Hi Gary
you'll need to refactor
UsernamePasswordCredentials out of axis2-kernel
<groupId>org.apache.axis2</groupId>
<artifactId>axis2-kernel</artifactId>
how about using Kerberos instead?
http://thejavamonkey.blogspot.com/2008/09/axis-2-kerberos-web-services-featuring.html
can you suggest another alternative to commons-httpclient?
Martin Gainty
______________________________________________
Verzicht und Vertraulichkeitanmerkung/Note de déni et de confidentialité
Diese Nachricht ist vertraulich. Sollten Sie nicht der vorgesehene Empfaenger
sein, so bitten wir hoeflich um eine Mitteilung. Jede unbefugte Weiterleitung
oder Fertigung einer Kopie ist unzulaessig. Diese Nachricht dient lediglich dem
Austausch von Informationen und entfaltet keine rechtliche Bindungswirkung.
Aufgrund der leichten Manipulierbarkeit von E-Mails koennen wir keine Haftung
fuer den Inhalt uebernehmen.
Ce message est confidentiel et peut être privilégié. Si vous n'êtes pas le
destinataire prévu, nous te demandons avec bonté que pour satisfaire informez
l'expéditeur. N'importe quelle diffusion non autorisée ou la copie de ceci est
interdite. Ce message sert à l'information seulement et n'aura pas n'importe
quel effet légalement obligatoire. Étant donné que les email peuvent facilement
être sujets à la manipulation, nous ne pouvons accepter aucune responsabilité
pour le contenu fourni.
Date: Wed, 8 Aug 2012 13:14:02 +0800
Subject: SSL vulnerability in Apache Axis2
From: [email protected]
To: [email protected]
I heard there is a SSL vulnerability about commons-httpclient-3.1. Is there a
fix on it or a solution?
The vulnerability's description is below.
Axis2 implemented in Java is vulnerable to
man-in-the-middle attacks. By extension, all applications using thislibrary to
establish SSL connections with the target servers arevulnerable. Affected
applications leak all data sent over the network,
such as login credentials, bank account numbers, personal
identifiableinformation, etc. The vulnerability can be exposed in any
networktopology in which a man-in-the-middle can be deployed.
In depth analysis of Axis2 shows that the middleware uses
thecommons-httpclient-3.1 library when establishing SSL connections withtarget
servers. Internally, commons-httpclient-3.1 uses raw sockets to
establish SSL connections. Per JSSE’s manual# raw sockets do notverify the name
of the target server against the name(s) in theserver’s SSL certificate. Since
commons-httpclient-3.1 does not
provide its own hostname verifier to compensate for this omission,this overhaul
renders the framework and all applications built on topof it insecure.
--
Best Regards
Gary
Apache Geronimo