What's stopping malicious tampering occurring to the Jetty instance itself, bypassing any configuration changes that might be made?

As Jan mentioned, this is something to address at the OS level - you prevent users from modifying files by not giving them modify permission to that file.
_______________________________________________
jetty-users mailing list
[email protected]
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://www.eclipse.org/mailman/listinfo/jetty-users

Reply via email to