PROTECTED]
  For additional commands, e-mail: [EMAIL PROTECTED]
 




 -
 To start a new topic, e-mail: users@tomcat.apache.org
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]



-
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: mod_jk or mod_proxy_ajp - encryption benefits?

2008-03-02 Thread David Rees
On Sun, Mar 2, 2008 at 6:42 PM, Martin Gainty [EMAIL PROTECTED] wrote:
  PCI-DSS calls for encryption on all channels where payment information will
  be transmitted is the configuration described here non PCI-DSS compliant?

No, PCI-DSS calls for encryption of card data across open, public
networks. If your connection between Apache and Tomcat is open and
public (not common, typically it is on a secured LAN, then yes, your
typical mod_jk or mod_proxy_ajb would not be sufficient.

-Dave

-
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]