Re: Securing Tomcat Context Descriptor

2005-08-20 Thread Peter Rossbach
I thing you can use the Java Security Manager and OS level file 
permisssion for this

or wrote your own DataSource JNDI Factory.

Peter

Brett Parsons schrieb:


Hi All,

There is a requirement on the server that we have Tomcat 5.0.28 
deployed that no username/password information can be stored in 
plaintext (in the open).  Like many people, we are using JNDI 
datasources in our web application.  The datasource connection 
information (including the database username/password) is stored in 
the Tomcat Context Descriptor under 
TOMCATDIR/conf/Catalina/localhost/myApp.xml.


Does Tomcat provide a more secure way of storing the connection 
information stored in these context deployment descriptors?  Has 
anyone else run into the same problem and been able to solve it somehow?


Thanks,

Brett



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]








-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Securing Tomcat Context Descriptor

2005-08-20 Thread Mark Thomas

A couple of observations:

- If someone can read the context descriptor they pretty much own
Tomcat and probably the server as well. If this person is unauthorised,
you have big problems regardless of whether or not they have read-only 
access to the database.


- If the password is encrypted, where do you store the decryption key?
Tomcat still needs to be able to decrypt the password in order to use
it to access the database. At best, this is security by obscurity
which is not very good security at all.

You could write some custom code that required the password to be 
entered on the command line when Tomcat starts but this still has the 
following issues:


- If Tomcat goes down, you need someone who knows the password to 
restart it. If the group of people that know the password is small, 
you have an availability issue.


- Chances are that everyone who administers Tomcat will know this 
password. Given that these people should be the only ones with access 
at the OS level to the Tomcat configuration files there seems little 
point in going to all this trouble.


In my experience securing the configuration files (Tomcat  JVM) using 
OS file permissions is usually the appropriate course of action to 
take unless your security environment is very unusual.


Mark

Brett Parsons wrote:

Hi All,

There is a requirement on the server that we have Tomcat 5.0.28 deployed 
that no username/password information can be stored in plaintext (in the 
open).  Like many people, we are using JNDI datasources in our web 
application.  The datasource connection information (including the 
database username/password) is stored in the Tomcat Context Descriptor 
under TOMCATDIR/conf/Catalina/localhost/myApp.xml.


Does Tomcat provide a more secure way of storing the connection 
information stored in these context deployment descriptors?  Has anyone 
else run into the same problem and been able to solve it somehow?


Thanks,

Brett



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]








-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Securing tomcat

2004-10-18 Thread QM
On Mon, Oct 18, 2004 at 11:47:19AM +, kax wrote:
: Are there any good documentation on how to secure Tomcat 5 for production use?

I'd bet there's a lot of good advice in the archives, as this topic
appears every so often. ;)  Google's also a good starting point.

High-level concepts to consider:
1/ Tomcat is just the container that runs your webapp; so ask yourself,
how secure is my webapp against attacks and (intentionally) improper
use?  Several texts and websites cover this topic at length.

2/ Securing Tomcat is of limited value if there are holes elsewhere.
Imagine a request, moving from the end-user's browser, through Tomcat
(and perhaps a database) and then back to the user.  What potential
vulnerabilities exist?

-QM

-- 

software  -- http://www.brandxdev.net
tech news -- http://www.RoarNetworX.com


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Re: Securing tomcat

2004-10-18 Thread kax
Hi,

Ok, I'll try to find the stuff I want to do on google. But I have some other questions 
that is somehow related to the security issue. 

1. From what I have read it is not possible to lookup the objects bound in the jndi in 
Tomcat from another JVM. Is this correct? 

2. Can I use the same name for a datasource in two different web applications deployed 
on the same instance of Tomcat? I'm using a separate context file for each application.

Thanks in advance

/Kax

 
 From: QM [EMAIL PROTECTED]
 Date: 2004/10/18 må PM 12:55:46 GMT
 To: Tomcat Users List [EMAIL PROTECTED]
 Ämne: Re: Securing tomcat
 
 On Mon, Oct 18, 2004 at 11:47:19AM +, kax wrote:
 : Are there any good documentation on how to secure Tomcat 5 for production use?
 
 I'd bet there's a lot of good advice in the archives, as this topic
 appears every so often. ;)  Google's also a good starting point.
 
 High-level concepts to consider:
 1/ Tomcat is just the container that runs your webapp; so ask yourself,
 how secure is my webapp against attacks and (intentionally) improper
 use?  Several texts and websites cover this topic at length.
 
 2/ Securing Tomcat is of limited value if there are holes elsewhere.
 Imagine a request, moving from the end-user's browser, through Tomcat
 (and perhaps a database) and then back to the user.  What potential
 vulnerabilities exist?
 
 -QM
 
 -- 
 
 software  -- http://www.brandxdev.net
 tech news -- http://www.RoarNetworX.com
 
 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 
 


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



RE: Re: Securing tomcat

2004-10-18 Thread Shapira, Yoav

Hi,

1. From what I have read it is not possible to lookup the objects bound
in
the jndi in Tomcat from another JVM. Is this correct?

Yeah.

2. Can I use the same name for a datasource in two different web
applications deployed on the same instance of Tomcat? I'm using a
separate
context file for each application.

Yeah.  Obviously if you were declaring these datasources in a
GlobalNamingResources block the answer would be No.

Yoav




This e-mail, including any attachments, is a confidential business communication, and 
may contain information that is confidential, proprietary and/or privileged.  This 
e-mail is intended only for the individual(s) to whom it is addressed, and may not be 
saved, copied, printed, disclosed or used by anyone else.  If you are not the(an) 
intended recipient, please immediately delete this e-mail from your computer system 
and notify the sender.  Thank you.


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: securing tomcat...

2002-12-31 Thread Ken Anderson
Just put this in your web.xml for root webapp or others...

 error-page
error-code404/error-code
location/404error.html/location
/error-page

and create 404error.html to say whatever you like.

Ken


Jason Pyeron wrote:

has any one put together a faq/howto on securing tomcat?

our first goal is to prevent determination of the server version by a web 
client.

an example of this is for url http://127.1:8080/xxdfsdf this is returned, note the Server: 
Apache Coyote/1.0 and Apache Tomcat/4.1.12

HTTP/1.1 404 /xxdfsdf
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Transfer-Encoding: chunked
Date: Tue, 31 Dec 2002 20:46:09 GMT
Server: Apache Coyote/1.0

htmlheadtitleApache Tomcat/4.1.12 - Error 
report/titleSTYLE!--H1{font-family : sans-serif,Arial,Tahoma;color
: white;background-color : #0086b2;} H3{font-family : 
sans-serif,Arial,Tahoma;color : white;background-color : #0086b2;}
 BODY{font-family : sans-serif,Arial,Tahoma;color : black;background-color 
: white;} B{color : white;background-color :
#0086b2;} HR{color : #0086b2;} --/STYLE /headbodyh1HTTP Status 
404 - /xxdfsdf/h1HR size=1 noshadepbty
pe/b Status report/ppbmessage/b 
u/xxdfsdf/u/ppbdescription/b uThe requested resource 
(/xxdfsdf)
is not available./u/pHR size=1 noshadeh3Apache 
Tomcat/4.1.12/h3/body/html




--
To unsubscribe, e-mail:   mailto:[EMAIL PROTECTED]
For additional commands, e-mail: mailto:[EMAIL PROTECTED]




RE: securing tomcat...

2002-12-31 Thread Brian Topping


 -Original Message-
 From: Ken Anderson [mailto:[EMAIL PROTECTED]]
 Sent: Tuesday, December 31, 2002 5:07 PM
 To: Tomcat Users List
 Subject: Re: securing tomcat...
 
 
 Just put this in your web.xml for root webapp or others...
 
   error-page
  error-code404/error-code
  location/404error.html/location
  /error-page
 
 and create 404error.html to say whatever you like.

It would still be visible in the HTTP headers, which is only ten seconds
additional work to determine for the casual hacker, and visible from any
page.

It's possible to change/remove the server string by editing the sources, of
course.  You could also front-end Tomcat with HTTPD, which I believe has a
config element for changing the server string.  

The server string is a non-essential part of client-server operation for
well-behaved servers so removing it won't make a difference, although it
doesn't do great things for the statistics that are generated for Apache :-/

-b

--
To unsubscribe, e-mail:   mailto:[EMAIL PROTECTED]
For additional commands, e-mail: mailto:[EMAIL PROTECTED]




Re: securing tomcat...

2002-12-31 Thread Gary Gwin
Jason,

If by securing you mean hardening, well then no. But we have posted a 
white paper on Tomcat security according to the servlet specification:

http://www.cafesoft.com/products/cams/tomcat-security.html

Gary

Jason Pyeron wrote:

has any one put together a faq/howto on securing tomcat?

our first goal is to prevent determination of the server version by a web 
client.

an example of this is for url http://127.1:8080/xxdfsdf this is returned, note the Server: 
Apache Coyote/1.0 and Apache Tomcat/4.1.12

HTTP/1.1 404 /xxdfsdf
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Transfer-Encoding: chunked
Date: Tue, 31 Dec 2002 20:46:09 GMT
Server: Apache Coyote/1.0

htmlheadtitleApache Tomcat/4.1.12 - Error 
report/titleSTYLE!--H1{font-family : sans-serif,Arial,Tahoma;color
: white;background-color : #0086b2;} H3{font-family : 
sans-serif,Arial,Tahoma;color : white;background-color : #0086b2;}
BODY{font-family : sans-serif,Arial,Tahoma;color : black;background-color 
: white;} B{color : white;background-color :
#0086b2;} HR{color : #0086b2;} --/STYLE /headbodyh1HTTP Status 
404 - /xxdfsdf/h1HR size=1 noshadepbty
pe/b Status report/ppbmessage/b 
u/xxdfsdf/u/ppbdescription/b uThe requested resource 
(/xxdfsdf)
is not available./u/pHR size=1 noshadeh3Apache 
Tomcat/4.1.12/h3/body/html

 


--

Gary Gwin
http://www.cafesoft.com

*
*   *
*   The Cafesoft Access Management System, Cams, is security*
*   software that provides single sign-on authentication and*
*   centralized access control for Apache, Tomcat, and custom   *
*   resources.  *
*   *
*



--
To unsubscribe, e-mail:   mailto:[EMAIL PROTECTED]
For additional commands, e-mail: mailto:[EMAIL PROTECTED]




Re: securing tomcat... [RBS2003010100000068]

2002-12-31 Thread techassistance
Ahoy there!

This is an automated response, to let you know
that we have received your query and will answer
your email as soon as possible.

We know you'd like to get back to playing our
state-of-the-art online games. We'd therefore like
to assure you that we are determined to keep our
service at the level that you've come to expect
from The River Belle Online Casino.

Thank you for your patience and enjoy your day!

Best wishes,

Sebastian
First Mate

RIVER BELLE ONLINE CASINO


   RIVER BELLE CASINOS ONLINE


RIVER BELLE   ACES HIGH
Enjoy Southern HospitalityFast Paced Casino Action

www.riverbelle.com/a3099  www.aceshigh.com/a3181

24/7 toll-free support24/7 toll-free support

USA:1 888 615 2383USA:1 877 566 0482
CANADA: 1 888 552 4196CANADA: 1 877 776 0549
UK: 0 800 783 4381UK: 0 800 169 8796

E-mail support:   E-mail support
[EMAIL PROTECTED][EMAIL PROTECTED]

E.O.E.

The River Belle Online Casino respects your online time
and privacy.  If you wish to be removed from our mailing
list and not receive any promotional e-mails from us,
please send an e-mail to [EMAIL PROTECTED] and
type UNSUBSCRIBE in the subject bar.




--
To unsubscribe, e-mail:   mailto:[EMAIL PROTECTED]
For additional commands, e-mail: mailto:[EMAIL PROTECTED]