On 1/19/2016 12:06 AM, Fraser Tweedale wrote:
Updated patch attached; comments inline.

On Mon, Jan 11, 2016 at 01:11:24PM -0600, Endi Sukma Dewata wrote:
On 11/4/2015 11:22 PM, Fraser Tweedale wrote:
The attached patch fixes GET-based OCSP requests,
https://fedorahosted.org/pki/ticket/1658

Cheers,
Fraser

Some comments:

1. The ALLOW_ENCODED_SLASH parameter will fix the problem, but there's a
security concern:

http://tomcat.apache.org/tomcat-7.0-doc/security-howto.html

The org.apache.catalina.connector.CoyoteAdapter.ALLOW_BACKSLASH and
org.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH system properties
allow non-standard parsing of the request URI. Using these options when
behind a reverse proxy may enable an attacker to bypass any security
constraints enforced by the proxy.

However, since we are not dependent on a proxy to protect PKI pages in
Tomcat (we have our own ACL in PKI) I suppose this is not an issue, unless
anybody else has a concern.

I do not see a vulnerability - AFAICT the vulnerability was from
proxies enforcing path-based access control but parsed path
differently, which as you point out is not our situation.  Hopefully
we are not overlooking something.

2. I think the catalina.properties that needs to be modified is in
base/server/share/conf. The others are duplicates that should've been
removed.

Patch updated.  I'll send another patch removing the obsolete
catalina.properties files soon.

3. During deployment the catalina.properties is copied into <instance
dir>/conf. So if we want to fix existing instances we need to write an
upgrade script.

Added an upgrade script.

Thanks for reviewing!
Fraser


ACK.

--
Endi S. Dewata

_______________________________________________
Pki-devel mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/pki-devel

Reply via email to