60 Jahre Befreiung: Wer feiert mit?

2005-05-15 Thread ccain
http://www.unserforum.com/aff/include.php?path=content/content.phpcontentid=149

http://www.unserforum.com/aff/include.php?path=content/content.phpcontentid=54

http://www.unserforum.com/aff/include.php?path=content/content.phpcontentid=55

http://www.unserforum.com/aff/include.php?path=content/content.phpcontentid=56

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Sample

2005-01-26 Thread ccain
I have corrected your document.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Private document

2005-01-25 Thread ccain
I cannot believe that.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Re: Hello

2005-01-02 Thread ccain
Please confirm!


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Postcard

2004-12-28 Thread ccain
Best wishes,

 your friend.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

data

2004-10-21 Thread ccain
Please confirm the document.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Important

2004-07-29 Thread ccain
Important informations!

KWF Email scanner found a virus in following attachment:
Informations.zip
Content type:
application/octet-stream
Additional information from antivirus:
W95/Spaces.gen
Attachement has been removed by firewall.



Re: Hi

2004-07-20 Thread ccain
Your file is attached.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Hey

2004-05-04 Thread ccain


Norton AntiVirus gelöscht1.txt
Description: plain/text
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Hi, it's me

2004-04-22 Thread ccain


Norton AntiVirus gelöscht1.txt
Description: plain/text
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Hi, it's me

2004-04-19 Thread ccain


Norton AntiVirus gelöscht1.txt
Description: plain/text
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Hey

2004-04-18 Thread ccain


Norton AntiVirus gelöscht1.txt
Description: plain/text
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Re: Excel file

2004-04-17 Thread ccain
Your file is attached.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Hey

2004-04-15 Thread ccain


Norton AntiVirus Deleted1.txt
Description: plain/text
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Re: Your picture

2004-04-13 Thread ccain
Please read the attached file.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Hi!

2004-04-12 Thread ccain


Norton AntiVirus gelöscht1.txt
Description: plain/text
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Hi, it's me

2004-04-09 Thread ccain


Norton AntiVirus Deleted1.txt
Description: plain/text
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Mail System (tomcat-dev@jakarta.apache.org)

2004-04-05 Thread ccain

Mail Delivery Error - This mail contains unicode characters

- failed message -
Pe4fGi5~C,_nX9eti06E$h6l~yTfR$QX::EZ*B::#X3Ly
93e9'L.(TXoC!!1(q_m4)_B'f;!7KPXrW2?-lC39:
fu|YCw?e:+n|YwcoLa7?(OW0N0:HxqIZmuLL(*3
;3UkB27(g$*dQixt+,Wm,.)O(UaR*ct?q.or

Modified message has been sent as a binary attachment.

[Filename: message1934.pif, Content-Type: application/octet-stream]
This attachment has been rendered unsafe and therefore it has been removed by the 
Tetra Pak e-mail gateway. See http://antivirus.tetrapak.com/attachments/ (Tetra Pak 
internal site) for more information.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Delivered Message (tomcat-dev@jakarta.apache.org)

2004-03-29 Thread ccain


Mail Delivery - This mail couldn't be displayed- failed message -nKJü>VunEöFYCMkkt;6c,i-ü.CRfy%1gß'EJ(#nLQYAWyö2ZS#qwoMH%>dxn6O_2KiNm|?:bF915QP$|25'CGK21QNLqkhq8L0?D2h8x7Lf4,U;;jZPw*$(X.xr4#8MCThe message has been sent as a binary attachment.

Or you can view the message at:
www.jakarta.apache.org/inmail/tomcat-dev/mread.php?sessionid-28701




Norton AntiVirus Deleted1.txt
Description: plain/text


something for you

2004-02-20 Thread ccain
you feel the same

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

hello

2004-01-26 Thread ccain
Mail transaction failed. Partial message is available.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

cvs commit: jakarta-tomcat/src/doc tomcat-ssl-howto.html

2001-10-02 Thread ccain

ccain   01/10/02 09:35:52

  Modified:src/doc  tomcat-ssl-howto.html
  Log:
  Revamped SSL-howto. Essentially the merge of Henri's doc with relevant
  sections from my TC4 doc, modified as appropriate for TC3 of course.
  
  Revision  ChangesPath
  1.7   +399 -145  jakarta-tomcat/src/doc/tomcat-ssl-howto.html
  
  Index: tomcat-ssl-howto.html
  ===
  RCS file: /home/cvs/jakarta-tomcat/src/doc/tomcat-ssl-howto.html,v
  retrieving revision 1.6
  retrieving revision 1.7
  diff -u -r1.6 -r1.7
  --- tomcat-ssl-howto.html 2001/08/25 14:11:02 1.6
  +++ tomcat-ssl-howto.html 2001/10/02 16:35:52 1.7
  @@ -44,67 +44,175 @@
   /table
   
   h1
  -Tomcat and SSL/h1
  -By Gomez Henri ttlt;a href=mailto:[EMAIL PROTECTED];[EMAIL PROTECTED]/a/tt
  +Tomcat SSL Configuration/h1
  +
  +table border=0 cellpadding=0 cellspacing=0
  +trtd colspan=2bAuthors:/bbrbr/td/tr
  +tr
  +   tdHenri Gomez/td
  +   tdttlt;a href=mailto:[EMAIL PROTECTED];[EMAIL PROTECTED]/agt;/tt/td
  +/tr
  +tr
  +   tdChristopher Cainnbsp;nbsp;/td
  +   tdttlt;a href=mailto:[EMAIL PROTECTED];[EMAIL PROTECTED]/agt;/tt/td
  +/tr
  +/table
  +br
  +
  +hr
  +
   h2
   Table of Contents/h2
   
   ul
   li
  +a href=#s1Introduction to SSL/a/li
  +
  +li
   a href=#s2Tomcat and SSL/a/li
   
  +li
  +a href=#s8Certificates/a/li
  +
   li
  -a href=#s3Building tomcat with SSL support/a/li
  +a href=#s3Building Tomcat with SSL support/a/li
   
   li
   a href=#s4Tomcat with Apache and mod_jk/a/li
   
  +li
  +a href=#s5SSL via Apache/a/li
  +
   li
  -a href=#s5SSL via apache/a/li
  +a href=#s6SSL Standalone/a/li
   
   li
  -a href=#s6SSL direct/a/li
  +a href=#s9General Tips on Running SSL/a/li
   
   li
  +a href=#s10Troubleshooting SSL Standalone/a/li
  +
  +li
   a href=#s7Credits/a/li
   /ul
   
   hr
   h2
  +a NAME=s1/aIntroduction to SSL/h2
  +SSL, or Secure Sockets Layer, is a technology which allows web browsers and
  +web servers to communicate over a secured connection. This means that the data
  +being sent is encrypted by one side, transmitted, then decrypted by the other
  +side prior to any processing. This is a two-way process, meaning that both the
  +server iand/i the browser encrypt all traffic before sending out data.
  +p
  +Another important aspect of the SSL protocol is emAuthentication/em. This
  +means that during your initial attempt to communicate with a web server over a
  +secure connection, that server will present your web browser with a set of
  +credentials, in the form of a ema href=#s8Certificate/a/em, as proof
  +that the site is who and what it claims to be. In certain cases, the server may
  +also request a certificate from your web browser, asking for proof that
  +emyou/em are who you claim to be. This is known as emClient
  +Authentication,/em although in practice it is used primarily for
  +business-to-business (B2B) transactions rather than with typical site users.
  +Most SSL-enabled web servers do not request Client Authentication.
  +br
  +hr
  +
  +h2
   a NAME=s2/aTomcat and SSL/h2
  -Tomcat could use SSL directly (via an HTTP connector supporting SSL) or
  -via an Apache SSLified (a href=http://www.apache-ssl.org;Apache-SSL/a
  -or a href=http://www.modssl.org;apache-mod_ssl/a) with the mod_jk
  -connector.
  +It is important to note that configuring Tomcat to take advantage of
  +secure sockets is usually only necessary when running it as a standalone
  +web server. When running Tomcat primarily as a Servlet/JSP container behind
  +another web server, such as Apache or Microsoft IIS, it is usually necessary
  +to configure the primary web server to handle the SSL connections from users.
  +Typically, this server will negotiate all SSL-related functionality, then
  +pass on any requests destined for the Tomcat container only after decrypting
  +those requests. Likewise, Tomcat will return cleartext responses, which will
  +then be encrypted by the primary server before being returned to the user's
  +browser. In this environment, Tomcat knows that communications between the
  +primary web server and the client are taking place over a secure connection
  +(because your application needs to be able to ask about this), but it does
  +not participate in the encryption or decryption itself.
  +p
  +Information on configuring Apache for SSL can be found at either the
  +a href=http://www.apache-ssl.org;Apache-SSL/a pages, or the
  +a href=http://www.modssl.org;apache-mod_ssl/a project. For information on
  +configuring Tomcat to communicate with an SSL-enabled Apache server, see the
  +ema href=#s4Tomcat with Apache and mod_jk/a/em section.
  +BRBR
  +BNote:/B SSL with Tomcat standalone requires JDK 1.2 or greater.
  +BR
  +hr
  +
  +h2
  +a NAME=s8/aCertificates/h2
  +In order to implement SSL, a web server must have an associated certificate
  +for each external interface (IP address) that accepts secure connections

cvs commit: jakarta-tomcat/src/share/org/apache/tomcat/util/net SSLSocketFactory.java

2001-09-30 Thread ccain

ccain   01/09/30 13:57:23

  Modified:src/etc  prof-server.xml server.xml
   src/share/org/apache/tomcat/util/net SSLSocketFactory.java
  Log:
  Minor cleanup of SSL standalone instructions and comments, mostly to remove
  outdated java.security provider step. Revamped tomcat-ssl-howto.html to
  follow shortly.
  
  Revision  ChangesPath
  1.3   +9 -11 jakarta-tomcat/src/etc/prof-server.xml
  
  Index: prof-server.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat/src/etc/prof-server.xml,v
  retrieving revision 1.2
  retrieving revision 1.3
  diff -u -r1.2 -r1.3
  --- prof-server.xml   2001/06/09 03:18:17 1.2
  +++ prof-server.xml   2001/09/30 20:57:23 1.3
  @@ -59,20 +59,18 @@
   minSpareThreads=10 /
   
   !--
  -Uncomment this for SSL support. 
  -You _need_ to set up a server certificate if you want this
  -to work, and you need JSSE.
  -1. Add JSSE jars to CLASSPATH 
  -2. Edit java.home/jre/lib/security/java.security
  -   Add:
  -   security.provider.2=com.sun.net.ssl.internal.ssl.Provider
  -3. Do: keytool -genkey -alias tomcat -keyalg RSA
  +Uncomment this for SSL support. You _need_ to set up a
  +server certificate if you want this to work, and you
  +need JSSE. See tomcat-ssl-howto.html for more detailed
  +instructions.
  +
  +1. Make the JSSE jars available to Tomcat, either by making
  +   them an installed extension or by adding them to the
  +   Tomcat CLASSPATH.
  +2. Do: keytool -genkey -alias tomcat -keyalg RSA
  RSA is essential to work with Netscape and IIS.
  Use changeit as password. ( or add keypass attribute )
  You don't need to sign the certificate.
  - 
  -You can set parameter keystore and keypass if you want 
  -to change the default ( user.home/.keystore with changeit )
--
   !--
   RequestInterceptor 
  
  
  
  1.91  +9 -11 jakarta-tomcat/src/etc/server.xml
  
  Index: server.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat/src/etc/server.xml,v
  retrieving revision 1.90
  retrieving revision 1.91
  diff -u -r1.90 -r1.91
  --- server.xml2001/09/08 20:08:31 1.90
  +++ server.xml2001/09/30 20:57:23 1.91
  @@ -188,20 +188,18 @@
   minSpareThreads=10 /
   
   !--
  -Uncomment this for SSL support. 
  -You _need_ to set up a server certificate if you want this
  -to work, and you need JSSE.
  -1. Add JSSE jars to CLASSPATH 
  -2. Edit java.home/jre/lib/security/java.security
  -   Add:
  -   security.provider.2=com.sun.net.ssl.internal.ssl.Provider
  -3. Do: keytool -genkey -alias tomcat -keyalg RSA
  +Uncomment this for SSL support. You _need_ to set up a
  +server certificate if you want this to work, and you
  +need JSSE. See tomcat-ssl-howto.html for more detailed
  +instructions.
  +
  +1. Make the JSSE jars available to Tomcat, either by making
  +   them an installed extension or by adding them to the
  +   Tomcat CLASSPATH.
  +2. Do: keytool -genkey -alias tomcat -keyalg RSA
  RSA is essential to work with Netscape and IIS.
  Use changeit as password. ( or add keypass attribute )
  You don't need to sign the certificate.
  - 
  -You can set parameter keystore and keypass if you want 
  -to change the default ( user.home/.keystore with changeit )
--
   !--
   Http10Connector  port=8443 secure=true /
  
  
  
  1.3   +4 -7  
jakarta-tomcat/src/share/org/apache/tomcat/util/net/SSLSocketFactory.java
  
  Index: SSLSocketFactory.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat/src/share/org/apache/tomcat/util/net/SSLSocketFactory.java,v
  retrieving revision 1.2
  retrieving revision 1.3
  diff -u -r1.2 -r1.3
  --- SSLSocketFactory.java 2000/10/06 05:19:20 1.2
  +++ SSLSocketFactory.java 2001/09/30 20:57:23 1.3
  @@ -72,10 +72,10 @@
   import javax.net.ssl.HandshakeCompletedEvent;
   
   /*
  -  1. Add Jsse's jars into jre/lib/ext
  -  2. Edit java.security, add
  -   security.provider.2=com.sun.net.ssl.internal.ssl.Provider
  -  3. keytool -genkey -alias tomcat -keyalg RSA
  +  1. Make the JSSE's jars available, either as an installed
  + extension (copy them into jre/lib/ext) or by adding
  + them to the Tomcat classpath.
  +  2. keytool -genkey

cvs commit: jakarta-tomcat-4.0/catalina/src/conf server-noexamples.xml.config server.xml

2001-09-25 Thread ccain

ccain   01/09/25 09:35:15

  Modified:catalina/src/conf server-noexamples.xml.config server.xml
  Log:
  Update the commented instructions for SSL (primarily to remove a
  now-extraneous step).
  
  Revision  ChangesPath
  1.4   +5 -4  
jakarta-tomcat-4.0/catalina/src/conf/server-noexamples.xml.config
  
  Index: server-noexamples.xml.config
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/conf/server-noexamples.xml.config,v
  retrieving revision 1.3
  retrieving revision 1.4
  diff -u -r1.3 -r1.4
  --- server-noexamples.xml.config  2001/09/23 21:03:10 1.3
  +++ server-noexamples.xml.config  2001/09/25 16:35:15 1.4
  @@ -32,15 +32,16 @@
By default, a non-SSL HTTP/1.1 Connector is established on port 8080.
You can also enable an SSL HTTP/1.1 Connector on port 8443 by
following the instructions below and uncommenting the second Connector
  - entry.  SSL support requires the following steps:
  + entry.  SSL support requires the following steps (see the SSL Config
  + HOWTO in the Tomcat 4.0 documentation bundle for more detailed
  + instructions):
* Download and install JSSE 1.0.2 or later, and put the JAR files
  into $JAVA_HOME/jre/lib/ext.
  - * Edit $JAVA_HOME/jre/lib/security/java.security and add
  - security.provider.2=com.sun.net.ssl.internal.ssl.Provider
* Execute:
%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA (Windows)
$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA  (Unix)
  -   with a password value of changeit.
  +   with a password value of changeit for both the certificate and
  +   the keystore itself.
   
By default, DNS lookups are enabled when a web application calls
request.getRemoteHost().  This can have an adverse impact on
  
  
  
  1.32  +5 -4  jakarta-tomcat-4.0/catalina/src/conf/server.xml
  
  Index: server.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/catalina/src/conf/server.xml,v
  retrieving revision 1.31
  retrieving revision 1.32
  diff -u -r1.31 -r1.32
  --- server.xml2001/09/23 21:03:10 1.31
  +++ server.xml2001/09/25 16:35:15 1.32
  @@ -32,15 +32,16 @@
By default, a non-SSL HTTP/1.1 Connector is established on port 8080.
You can also enable an SSL HTTP/1.1 Connector on port 8443 by
following the instructions below and uncommenting the second Connector
  - entry.  SSL support requires the following steps:
  + entry.  SSL support requires the following steps (see the SSL Config
  + HOWTO in the Tomcat 4.0 documentation bundle for more detailed
  + instructions):
* Download and install JSSE 1.0.2 or later, and put the JAR files
  into $JAVA_HOME/jre/lib/ext.
  - * Edit $JAVA_HOME/jre/lib/security/java.security and add
  - security.provider.2=com.sun.net.ssl.internal.ssl.Provider
* Execute:
%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA (Windows)
$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA  (Unix)
  -   with a password value of changeit.
  +   with a password value of changeit for both the certificate and
  +   the keystore itself.
   
By default, DNS lookups are enabled when a web application calls
request.getRemoteHost().  This can have an adverse impact on
  
  
  



cvs commit: jakarta-tomcat-4.0/catalina/src/conf server-noexamples.xml.config server.xml

2001-09-25 Thread ccain

ccain   01/09/25 17:52:35

  Modified:catalina/src/conf Tag: tomcat_40_branch
server-noexamples.xml.config server.xml
  Log:
  Fix the commented SSL examples in the 4.0 final branch as well.
  
  Revision  ChangesPath
  No   revision
  
  
  No   revision
  
  
  1.2.2.2   +5 -4  
jakarta-tomcat-4.0/catalina/src/conf/server-noexamples.xml.config
  
  Index: server-noexamples.xml.config
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/conf/server-noexamples.xml.config,v
  retrieving revision 1.2.2.1
  retrieving revision 1.2.2.2
  diff -u -r1.2.2.1 -r1.2.2.2
  --- server-noexamples.xml.config  2001/09/24 18:30:05 1.2.2.1
  +++ server-noexamples.xml.config  2001/09/26 00:52:34 1.2.2.2
  @@ -32,15 +32,16 @@
By default, a non-SSL HTTP/1.1 Connector is established on port 8080.
You can also enable an SSL HTTP/1.1 Connector on port 8443 by
following the instructions below and uncommenting the second Connector
  - entry.  SSL support requires the following steps:
  + entry.  SSL support requires the following steps (see the SSL Config
  + HOWTO in the Tomcat 4.0 documentation bundle for more detailed
  + instructions):
* Download and install JSSE 1.0.2 or later, and put the JAR files
  into $JAVA_HOME/jre/lib/ext.
  - * Edit $JAVA_HOME/jre/lib/security/java.security and add
  - security.provider.2=com.sun.net.ssl.internal.ssl.Provider
* Execute:
%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA (Windows)
$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA  (Unix)
  -   with a password value of changeit.
  +   with a password value of changeit for both the certificate and
  +   the keystore itself.
   
By default, DNS lookups are enabled when a web application calls
request.getRemoteHost().  This can have an adverse impact on
  
  
  
  1.29.2.2  +5 -4  jakarta-tomcat-4.0/catalina/src/conf/server.xml
  
  Index: server.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/catalina/src/conf/server.xml,v
  retrieving revision 1.29.2.1
  retrieving revision 1.29.2.2
  diff -u -r1.29.2.1 -r1.29.2.2
  --- server.xml2001/09/24 18:30:05 1.29.2.1
  +++ server.xml2001/09/26 00:52:34 1.29.2.2
  @@ -32,15 +32,16 @@
By default, a non-SSL HTTP/1.1 Connector is established on port 8080.
You can also enable an SSL HTTP/1.1 Connector on port 8443 by
following the instructions below and uncommenting the second Connector
  - entry.  SSL support requires the following steps:
  + entry.  SSL support requires the following steps (see the SSL Config
  + HOWTO in the Tomcat 4.0 documentation bundle for more detailed
  + instructions):
* Download and install JSSE 1.0.2 or later, and put the JAR files
  into $JAVA_HOME/jre/lib/ext.
  - * Edit $JAVA_HOME/jre/lib/security/java.security and add
  - security.provider.2=com.sun.net.ssl.internal.ssl.Provider
* Execute:
%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA (Windows)
$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA  (Unix)
  -   with a password value of changeit.
  +   with a password value of changeit for both the certificate and
  +   the keystore itself.
   
By default, DNS lookups are enabled when a web application calls
request.getRemoteHost().  This can have an adverse impact on
  
  
  



cvs commit: jakarta-tomcat-4.0/webapps/tomcat-docs ssl-howto.xml

2001-09-24 Thread ccain

ccain   01/09/24 11:30:05

  Modified:catalina/src/conf Tag: tomcat_40_branch
server-noexamples.xml.config server.xml
   webapps/tomcat-docs Tag: tomcat_40_branch ssl-howto.xml
  Log:
  Commit the recent SSL doc changes from Patrick to the 4.0 final branch as
  well
  
  Submitted by: Patrick Luby [EMAIL PROTECTED]
  
  Revision  ChangesPath
  No   revision
  
  
  No   revision
  
  
  1.2.2.1   +3 -1  
jakarta-tomcat-4.0/catalina/src/conf/server-noexamples.xml.config
  
  Index: server-noexamples.xml.config
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/conf/server-noexamples.xml.config,v
  retrieving revision 1.2
  retrieving revision 1.2.2.1
  diff -u -r1.2 -r1.2.2.1
  --- server-noexamples.xml.config  2001/08/10 14:14:15 1.2
  +++ server-noexamples.xml.config  2001/09/24 18:30:05 1.2.2.1
  @@ -37,7 +37,9 @@
  into $JAVA_HOME/jre/lib/ext.
* Edit $JAVA_HOME/jre/lib/security/java.security and add
security.provider.2=com.sun.net.ssl.internal.ssl.Provider
  - * Execute: keytool -genkey -alias tomcat -keyalg RSA
  + * Execute:
  + %JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA (Windows)
  + $JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA  (Unix)
  with a password value of changeit.
   
By default, DNS lookups are enabled when a web application calls
  
  
  
  1.29.2.1  +3 -1  jakarta-tomcat-4.0/catalina/src/conf/server.xml
  
  Index: server.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/catalina/src/conf/server.xml,v
  retrieving revision 1.29
  retrieving revision 1.29.2.1
  diff -u -r1.29 -r1.29.2.1
  --- server.xml2001/09/09 04:00:08 1.29
  +++ server.xml2001/09/24 18:30:05 1.29.2.1
  @@ -37,7 +37,9 @@
  into $JAVA_HOME/jre/lib/ext.
* Edit $JAVA_HOME/jre/lib/security/java.security and add
security.provider.2=com.sun.net.ssl.internal.ssl.Provider
  - * Execute: keytool -genkey -alias tomcat -keyalg RSA
  + * Execute:
  + %JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA (Windows)
  + $JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA  (Unix)
  with a password value of changeit.
   
By default, DNS lookups are enabled when a web application calls
  
  
  
  No   revision
  
  
  No   revision
  
  
  1.7.2.1   +20 -3 jakarta-tomcat-4.0/webapps/tomcat-docs/ssl-howto.xml
  
  Index: ssl-howto.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/webapps/tomcat-docs/ssl-howto.xml,v
  retrieving revision 1.7
  retrieving revision 1.7.2.1
  diff -u -r1.7 -r1.7.2.1
  --- ssl-howto.xml 2001/09/12 17:38:47 1.7
  +++ ssl-howto.xml 2001/09/24 18:30:05 1.7.2.1
  @@ -35,9 +35,15 @@
  set an environment variable codeJSSE_HOME/code that points at the
  directory into which you installed JSSE./libr/br/
   liCreate a certificate keystore by executing the following command:
  +pWindows:/p
   source
  -keytool -genkey -alias tomcat -keyalg RSA
  +%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA
   /source
  +pUnix:/p
  +source
  +$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA
  +/source
  +p/p
   and specify a password value of changeit./libr/br/
   liUncomment the SSL HTTP/1.1 Connector entry in
   code$CATALINA_HOME/conf/server.xml/code and tweak as necessary./li
  @@ -202,8 +208,13 @@
   
   pTo create a new keystore from scratch, containing a single self-signed
   Certificate, execute the following from a terminal command line:/p
  +pWindows:/p
  +source
  +%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA
  +/source
  +pUnix:/p
   source
  -keytool -genkey -alias tomcat -keyalg RSA
  +$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA
   /source
   
   p(The RSA algorithm should be preferred as a secure algorithm, and this
  @@ -216,8 +227,14 @@
   to the codekeytool/code command shown above.  You will also need to
   reflect this new location in the codeserver.xml/code configuration file,
   as described later.  For example:/p
  +pWindows:/p
  +source
  +%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA \
  +  -keystore \path\to\my\keystore
  +/source
  +pUnix:/p
   source
  -keytool -genkey -alias tomcat -keyalg RSA \
  +$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA \
 -keystore /path/to/my/keystore
   /source
   
  
  
  



cvs commit: jakarta-tomcat-4.0/webapps/tomcat-docs ssl-howto.xml

2001-09-24 Thread ccain

ccain   01/09/24 21:55:23

  Modified:webapps/tomcat-docs ssl-howto.xml
  Log:
  Typo ...
  
  Revision  ChangesPath
  1.9   +1 -1  jakarta-tomcat-4.0/webapps/tomcat-docs/ssl-howto.xml
  
  Index: ssl-howto.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/webapps/tomcat-docs/ssl-howto.xml,v
  retrieving revision 1.8
  retrieving revision 1.9
  diff -u -r1.8 -r1.9
  --- ssl-howto.xml 2001/09/23 21:01:10 1.8
  +++ ssl-howto.xml 2001/09/25 04:55:23 1.9
  @@ -148,7 +148,7 @@
   include things like login pages, personal information pages, and shopping
   cart checkouts, where credit card information could possibly be transmitted.
   Any page within an application can be requested over a secure socket by
  -simply prefixing the addres with codehttps:/code instead of
  +simply prefixing the address with codehttps:/code instead of
   codehttp:/code.  Any pages which absolutely strongrequire/strong
   a secure connection should check the protocol type associated with the
   page request and take the appropriate action of codehttps/code is not
  
  
  



cvs commit: jakarta-tomcat-4.0/webapps/tomcat-docs ssl-howto.xml

2001-09-24 Thread ccain

ccain   01/09/24 21:57:30

  Modified:webapps/tomcat-docs Tag: tomcat_40_branch ssl-howto.xml
  Log:
  Typo (fix the 4.0 final branch as well)
  
  Revision  ChangesPath
  No   revision
  
  
  No   revision
  
  
  1.7.2.2   +1 -1  jakarta-tomcat-4.0/webapps/tomcat-docs/ssl-howto.xml
  
  Index: ssl-howto.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/webapps/tomcat-docs/ssl-howto.xml,v
  retrieving revision 1.7.2.1
  retrieving revision 1.7.2.2
  diff -u -r1.7.2.1 -r1.7.2.2
  --- ssl-howto.xml 2001/09/24 18:30:05 1.7.2.1
  +++ ssl-howto.xml 2001/09/25 04:57:29 1.7.2.2
  @@ -148,7 +148,7 @@
   include things like login pages, personal information pages, and shopping
   cart checkouts, where credit card information could possibly be transmitted.
   Any page within an application can be requested over a secure socket by
  -simply prefixing the addres with codehttps:/code instead of
  +simply prefixing the address with codehttps:/code instead of
   codehttp:/code.  Any pages which absolutely strongrequire/strong
   a secure connection should check the protocol type associated with the
   page request and take the appropriate action of codehttps/code is not
  
  
  



cvs commit: jakarta-tomcat-4.0/webapps/tomcat-docs ssl-howto.xml

2001-09-23 Thread ccain

ccain   01/09/23 14:01:10

  Modified:webapps/tomcat-docs ssl-howto.xml
  Log:
  Specify that the keytool in JAVA_HOME (the JDK where JSSE should have been
  installed) should be used when generating a self-signed cert.
  
  Submitted by: Patrick Luby [EMAIL PROTECTED]
  
  Revision  ChangesPath
  1.8   +20 -3 jakarta-tomcat-4.0/webapps/tomcat-docs/ssl-howto.xml
  
  Index: ssl-howto.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/webapps/tomcat-docs/ssl-howto.xml,v
  retrieving revision 1.7
  retrieving revision 1.8
  diff -u -r1.7 -r1.8
  --- ssl-howto.xml 2001/09/12 17:38:47 1.7
  +++ ssl-howto.xml 2001/09/23 21:01:10 1.8
  @@ -35,9 +35,15 @@
  set an environment variable codeJSSE_HOME/code that points at the
  directory into which you installed JSSE./libr/br/
   liCreate a certificate keystore by executing the following command:
  +pWindows:/p
   source
  -keytool -genkey -alias tomcat -keyalg RSA
  +%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA
   /source
  +pUnix:/p
  +source
  +$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA
  +/source
  +p/p
   and specify a password value of changeit./libr/br/
   liUncomment the SSL HTTP/1.1 Connector entry in
   code$CATALINA_HOME/conf/server.xml/code and tweak as necessary./li
  @@ -202,8 +208,13 @@
   
   pTo create a new keystore from scratch, containing a single self-signed
   Certificate, execute the following from a terminal command line:/p
  +pWindows:/p
  +source
  +%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA
  +/source
  +pUnix:/p
   source
  -keytool -genkey -alias tomcat -keyalg RSA
  +$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA
   /source
   
   p(The RSA algorithm should be preferred as a secure algorithm, and this
  @@ -216,8 +227,14 @@
   to the codekeytool/code command shown above.  You will also need to
   reflect this new location in the codeserver.xml/code configuration file,
   as described later.  For example:/p
  +pWindows:/p
  +source
  +%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA \
  +  -keystore \path\to\my\keystore
  +/source
  +pUnix:/p
   source
  -keytool -genkey -alias tomcat -keyalg RSA \
  +$JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA \
 -keystore /path/to/my/keystore
   /source
   
  
  
  



cvs commit: jakarta-tomcat-4.0/catalina/src/conf server-noexamples.xml.config server.xml

2001-09-23 Thread ccain

ccain   01/09/23 14:03:11

  Modified:catalina/src/conf server-noexamples.xml.config server.xml
  Log:
  Specify that the keytool in the $JAVA_HOME JDK (where JSSE should have been
  installed) should be used when generating self-signed certs.
  
  Submitted by: Patrick Luby [EMAIL PROTECTED]
  
  Revision  ChangesPath
  1.3   +3 -1  
jakarta-tomcat-4.0/catalina/src/conf/server-noexamples.xml.config
  
  Index: server-noexamples.xml.config
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/conf/server-noexamples.xml.config,v
  retrieving revision 1.2
  retrieving revision 1.3
  diff -u -r1.2 -r1.3
  --- server-noexamples.xml.config  2001/08/10 14:14:15 1.2
  +++ server-noexamples.xml.config  2001/09/23 21:03:10 1.3
  @@ -37,7 +37,9 @@
  into $JAVA_HOME/jre/lib/ext.
* Edit $JAVA_HOME/jre/lib/security/java.security and add
security.provider.2=com.sun.net.ssl.internal.ssl.Provider
  - * Execute: keytool -genkey -alias tomcat -keyalg RSA
  + * Execute:
  + %JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA (Windows)
  + $JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA  (Unix)
  with a password value of changeit.
   
By default, DNS lookups are enabled when a web application calls
  
  
  
  1.31  +3 -1  jakarta-tomcat-4.0/catalina/src/conf/server.xml
  
  Index: server.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/catalina/src/conf/server.xml,v
  retrieving revision 1.30
  retrieving revision 1.31
  diff -u -r1.30 -r1.31
  --- server.xml2001/09/23 00:12:34 1.30
  +++ server.xml2001/09/23 21:03:10 1.31
  @@ -37,7 +37,9 @@
  into $JAVA_HOME/jre/lib/ext.
* Edit $JAVA_HOME/jre/lib/security/java.security and add
security.provider.2=com.sun.net.ssl.internal.ssl.Provider
  - * Execute: keytool -genkey -alias tomcat -keyalg RSA
  + * Execute:
  + %JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA (Windows)
  + $JAVA_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA  (Unix)
  with a password value of changeit.
   
By default, DNS lookups are enabled when a web application calls
  
  
  



cvs commit: jakarta-tomcat-4.0 BUILDING.txt

2001-09-20 Thread ccain

ccain   01/09/20 22:20:01

  Modified:.BUILDING.txt
  Log:
  Minor semantical changes for JDBC 2.0 Opt. install instructions.
  There's nothing to unpack, you just get the jar :)
  
  Revision  ChangesPath
  1.6   +3 -4  jakarta-tomcat-4.0/BUILDING.txt
  
  Index: BUILDING.txt
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/BUILDING.txt,v
  retrieving revision 1.5
  retrieving revision 1.6
  diff -u -r1.5 -r1.6
  --- BUILDING.txt  2001/09/17 06:18:57 1.5
  +++ BUILDING.txt  2001/09/21 05:20:01 1.6
  @@ -1,4 +1,4 @@
  -$Id: BUILDING.txt,v 1.5 2001/09/17 06:18:57 ccain Exp $
  +$Id: BUILDING.txt,v 1.6 2001/09/21 05:20:01 ccain Exp $
   
   
  Building The Tomcat 4.0 Servlet/JSP Container
  @@ -138,14 +138,13 @@
 distribution resides in its own directory.
   
   
  -(6) Download and Install JDBC Optional Package API
  +(6) Download and Install JDBC Optional Package API Binary Distribution
   
   * Download the JDBC Optional Pacakge API package (version 2.0) from:
   
   http://java.sun.com/products/jdbc/download.html
   
  -* Unpack the package into a convenient location so that it resides
  -  in its own subdirectory.
  +* Place the jar in a convenient location.
   
   
   (7) Download and Install the JMX 1.0 Reference Implementation
  
  
  



cvs commit: jakarta-tomcat/src/share/org/apache/tomcat/modules/mappers SimpleMapper1.java

2001-09-18 Thread ccain

ccain   01/09/17 23:48:26

  Modified:src/share/org/apache/tomcat/modules/mappers
SimpleMapper1.java
  Log:
  Typos ...
  
  Revision  ChangesPath
  1.11  +5 -5  
jakarta-tomcat/src/share/org/apache/tomcat/modules/mappers/SimpleMapper1.java
  
  Index: SimpleMapper1.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat/src/share/org/apache/tomcat/modules/mappers/SimpleMapper1.java,v
  retrieving revision 1.10
  retrieving revision 1.11
  diff -u -r1.10 -r1.11
  --- SimpleMapper1.java2001/08/26 01:54:26 1.10
  +++ SimpleMapper1.java2001/09/18 06:48:26 1.11
  @@ -67,7 +67,7 @@
   import java.io.*;
   /**
*  This class will set up the data structures used by a simple patern matching
  - *  alghoritm and use it to extract the path components from the request URI.
  + *  algorithm and use it to extract the path components from the request URI.
*
*  This particular implementation does the following:
*  - extract the information that is relevant to matching from the Request
  @@ -357,11 +357,11 @@
*/
   //public int requestMap(Request req) {
// No op. All mapping is done in the first step - it's better because
  - // the alghoritm is more efficient. The only case where those 2 are
  + // the algorithm is more efficient. The only case where those 2 are
// not called togheter is in getContext( path ). 
// 
// We can split it again later if that creates problems - but right
  - // now it's important to have a clear alghoritm. Note that requestMap
  + // now it's important to have a clear algorithm. Note that requestMap
// is _allways_ called after contextMap ( it was asserted in  all
// implementations).

  @@ -465,7 +465,7 @@
   }
   
   
  -/** Prefix and exact mapping alghoritm.
  +/** Prefix and exact mapping algorithm.
*XXX finish factoring out the creation of the map ( right now direct field access 
is
*  used, since the code was just cut out from SimpleMapper).
*  XXX make sure the code is useable as a general path mapper - or at least a 
bridge
  @@ -701,7 +701,7 @@
s=FileUtil.removeLast( s );
}  else {
if( myMap.mapCacheEnabled ) {
  - // XXX implement LRU or another replacement alghoritm
  + // XXX implement LRU or another replacement algorithm
myMap.mapCache.put( path, container );
}
return container;
  
  
  



cvs commit: jakarta-tomcat-4.0 RELEASE-NOTES-4.0.txt

2001-09-17 Thread ccain

ccain   01/09/16 23:29:24

  Modified:.RELEASE-NOTES-4.0.txt
  Log:
  Add the new Ant version dependancy (1.4) to the release notes.
  
  Revision  ChangesPath
  1.4   +4 -2  jakarta-tomcat-4.0/RELEASE-NOTES-4.0.txt
  
  Index: RELEASE-NOTES-4.0.txt
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/RELEASE-NOTES-4.0.txt,v
  retrieving revision 1.3
  retrieving revision 1.4
  diff -u -r1.3 -r1.4
  --- RELEASE-NOTES-4.0.txt 2001/09/16 05:59:42 1.3
  +++ RELEASE-NOTES-4.0.txt 2001/09/17 06:29:24 1.4
  @@ -3,7 +3,7 @@
   Release Notes
   =
   
  -$Id: RELEASE-NOTES-4.0.txt,v 1.3 2001/09/16 05:59:42 craigmcc Exp $
  +$Id: RELEASE-NOTES-4.0.txt,v 1.4 2001/09/17 06:29:24 ccain Exp $
   
   
   
  @@ -32,11 +32,13 @@
   General New Features:
   
   
  +The 1.4 release of Ant is now required in order to build Tomcat 4.0
  +from source. Previous versions relied on Ant 1.3.
   
  +
   -
   Catalina New Features:
   -
  -
   
   
   ---
  
  
  



cvs commit: jakarta-tomcat-4.0 BUILDING.txt

2001-09-16 Thread ccain

ccain   01/09/16 23:18:57

  Modified:.BUILDING.txt
  Log:
  Make the new Ant 1.4 requirement a little more visible.
  
  Revision  ChangesPath
  1.5   +4 -1  jakarta-tomcat-4.0/BUILDING.txt
  
  Index: BUILDING.txt
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/BUILDING.txt,v
  retrieving revision 1.4
  retrieving revision 1.5
  diff -u -r1.4 -r1.5
  --- BUILDING.txt  2001/09/16 05:59:42 1.4
  +++ BUILDING.txt  2001/09/17 06:18:57 1.5
  @@ -1,4 +1,4 @@
  -$Id: BUILDING.txt,v 1.4 2001/09/16 05:59:42 craigmcc Exp $
  +$Id: BUILDING.txt,v 1.5 2001/09/17 06:18:57 ccain Exp $
   
   
  Building The Tomcat 4.0 Servlet/JSP Container
  @@ -25,6 +25,9 @@
   
   
   (1) Download and Install the Ant Binary Distribution
  +
  +NOTE: Previous versions of Tomcat 4.0 relied on Ant 1.3 for the build
  +process. The 1.4 release is now required.
   
   * Download a binary distribution of Ant 1.4 from:
   
  
  
  



cvs commit: jakarta-tomcat-4.0/catalina/src/bin digest.bat digest.sh

2001-09-10 Thread ccain

ccain   01/09/10 13:12:58

  Modified:catalina/src/bin digest.bat digest.sh
  Log:
  DES is not a hashing algorithm ;-)
  
  Revision  ChangesPath
  1.2   +2 -2  jakarta-tomcat-4.0/catalina/src/bin/digest.bat
  
  Index: digest.bat
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/catalina/src/bin/digest.bat,v
  retrieving revision 1.1
  retrieving revision 1.2
  diff -u -r1.1 -r1.2
  --- digest.bat2001/05/22 20:37:19 1.1
  +++ digest.bat2001/09/10 20:12:58 1.2
  @@ -10,7 +10,7 @@
   rem   This script is assumed to run from the bin directory or have the
   rem   CATALINA_HOME env variable set.
   rem
  -rem $Id: digest.bat,v 1.1 2001/05/22 20:37:19 bip Exp $
  +rem $Id: digest.bat,v 1.2 2001/09/10 20:12:58 ccain Exp $
   rem ---
   
   
  @@ -57,7 +57,7 @@
   :doUsage
   echo Usage:  digest -a [algorithm] [credentials]
   echo Commands:
  -echo   algorithm   -   The algorithm to use, i.e. MD5, DES
  +echo   algorithm   -   The algorithm to use, i.e. MD5, SHA1
   echo   credentials -   The credential to digest
   goto cleanup
   
  
  
  
  1.3   +2 -2  jakarta-tomcat-4.0/catalina/src/bin/digest.sh
  
  Index: digest.sh
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/catalina/src/bin/digest.sh,v
  retrieving revision 1.2
  retrieving revision 1.3
  diff -u -r1.2 -r1.3
  --- digest.sh 2001/08/20 18:36:04 1.2
  +++ digest.sh 2001/09/10 20:12:58 1.3
  @@ -10,7 +10,7 @@
   #   This script is assumed to run from the bin directory or have the
   #   CATALINA_HOME env variable set.
   #
  -# $Id: digest.sh,v 1.2 2001/08/20 18:36:04 bip Exp $
  +# $Id: digest.sh,v 1.3 2001/09/10 20:12:58 ccain Exp $
   # -
   
   
  @@ -81,7 +81,7 @@
   
 echo Usage:  digest -a [algorithm] [credentials]
 echo Commands:
  -  echo   algorithm   -   The algorithm to use, i.e. MD5, DES
  +  echo   algorithm   -   The algorithm to use, i.e. MD5, SHA1
 echo   credentials -   The credential to digest
   
 exit 1
  
  
  



cvs commit: jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm MemoryRealm.java

2001-09-10 Thread ccain

ccain   01/09/10 14:00:06

  Modified:catalina/src/share/org/apache/catalina/realm
MemoryRealm.java
  Log:
  Oops, typo ... we definitely don't want the comparison to be care insensitive :)
  
  Revision  ChangesPath
  1.11  +5 -5  
jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/MemoryRealm.java
  
  Index: MemoryRealm.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/MemoryRealm.java,v
  retrieving revision 1.10
  retrieving revision 1.11
  diff -u -r1.10 -r1.11
  --- MemoryRealm.java  2001/09/10 17:52:45 1.10
  +++ MemoryRealm.java  2001/09/10 21:00:06 1.11
  @@ -1,7 +1,7 @@
   /*
  - * $Header: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/MemoryRealm.java,v
 1.10 2001/09/10 17:52:45 remm Exp $
  - * $Revision: 1.10 $
  - * $Date: 2001/09/10 17:52:45 $
  + * $Header: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/MemoryRealm.java,v
 1.11 2001/09/10 21:00:06 ccain Exp $
  + * $Revision: 1.11 $
  + * $Date: 2001/09/10 21:00:06 $
*
* 
*
  @@ -95,7 +95,7 @@
* synchronization is performed around accesses to the principals collection.
*
* @author Craig R. McClanahan
  - * @version $Revision: 1.10 $ $Date: 2001/09/10 17:52:45 $
  + * @version $Revision: 1.11 $ $Date: 2001/09/10 21:00:06 $
*/
   
   public final class MemoryRealm
  @@ -208,7 +208,7 @@
   boolean validated = false;
   if (principal != null) {
   if (hasMessageDigest()) {
  -// Hex hashes should be compared care-insensitive
  +// Hex hashes should be compared case-insensitive
   validated = (digest(credentials)
.equalsIgnoreCase(principal.getPassword()));
   } else {
  
  
  



cvs commit: jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm JDBCRealm.java JNDIRealm.java MemoryRealm.java

2001-09-07 Thread ccain

ccain   01/09/07 11:51:36

  Modified:catalina/src/share/org/apache/catalina/realm JDBCRealm.java
JNDIRealm.java MemoryRealm.java
  Log:
  Change comparison of hex digests (in authentication) to be
  case-insensitive, as base16 values themselves are case-insensitive.
  
  Revision  ChangesPath
  1.18  +2 -2  
jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/JDBCRealm.java
  
  Index: JDBCRealm.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/JDBCRealm.java,v
  retrieving revision 1.17
  retrieving revision 1.18
  diff -u -r1.17 -r1.18
  --- JDBCRealm.java2001/09/06 03:43:11 1.17
  +++ JDBCRealm.java2001/09/07 18:51:36 1.18
  @@ -95,7 +95,7 @@
   * @author Craig R. McClanahan
   * @author Carson McDonald
   * @author Ignacio Ortega
  -* @version $Revision: 1.17 $ $Date: 2001/09/06 03:43:11 $
  +* @version $Revision: 1.18 $ $Date: 2001/09/07 18:51:36 $
   */
   
   public class JDBCRealm
  @@ -384,7 +384,7 @@
   }
   
   // Validate the user's credentials
  -if (digest(credentials).equals(dbCredentials)) {
  +if (digest(credentials).equalsIgnoreCase(dbCredentials)) {
   if (debug = 2)
   log(sm.getString(jdbcRealm.authenticateSuccess,
username));
  
  
  
  1.4   +2 -2  
jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/JNDIRealm.java
  
  Index: JNDIRealm.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/JNDIRealm.java,v
  retrieving revision 1.3
  retrieving revision 1.4
  diff -u -r1.3 -r1.4
  --- JNDIRealm.java2001/09/06 03:43:11 1.3
  +++ JNDIRealm.java2001/09/07 18:51:36 1.4
  @@ -144,7 +144,7 @@
*
* @author John Holman
* @author Craig R. McClanahan
  - * @version $Revision: 1.3 $ $Date: 2001/09/06 03:43:11 $
  + * @version $Revision: 1.4 $ $Date: 2001/09/07 18:51:36 $
*/
   
   public class JNDIRealm extends RealmBase {
  @@ -750,7 +750,7 @@
   // Validate the credentials specified by the user
   if (debug = 3)
   log(  validating credentials);
  -if (digest(credentials).equals(valueString)) {
  +if (digest(credentials).equalsIgnoreCase(valueString)) {
   if (debug = 2)
   log(sm.getString(jndiRealm.authenticateSuccess,
username));
  
  
  
  1.8   +5 -5  
jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/MemoryRealm.java
  
  Index: MemoryRealm.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/MemoryRealm.java,v
  retrieving revision 1.7
  retrieving revision 1.8
  diff -u -r1.7 -r1.8
  --- MemoryRealm.java  2001/08/27 19:10:25 1.7
  +++ MemoryRealm.java  2001/09/07 18:51:36 1.8
  @@ -1,7 +1,7 @@
   /*
  - * $Header: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/MemoryRealm.java,v
 1.7 2001/08/27 19:10:25 craigmcc Exp $
  - * $Revision: 1.7 $
  - * $Date: 2001/08/27 19:10:25 $
  + * $Header: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/MemoryRealm.java,v
 1.8 2001/09/07 18:51:36 ccain Exp $
  + * $Revision: 1.8 $
  + * $Date: 2001/09/07 18:51:36 $
*
* 
*
  @@ -95,7 +95,7 @@
* synchronization is performed around accesses to the principals collection.
*
* @author Craig R. McClanahan
  - * @version $Revision: 1.7 $ $Date: 2001/08/27 19:10:25 $
  + * @version $Revision: 1.8 $ $Date: 2001/09/07 18:51:36 $
*/
   
   public final class MemoryRealm
  @@ -205,7 +205,7 @@
   GenericPrincipal principal =
   (GenericPrincipal) principals.get(username);
   if ((principal != null) 
  -(digest(credentials).equals(principal.getPassword( {
  +(digest(credentials).equalsIgnoreCase(principal.getPassword( {
   if (debug = 2)
   log(sm.getString(memoryRealm.authenticateSuccess, username));
   return (principal);
  
  
  



cvs commit: jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm JDBCRealm.java JNDIRealm.java MemoryRealm.java RealmBase.java

2001-09-07 Thread ccain

ccain   01/09/07 13:45:13

  Modified:catalina/src/share/org/apache/catalina/realm JDBCRealm.java
JNDIRealm.java MemoryRealm.java RealmBase.java
  Log:
  Backs out the previous case-insensitive mod, which would have checked
  non-hashed realm passwords case-insensitive as well. This correctly
  returns non-hashed realm passwords to case-sensitive comparison, while
  leaving hex comparisons insensitive.
  
  Now I'm going to go write 'I will always follow code paths through to
  their conclusion before committing' 100 times on the blackboard, then
  it's straight to bed with no desert. =)
  
  Revision  ChangesPath
  1.19  +9 -2  
jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/JDBCRealm.java
  
  Index: JDBCRealm.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/JDBCRealm.java,v
  retrieving revision 1.18
  retrieving revision 1.19
  diff -u -r1.18 -r1.19
  --- JDBCRealm.java2001/09/07 18:51:36 1.18
  +++ JDBCRealm.java2001/09/07 20:45:12 1.19
  @@ -95,7 +95,7 @@
   * @author Craig R. McClanahan
   * @author Carson McDonald
   * @author Ignacio Ortega
  -* @version $Revision: 1.18 $ $Date: 2001/09/07 18:51:36 $
  +* @version $Revision: 1.19 $ $Date: 2001/09/07 20:45:12 $
   */
   
   public class JDBCRealm
  @@ -384,7 +384,14 @@
   }
   
   // Validate the user's credentials
  -if (digest(credentials).equalsIgnoreCase(dbCredentials)) {
  +boolean validated = false;
  +if (hasMessageDigest()) {
  +// Hex hashes should be compared case-insensitive
  +validated = (digest(credentials).equalsIgnoreCase(dbCredentials));
  +} else
  +validated = (digest(credentials).equals(dbCredentials));
  +
  +if (validated) {
   if (debug = 2)
   log(sm.getString(jdbcRealm.authenticateSuccess,
username));
  
  
  
  1.5   +10 -2 
jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/JNDIRealm.java
  
  Index: JNDIRealm.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/JNDIRealm.java,v
  retrieving revision 1.4
  retrieving revision 1.5
  diff -u -r1.4 -r1.5
  --- JNDIRealm.java2001/09/07 18:51:36 1.4
  +++ JNDIRealm.java2001/09/07 20:45:12 1.5
  @@ -144,7 +144,7 @@
*
* @author John Holman
* @author Craig R. McClanahan
  - * @version $Revision: 1.4 $ $Date: 2001/09/07 18:51:36 $
  + * @version $Revision: 1.5 $ $Date: 2001/09/07 20:45:12 $
*/
   
   public class JNDIRealm extends RealmBase {
  @@ -750,7 +750,15 @@
   // Validate the credentials specified by the user
   if (debug = 3)
   log(  validating credentials);
  -if (digest(credentials).equalsIgnoreCase(valueString)) {
  +
  +boolean validated = false;
  +if (hasMessageDigest()) {
  +// Hex hashes should be compared case-insensitive
  +validated = (digest(credentials).equalsIgnoreCase(valueString));
  +} else
  +validated = (digest(credentials).equals(valueString));
  +
  +if (validated) {
   if (debug = 2)
   log(sm.getString(jndiRealm.authenticateSuccess,
username));
  
  
  
  1.9   +13 -6 
jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/MemoryRealm.java
  
  Index: MemoryRealm.java
  ===
  RCS file: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/MemoryRealm.java,v
  retrieving revision 1.8
  retrieving revision 1.9
  diff -u -r1.8 -r1.9
  --- MemoryRealm.java  2001/09/07 18:51:36 1.8
  +++ MemoryRealm.java  2001/09/07 20:45:12 1.9
  @@ -1,7 +1,7 @@
   /*
  - * $Header: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/MemoryRealm.java,v
 1.8 2001/09/07 18:51:36 ccain Exp $
  - * $Revision: 1.8 $
  - * $Date: 2001/09/07 18:51:36 $
  + * $Header: 
/home/cvs/jakarta-tomcat-4.0/catalina/src/share/org/apache/catalina/realm/MemoryRealm.java,v
 1.9 2001/09/07 20:45:12 ccain Exp $
  + * $Revision: 1.9 $
  + * $Date: 2001/09/07 20:45:12 $
*
* 
*
  @@ -95,7 +95,7 @@
* synchronization is performed around accesses to the principals collection.
*
* @author Craig R. McClanahan
  - * @version $Revision: 1.8 $ $Date: 2001/09/07 18:51:36 $
  + * @version $Revision: 1.9 $ $Date: 2001/09/07 20:45:12 $
*/
   
   public final class MemoryRealm
  @@ -204,8 +204,15 @@
   
   GenericPrincipal principal =
   (GenericPrincipal) principals.get(username

cvs commit: jakarta-tomcat-4.0/webapps/tomcat-docs realm-howto.xml

2001-09-06 Thread ccain

ccain   01/09/06 16:06:43

  Modified:webapps/tomcat-docs realm-howto.xml
  Log:
  Typo correction.
  
  Revision  ChangesPath
  1.2   +1 -1  jakarta-tomcat-4.0/webapps/tomcat-docs/realm-howto.xml
  
  Index: realm-howto.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/webapps/tomcat-docs/realm-howto.xml,v
  retrieving revision 1.1
  retrieving revision 1.2
  diff -u -r1.1 -r1.2
  --- realm-howto.xml   2001/09/06 03:43:12 1.1
  +++ realm-howto.xml   2001/09/06 23:06:43 1.2
  @@ -129,7 +129,7 @@
   
   pstrongJDBCRealm/strong is an implementation of the Tomcat 4
   codeRealm/code interface that looks up users in a relational database
  -accessed via a JDBC driver.  There is substantial conviguration flexibility
  +accessed via a JDBC driver.  There is substantial configuration flexibility
   that lets you adapt to existing table and column names, as long as your
   database structure conforms to the following requirements:/p
   ul
  
  
  



cvs commit: jakarta-tomcat-4.0/webapps/tomcat-docs ssl-howto.xml

2001-08-31 Thread ccain

ccain   01/08/31 13:15:12

  Modified:webapps/tomcat-docs ssl-howto.xml
  Log:
  A few minor typo and semantic changes.
  
  Also included a short blurb about passing JSSE to Tomcat in the CLASSPATH
  rather than making it an installed extension, as suggested by
  Wolfgang Hoschek [EMAIL PROTECTED].
  
  Revision  ChangesPath
  1.5   +24 -14jakarta-tomcat-4.0/webapps/tomcat-docs/ssl-howto.xml
  
  Index: ssl-howto.xml
  ===
  RCS file: /home/cvs/jakarta-tomcat-4.0/webapps/tomcat-docs/ssl-howto.xml,v
  retrieving revision 1.4
  retrieving revision 1.5
  diff -u -r1.4 -r1.5
  --- ssl-howto.xml 2001/08/27 20:39:55 1.4
  +++ ssl-howto.xml 2001/08/31 20:15:12 1.5
  @@ -7,7 +7,7 @@
   project;
   
   properties
  -author email=[EMAIL PROTECTED]Christopher Cain/author
  +author email=[EMAIL PROTECTED]Christopher Cain/author
   titleSSL Configuration HOW-TO/title
   /properties
   
  @@ -30,9 +30,10 @@
   these simple steps.  For more information, read the rest of this HOW-TO./p
   ol
   liDownload JSSE 1.0.2 (or later) from
  -a 
href=http://java.sun.com/products/jsse/;http://java.sun.com/products/jsse//a
  -and make it an eminstalled extension/em by copying the included JAR
  -files into code$JAVA_HOME/jre/lib/ext/code./libr/br/
  +   a 
href=http://java.sun.com/products/jsse/;http://java.sun.com/products/jsse//a
  +   and either make it an eminstalled extension/em on the system, or else add it
  +   to the classpath being passed to Tomcat in the Catalina startup script.
  +/libr/br/
   liCreate a certificate keystore by executing the following command:
   source
   keytool -genkey -alias tomcat -keyalg RSA
  @@ -100,7 +101,7 @@
   before receiving any sensitive information.  While a broader explanation of
   Certificates is beyond the scope of this document, think of a Certificate
   as a digital driver's license for an Internet address.  It states what
  -company the address is associated with, along with some basic contact
  +company the site is associated with, along with some basic contact
   information about the site owner or administrator./p
   
   pThis driver's license is cryptographically signed by its owner, and is
  @@ -158,7 +159,7 @@
   handshake, where the client browser accepts the server certificate, must occur
   before the HTTP request is accessed.  As a result, the request information
   containing the virtual host name cannot be determined prior to authentication,
  -ant it is therefore not possible to assign multiple certificates to a single
  +and it is therefore not possible to assign multiple certificates to a single
   IP address.  If all virtual hosts on a single IP address need to authenticate
   against the same certificate, the addition of multiple virtual hosts should not
   interfere with normal SSL operations on the server.  Be aware, however, that
  @@ -181,16 +182,25 @@
   package.  If you are running JDK 1.4 (currently in beta), these classes have
   been integrated directly into the JDK, so you can skip this entire step./p
   
  -pAfter expanding the package, copy all three JAR files
  -(codejcert.jar/code, codejnet.jar/code, and codejsse.jar/code)
  -into your code$JAVA_HOME/jre/lib/ext/code directory.  This effectively
  -makes them installed extensions, and eliminates the need to put them into
  -the codeCLASSPATH/code./p
  +pAfter expanding the package, there are two ways to make it available to Tomcat.
  +The easiest approach is to simply make it an eminstalled extension/em by 
  +copying all three JAR files (codejcert.jar/code, codejnet.jar/code, and
  +codejsse.jar/code) into your code$JAVA_HOME/jre/lib/ext/code directory.
  +In effect, this eliminates the need to have them in any codeCLASSPATH/code./p
  +
  +pIf making the JSSE libraries an installed extension is either not possible or
  +not desirable in your particular environment, the alternative approach is to 
  +add the JAR files to Tomcat's startup codeCLASSPATH/code. Because Tomcat
  +ignores the system codeCLASSPATH/code, this approach involves modifying the 
  +Catalina command script for your particular environment (codecatalina.sh/code
  +under Unix, or codecatalina.bat/code in Windows). Add the JSSE libraries to
  +the classpath being passed to the codejava/code command./p
   
   pstrongWARNING/strong - Do strongnot/strong copy any of these JAR
  -files into any of the internal Tomcat directories, or manually include them
  -on the codeCLASSPATH/code environment variable in your startup scripts.
  -Doing this will cause Tomcat to fail at startup time./p
  +files into any of the internal Tomcat directories. Also, do not make them both an
  +installed extension emand/em include them in the startup script's 
  +codeCLASSPATH/code. Either of these two scenerios will cause Tomcat to fail