[
https://issues.apache.org/jira/browse/DERBY-3083?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12543832
]
Aaron Digulla commented on DERBY-3083:
--------------------------------------
> To my thinking increasing a security hole in any way is not a good direction
> to go in.
That would mean it is okay for users, who have to rename the JARs, to have no
security at all.
Your whole argument goes like this: Someone hacks the VM, intercepts the
bytecode executor or the JIT, injects malicious code in the right place (after
the system properties from the command line have been overwritten by
NetworkServerControl.installSecurityManager() and before they are used to
install the security policy) and thus takes over the network manager. A
possible scenario, I admit. Anyone here who believes this will ever happen?
If I gain access to the VM, it would be much more simple to use the debug API
to replace the class implementing the SecurityManager or to patch the JARs and
restart the service.
So ... yes, Ricks approach widens the security window but I fail to see it
creating a wider attack vector than what we already have. If you have access to
the VM, then you can whack this security scheme to death but my understanding
of the whole secuity manager in the Derby context is to make sure it is not
possible to inject malicious code from the network side. At the time when the
SM is installed, Derby doesn't accept connections, so there is no attack vector
at this time.
After that, the SM is installed and malicious code from outside is confined
within the limits of the SM.
If someone has access to the machine, no SM in the world can prevent them to
play with the JARs, the classpath or the VM. That is host security and
completely outside the scope of Derby.
> Network server demands a file called "derbynet.jar" in classpath
> ----------------------------------------------------------------
>
> Key: DERBY-3083
> URL: https://issues.apache.org/jira/browse/DERBY-3083
> Project: Derby
> Issue Type: Bug
> Components: Tools
> Affects Versions: 10.3.1.4
> Reporter: Aaron Digulla
> Attachments: derby-716-10-datatypesCollation-aa.diff
>
>
> The network server will not start if the derbynet jar is added under a
> different name than "derbynet.jar" to the classpath. This makes it impossible
> to use it in maven projects where the jar is renamed to
> "derbynet-10.3.1.4.jar".
> This did work with 10.2.2.0
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.