[ 
https://issues.apache.org/jira/browse/WICKET-6559?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16900898#comment-16900898
 ] 

ASF subversion and git services commented on WICKET-6559:
---------------------------------------------------------

Commit c7b60fe8e04fa128a8aa2bed4db6b37dbd341d8b in wicket's branch 
refs/heads/master from Emond Papegaaij
[ https://gitbox.apache.org/repos/asf?p=wicket.git;h=c7b60fe ]

WICKET-6559: Do not serialize SecureRandom

Deserialization will require new seeding, which will exhaust
the entrophy pool from your OS.


> Encrypted page store
> --------------------
>
>                 Key: WICKET-6559
>                 URL: https://issues.apache.org/jira/browse/WICKET-6559
>             Project: Wicket
>          Issue Type: New Feature
>          Components: wicket
>            Reporter: Emond Papegaaij
>            Assignee: Emond Papegaaij
>            Priority: Major
>
> To make it virtually impossible to tamper with any serialized data on disk, 
> Wicket should encrypt the data with a key bound to the user session. This 
> also prevents accidental leakage of sensitive data (such as passwords) via 
> serialized form contents.



--
This message was sent by Atlassian JIRA
(v7.6.14#76016)

Reply via email to