Michael,

Thanks for taking the time to check the security systems of J2. The more eyes the better!

However, I believe that these concerns are not as significant as one might think at first glance.

1. If you are using J2 as a SSO solution, you should be using HTTPS/SSL for the portal and all content aggregated by the portal. This will upgrade the connections under most normal conditions to ensure user credentials are not "in the clear". The redirects in J2 are no more or less secure than the initial post in login portlet. The redirects and form entry techniques are designed to implement the standard JAAS container authentication model and are widely used.

2. AFAIK, the redirect pages are specifically NOT cached or included in the browser history. Browsers are explicitly instructed not to cache to any portal requests. This should ensure that after a session is closed, no memory of the portal session should persist.

Please let us know if you see any behavior to the contrary. AFAIK, J2 uses no technique that is not employed commonly on secure websites. It is designed to be a solid SSO solution... this is certainly a common portal use case!

Let us know if you see any other suspect behavior,

Randy

Michael Gustav Simon wrote:
Hi J2-Users,
to integrate J2 as a "SingleSignOn"-Client, I analyze the login process in
detail.
I think that the redirect to the login.jsp from the LoginJSPViewValveImpl in
the LoginPipeline is not secure.
The username and password will be send to the client in plain text!
The javascript in the body tag will post the data to the servlet container
with the javascript call onload.
...
<body onLoad='document.forms["login"].submit();'>
...
What is about the browser cache?

mg



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to