[
https://issues.apache.org/jira/browse/DERBY-6764?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Mamta A. Satoor updated DERBY-6764:
-----------------------------------
Attachment: DERBY6764_10_8_backport_patch1_diff.txt
I tried backporting this jira to 10.8 but I am getting following error very
early on when I try to junit suite(also, had to make hand change for the
backport to work because there is no String.contains(..) method in jk1.4 so I
changed the backport code to use String.indexOf(...)>=0 but that should not
cause any problems). I am trying to run junit suite with IBM jdk1.6
(emb)derbynet.PrepareStatementTest.testBasicPrepare used 65 ms .
(emb)derbynet.PrepareStatementTest.testParameterTypes used 89 ms .
(emb)derbynet.PrepareStatementTest.testBigTable used 1155 ms .
(emb)derbynet.PrepareStatementTest.testBigDecimalSetObject used 58 ms .
(emb)derbynet.PrepareStatementTest.testBigDecimalSetObjectWithScale used 20 ms .
(emb)derbynet.PrepareStatementTest.testVaryingClientParameterTypeBatch used 22
ms .
(emb)derbynet.PrepareStatementTest.testSmallBigDecimal used 26 ms .
(emb)derbynet.PrepareStatementTest.testManyPreparedStatements used 147 ms .
(emb)derbynet.PrepareStatementTest.testInvalidTimestamp used 26 ms .
(emb)derbynet.PrepareStatementTest.testSplitQRYDTABlock used 300 ms .
(emb)derbynet.PrepareStatementTest.testExcpetionWithBigParameter used 50 ms .
(emb)derbynet.PrepareStatementTest.testLargeReplies used 73 ms .
(emb)derbynet.PrepareStatementTest.testAlternatingLobValuesAndNull used 80 ms .
(emb)derbynet.PrepareStatementTest.testLargeBatch used 3602 ms .
(emb)derbynet.PrepareStatementTest.testDSSLength used 91 ms .
(emb)derbynet.PrepareStatementTest.testVariationOfSetObject used 42 ms .
(emb)derbynet.PrepareStatementTest.testLargeParameters_a used 28 ms .
(emb)derbynet.PrepareStatementTest.testLargeParameters_b used 43 ms .
(emb)derbynet.PrepareStatementTest.testDerby3230 used 26 ms .
(emb)derbynet.PrepareStatementTest.testReadBlobCloseToMaxDssLength used 13 ms .
(emb)derbynet.PrepareStatementTest.testLongColumn used 21 ms
EEEEEEEEEESTART-SPAWNED:SpawnedNetworkServer STANDARD OUTPUT: exit code=1
Fri Nov 21 13:55:01 PST 2014 : Security manager installed using the Basic
server security policy.
Fri Nov 21 13:55:02 PST 2014 : Access denied ("java.net.SocketPermission"
"localhost:1527" "listen,resolve")
java.security.AccessControlException: Access denied
("java.net.SocketPermission" "localhost:1527" "listen,resolve")
at java.security.AccessController.throwACE(AccessController.java:100)
at
java.security.AccessController.checkPermission(AccessController.java:174)
at java.lang.SecurityManager.checkPermission(SecurityManager.java:562)
at java.lang.SecurityManager.checkListen(SecurityManager.java:1147)
at java.net.ServerSocket.bind(ServerSocket.java:442)
at java.net.ServerSocket.<init>(ServerSocket.java:256)
at
javax.net.DefaultServerSocketFactory.createServerSocket(ServerSocketFactory.java:6)
at
org.apache.derby.impl.drda.NetworkServerControlImpl.createServerSocket(NetworkServerControlImpl.java:674)
at
org.apache.derby.impl.drda.NetworkServerControlImpl.access$000(NetworkServerControlImpl.java:95)
at
org.apache.derby.impl.drda.NetworkServerControlImpl$1.run(NetworkServerControlImpl.java:724)
at
java.security.AccessController.doPrivileged(AccessController.java:330)
at
org.apache.derby.impl.drda.NetworkServerControlImpl.blockingStart(NetworkServerControlImpl.java:719)
at
org.apache.derby.impl.drda.NetworkServerControlImpl.executeWork(NetworkServerControlImpl.java:2250)
at
org.apache.derby.drda.NetworkServerControl.main(NetworkServerControl.java:331)
END-SPAWNED :SpawnedNetworkServer STANDARD OUTPUT:
F
> analyze impact of poodle security alert on Derby client - server ssl support
> ----------------------------------------------------------------------------
>
> Key: DERBY-6764
> URL: https://issues.apache.org/jira/browse/DERBY-6764
> Project: Derby
> Issue Type: Task
> Affects Versions: 10.10.2.0, 10.11.1.1, 10.12.0.0
> Reporter: Myrna van Lunteren
> Assignee: Mamta A. Satoor
> Fix For: 10.10.2.1, 10.11.1.3, 10.12.0.0
>
> Attachments: DERBY6764_10_8_backport_patch1_diff.txt,
> DERBY6764_backport10_11_patch1_diff.txt, DERBY6764_patch1_diff.txt,
> DERBY6764_patch1_stat.txt
>
>
> Recently, a security weakness was found in SSLv3, POODLE: SSLv3 vulnerability
> (CVE-2014-3566)
> Derby supports ssl between the client and network server.
> We should investigate this and decide if we need to change our product, e.g.
> to eliminate support for SSL in favor of its successor TLS.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)