[
https://issues.apache.org/jira/browse/WICKET-6559?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16900898#comment-16900898
]
ASF subversion and git services commented on WICKET-6559:
---------------------------------------------------------
Commit c7b60fe8e04fa128a8aa2bed4db6b37dbd341d8b in wicket's branch
refs/heads/master from Emond Papegaaij
[ https://gitbox.apache.org/repos/asf?p=wicket.git;h=c7b60fe ]
WICKET-6559: Do not serialize SecureRandom
Deserialization will require new seeding, which will exhaust
the entrophy pool from your OS.
> Encrypted page store
> --------------------
>
> Key: WICKET-6559
> URL: https://issues.apache.org/jira/browse/WICKET-6559
> Project: Wicket
> Issue Type: New Feature
> Components: wicket
> Reporter: Emond Papegaaij
> Assignee: Emond Papegaaij
> Priority: Major
>
> To make it virtually impossible to tamper with any serialized data on disk,
> Wicket should encrypt the data with a key bound to the user session. This
> also prevents accidental leakage of sensitive data (such as passwords) via
> serialized form contents.
--
This message was sent by Atlassian JIRA
(v7.6.14#76016)