----- Original Message -----
From: "William A. Rowe, Jr." <[EMAIL PROTECTED]>
To: "Tomcat Developers List" <dev@tomcat.apache.org>
Cc: <[EMAIL PROTECTED]>
Sent: Tuesday, October 25, 2005 9:03 AM
Subject: Re: Status/Authority of AJP/1.5


> Costin Manolache wrote:
> >
> > Security ( i.e. authentication ) might be the only reason to extend
> > AJP - but even this can be done on top of the existing protocol, using
> > a custom header and connection initiation.
>
> Only partly true.  Let's take the HTTPS state, for example... if tomcat
looks
> for X-PROTOCOL=HTTPS, for example, passing this from the proxy as a
typical
> header is simply wrong for security reasons.  It's too trivial to fake,
and
> it's too expensive to guard against.
>
> The safe way is to have two header-types, one, a client HTTP-type header.
The
> other, proxy metadata such as the protocol, SSL keys and other server
variables.
> These wouldn't be relayed as HTTP-style headers, so therefore all sorts of
proxy
> to backend data can be trusted.
>

Urm, all of this is already part of the AJP/1.3 protocol, and now that BZ
#36883 is fixed, is working well in mod_proxy_ajp.  The main limitation with
the current protocol here is that AJP/1.3 only sends actual client-cert
instead of the entire chain.

One idea would be to expose the SSL data via a callback Msg, so that
Servlets that aren't going to look at it don't have to waste time asking
mod_ssl for the data.  But it's probably not that big of a deal.

> (FYI - w.r.t. the client/server certs, I don't suggest a full blown
mod_ssl
> type of decomposition.  If they want to tear apart the certificates, it
sure
> makes sense to introspect them through jsse, no?)
>
> Bill
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>



This message is intended only for the use of the person(s) listed above as the 
intended recipient(s), and may contain information that is PRIVILEGED and 
CONFIDENTIAL.  If you are not an intended recipient, you may not read, copy, or 
distribute this message or any attachment. If you received this communication 
in error, please notify us immediately by e-mail and then delete all copies of 
this message and any attachments.

In addition you should be aware that ordinary (unencrypted) e-mail sent through 
the Internet is not secure. Do not send confidential or sensitive information, 
such as social security numbers, account numbers, personal identification 
numbers and passwords, to us via ordinary (unencrypted) e-mail.


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to