Author: jleroux
Date: Thu Aug 18 11:25:00 2016
New Revision: 1756758

URL: http://svn.apache.org/viewvc?rev=1756758&view=rev
Log:
Updates for Gradle

Modified:
    ofbiz/trunk/tools/security/notsoserial/README.txt

Modified: ofbiz/trunk/tools/security/notsoserial/README.txt
URL: 
http://svn.apache.org/viewvc/ofbiz/trunk/tools/security/notsoserial/README.txt?rev=1756758&r1=1756757&r2=1756758&view=diff
==============================================================================
--- ofbiz/trunk/tools/security/notsoserial/README.txt (original)
+++ ofbiz/trunk/tools/security/notsoserial/README.txt Thu Aug 18 11:25:00 2016
@@ -2,6 +2,6 @@ The notsoserial Java agent was introduce
 We (PMC) decided to comment out RMI OOTB but we also decided to provide a 
simple way to protect yourself from all possible Java serialize vulnerabilities.
 
 While working on the serialize vulnerability, I (Jacques Le Roux) stumbled 
upon this article 
https://tersesystems.com/2015/11/08/closing-the-open-door-of-java-object-serialization/
 and found notsoserial was a Java agent better than the Contrast one I 
introduced at r1717058. Because notsoserial easily protects you from all 
possible serialize vulnerabilities as explained at 
https://github.com/kantega/notsoserial#rejecting-deserialization-entirely
-So I replaced contrast-rO0.jar by notsoserial-1.0-SNAPSHOT at r1730735 + 
r1730736. To be safe in case you use RMI for instance, use one of the 
start*-secure ant targets or use the JVM arguments those targets use.
+So I replaced contrast-rO0.jar by notsoserial-1.0-SNAPSHOT at r1730735 + 
r1730736.  It's now embedded in OFBiz and called by all running Gradle tasks.
 
 You might find more information at 
https://cwiki.apache.org/confluence/display/OFBIZ/The+infamous+Java+serialize+vulnerability
\ No newline at end of file


Reply via email to