It looks like there are a lot of separate issues around client/server security. Perhaps we should open a top-level JIRA issue and then create sub-tasks that identify each of these? That would allow someone or someones interested in improving security to have a one-stop-shop to understand what needs to be fixed...

Thanks,

David

Kathey Marsden wrote:

Bernt M. Johnsen wrote:


Another way around is to look more closely into user authentication
for client-server.


I think that is a good idea to look at the whole client-server
authentication picture, and also look at access for administration and
the default access options.  In addition to the limited JVM options for
password encryption there are other issues.

    * Network Server starts up with only localhost  access by default,
because to enable remote access,  you should  enable user authentication
and run under Java 2 Security manager, steps which I am concerned are
often committed.
    * We never allow administration commands such as runtimeinfo, and
shutdown to be performed remotely because there is no authentication for
this type of access. * Any database name and connection attributes can passed to
network server, allowing attributes such as shutdown of the database,
creation of  a new database, etc.
    * There is no data stream encryption.
     * Derby does not have GRANT/REVOKE.  So users are either in or out
pretty much.
So, I tend to think that more is needed than just more bits for
encryption or Kerberos.    Again I haven't looked into it but wonder
if   SSL support can solve a lot of these problems and then we don't
have to worry too much about the limitations of the underlying client-server protocol. So yes lets *look more closely into user
authentication  and security in general for client-server*   And as an
extra credit item ...

I  would like to see network server start up, by default,  secure and
remotely accessible, but  I don't think there is any way with Java to
verify users with the underlying operating system, but that would be
really great too #:)

Kathey











Reply via email to