Re: Clusters - Disabling or restricting autodiscovery via multicast (security question)

2005-08-14 Thread Peter Rossbach

OK, this is correct! Sorry, but I also thing that we must
have a secretKey and a restricted IP list to register inside cluster I 
want implement this
inside the next release. But currenly the cluster message are not 
crypted and when clients can connect
to your network your go in trouble. At secure production sites the 
replication and membership traffic send over

seperate network cards and switches.

Thanks
Peter

ryan boyd schrieb:


When using tomcat clusters on an untrusted subnet or using a routable
multicast address, i see the potential for a rogue tomcat instance to
join a cluster in order to hijack session information.  This doesn't
seem to be cured by any firewalling of incoming connections to the
valid servers, as, from what i have read, the valid servers will do a
unicast conect to the rogue sever on the address/port specified by the
rogue server's multicast transmission and will transfer session data
to it.

If this is incorrect, I'd be grateful for an explanation.  If this is
correct, Is there any way to restrict autodiscovery of cluster
membership to a known list of IPs or disable auto discovery
alltogether?

Thanks,

Ryan

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




 






-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Clusters - Disabling or restricting autodiscovery via multicast (security question)

2005-08-13 Thread ryan boyd
When using tomcat clusters on an untrusted subnet or using a routable
multicast address, i see the potential for a rogue tomcat instance to
join a cluster in order to hijack session information.  This doesn't
seem to be cured by any firewalling of incoming connections to the
valid servers, as, from what i have read, the valid servers will do a
unicast conect to the rogue sever on the address/port specified by the
rogue server's multicast transmission and will transfer session data
to it.

If this is incorrect, I'd be grateful for an explanation.  If this is
correct, Is there any way to restrict autodiscovery of cluster
membership to a known list of IPs or disable auto discovery
alltogether?

Thanks,

Ryan

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Clusters - Disabling or restricting autodiscovery (security question)

2005-07-13 Thread ryan boyd
When using tomcat clusters on an untrusted subnet or using a routable
multicast address, i see the potential for a rogue tomcat instance to
join a cluster in order to hijack session information.  This doesn't
seem to be cured
by any firewalling of incoming connections to the valid servers, as,
from what i have
read, the valid servers will conect to the rogue sever on the
address/port specified
by the rogue server's multicast transmission and will transfer session
data to it.

If this isn't correct, I'd be grateful for an explanation.  If this is
correct, Is there any way to restrict autodiscovery of cluster
membership to a
known list of IPs or disable auto discovery alltogether?

Thanks,

Ryan

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Security Question

2005-02-24 Thread Paulo César M. Jeveaux
Hi

  I am using separate contexts in Tomcat 5,0, creating a XML in
CATALINA_HOME/conf/Catalina/localhost and in this not desired context
I need to forbid to some IPs, but when use this archive and make
deploy, the Tomcat does not load the modules of the Struts and nor
Tiles plugin. Somebody knows another form to make this?

  My archive of context is thus:

Context path=/system docBase=${catalina.home}/webapps/system
debug=0 privileged=true

  Valve className=org.apache.catalina.valves.RemoteAddrValve
allow=172.17.*/

/Context

  Regards

-- 
/**
* @author Paulo César M. Jeveaux
* Java Consultant
* @version 21.0
* http://www.portaljava.com
* @deprecated
*/

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



NEWBIE: Application configuration security question

2004-06-15 Thread jochs
Hello, I have a question regarding security on Tomcat. first, some background:

I'm currently assisting in the deployment of a Xerox Docushare system. This 
implementation DocuShare runs on Tomcat (among other platforms.) The problem I've been 
having with this particular app/server setup is that DocuShare security has only two 
notions: guest access, which does not require authentication, and a registered user, 
which does require authentication (in our case against an LDAP server) and requires an 
expensive icense. I'd like the have 3 levels of security. NO ACCESS, authenticated 
LDAP users but not Docushare clients (no $$ license) and licensed, authenticated 
users. Since this scenario is not provided for out of the box, I was wondering if its 
possible to connect the Docushare connector to an LDAP valve and pipe all the 
DocuShare traffic through another LDAP authentication container (please excuse me if I 
get the Apache lexicon twisted up, I'm new at this.) In a nutshell, I'm looking to 
intercept all trafice coming to the Tomcat server (it's not being used 
for anything other than DocuShare anyways, so that should make things a little 
simpler) and require LDAP user authentication to access the server. Authenticated 
users can then see the DocuShare (by default, as DocuShare guest users) app, which 
may, in turn, require an additional authentication step to determine if a user should 
have additional access rights as a licensed user. Ideally, the LDAP authentication 
info could be passed into the DocuShare application to automate the last step, but I'd 
be more than happy even if the step required another username/password combo entry by 
the user.

Can this be done? If so, where would I start to get this off the ground? Any help is 
greatly appreciated.

-Jake


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Cross-app security question

2004-06-08 Thread Tim Funk
See the servlet spec. I know for version 2.3 of the spec (which is tomcat4 
stuff) - security is applied only to the incoming URL. (The same went for 
filters too)

For 2.4 - I know that filters can be applied on RequestDispatcher.include and 
 RequestDispatcher.forward. So security constraints might also be applied on 
them too.

In other words (I don't feel like readin it myself right now, so ..)
1) Make sure all the webapps are to the 2.4 servlet spec. (If you see 2.2 or 
2.3 anywhere in web.xml)
2) Read the spec to see if there are additional parameters you can add to 
web.xml

-Tim
Michael Mehrle wrote:
I do have a question regarding security across appfuse and other
webapps. Currently, I have two separate web applications running under
Tomcat (5.0.26):
- tdx (which is a version of appfuse)
- jGallery (which dynamically serves images)
The way jGallery works is that it 'crossmaps' image gallery directories
dynamically - it's actually pretty cool. What that means is that if I create
a folder at ../tdx/mygallery and put images in it, then typing in a URL such
as:
http://localhost:8080/jGallery/tdx/mygallery/index.html will autogenerate an
index page and also create the approprate slide pages. So far so good
The problem is that that all my security settings don't work anymore this
way since the images are being served by jGallery (and I don't want to
manage two different security settings). Also, it's difficult to make the
gallery part of my tiles configuration. I can probably point outside of my
app (haven't tried that) but it gets a bit ugly. The security settings are
the bigger problem however. I'd like to be able to map it somehow that
everything goes through the tdx project security. So, in order to see the
images and the gallery index at the URL above, users would have to log in
(such as in the default appfuse installation).
I was thinking that I could somehow bring jGallery inside tdx, but that
would mean having to merge the two web.xml files as well as tdx.xml and
jGallery.xml inside of ..conf/Catalina/localhost/. I'd rather not do that
and am hoping for some elegant solution that allows me to keep the gallery
generator and my main tdx webapp separate.
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


Cross-app security question

2004-06-07 Thread Michael Mehrle
I do have a question regarding security across appfuse and other
webapps. Currently, I have two separate web applications running under
Tomcat (5.0.26):

- tdx (which is a version of appfuse)
- jGallery (which dynamically serves images)

The way jGallery works is that it 'crossmaps' image gallery directories
dynamically - it's actually pretty cool. What that means is that if I create
a folder at ../tdx/mygallery and put images in it, then typing in a URL such
as:
http://localhost:8080/jGallery/tdx/mygallery/index.html will autogenerate an
index page and also create the approprate slide pages. So far so good

The problem is that that all my security settings don't work anymore this
way since the images are being served by jGallery (and I don't want to
manage two different security settings). Also, it's difficult to make the
gallery part of my tiles configuration. I can probably point outside of my
app (haven't tried that) but it gets a bit ugly. The security settings are
the bigger problem however. I'd like to be able to map it somehow that
everything goes through the tdx project security. So, in order to see the
images and the gallery index at the URL above, users would have to log in
(such as in the default appfuse installation).

I was thinking that I could somehow bring jGallery inside tdx, but that
would mean having to merge the two web.xml files as well as tdx.xml and
jGallery.xml inside of ..conf/Catalina/localhost/. I'd rather not do that
and am hoping for some elegant solution that allows me to keep the gallery
generator and my main tdx webapp separate.

Any suggestions?



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



general security question about public / private keys

2003-12-16 Thread Adam Hardy
Is it possible to configure tomcat to use public / private key pairs 
that implement the java.security API for authentication a la ssh? I 
assume it is but haven't found out how yet.

I'm using SSL at the moment but I need to implement a higher security 
environment in the same shape and form as ssh essentially. Just using 
public  private keys.

Does this require an applet for the browsers?

I'm currently ploughing through what I can find on the web and haven't 
got that far yet.

Thanks
Adam
--
struts 1.1 + tomcat 5.0.16 + java 1.4.2
Linux 2.4.20 Debian
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


Re: Security question

2003-06-17 Thread Bill Barker
It can't be done (at least without hacking :).  The servlet-spec only tells
how to secure a page.  There is no concept of un-securing a page.

If you are using iPlanet+Tomcat, and the un-secure areas are all static
content, then you can configure iPlanet to serve the un-secure areas
(bypassing Tomcat's security checks).  If it works, this is probably the
easiest.

Otherwise you probably would need to plug in your own custom Authenticator
that would be smart enough to un-secure some configured set of URLs.

Bob Damato [EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]
 Security for the site I'm working with was originally done via IPlanet's
 internal security. I'd like to move to using the webapp security in
 Tomcat. Under iPlanet, the security was set up with the entire site - /*
 - being secured, then specific uri's were explicitly declared
 un-secured.

 So, essentially we have
 /*  - secured
 and say
 /errors/* - explicitly open to the public

 Is this possible to replicate using Tomcat's security? It would be
 excruciating to reorganize the site, so I'd love to avoid that.




-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Security question

2003-06-17 Thread Bob Damato
Security for the site I'm working with was originally done via IPlanet's
internal security. I'd like to move to using the webapp security in
Tomcat. Under iPlanet, the security was set up with the entire site - /*
- being secured, then specific uri's were explicitly declared
un-secured.

So, essentially we have
/*  - secured
and say
/errors/* - explicitly open to the public

Is this possible to replicate using Tomcat's security? It would be
excruciating to reorganize the site, so I'd love to avoid that.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Security Question

2003-03-05 Thread Lars Nielsen Lind
I have a server with Apache 2.0.44 and Jakarta-Tomcat 4.1.18. I am using OpenSSL 
0.9.7a with Apache.

Question:

If the user activates a jsp page with a javabean component with access to a PostgreSQL 
database server (communicates with port 5432) from the secure area (https) - is it 
then possible to 'sniff' the communication between the component and the database 
server or is this communication encrypted by apache with ssl?

If it is possible to 'sniff' the communication - how do I best prevent this?

Best regards,

Lars Nielsen Lind

Re: Security Question

2003-03-05 Thread Tim Funk
Here are the channels of communication. For a typical web page there are 
3 socket connections that can be concurrently open.

A: Web Browser -- Apache
B: Apache -- Tomcat
C: Tomcat -- Database
Now onto the security ...
A: If ssl then secure
B: If ssl, then secure. If not ssl, then someone between tomcat and 
apache might be able to sniff the line. If tomcat apache on the same box 
 and someone can sniff - you have bigger problems.
C: It depends on the database protocol which is database specific. Each 
vendor can tell you this. In a usual case a database should be hidden 
from the world (via firewall) so this communucation is usually secure 
by means of only trusted people are on that network segment, but they 
could sniff the line if they wanted to.

-Tim

Lars Nielsen Lind wrote:
I have a server with Apache 2.0.44 and Jakarta-Tomcat 4.1.18. I am using OpenSSL 0.9.7a with Apache.

Question:

If the user activates a jsp page with a javabean component with access to a PostgreSQL database server (communicates with port 5432) from the secure area (https) - is it then possible to 'sniff' the communication between the component and the database server or is this communication encrypted by apache with ssl?

If it is possible to 'sniff' the communication - how do I best prevent this?

Best regards,

Lars Nielsen Lind


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


RE: Security Question

2003-03-05 Thread mech
Only the communication between browser and apache server is ssl
encrypted. Both the communications between apache and tomcat and tomcat
and database are not. At least not without further action.

So make sure that your server does not open the ajp13 connector (mod_jk
or whatever) port and db server port to the outside world. Secure your
servers, intranet, ports, use firewalls or secure the communications,
etc. Securing the system from outside can be done mostly by closing
unnecessary ports. If you cannot trust your internal network however it
might be more effort because you might consider to encrypt the
communications yourself.

Michael


 -Original Message-
 From: Lars Nielsen Lind [mailto:[EMAIL PROTECTED] 
 Sent: Mittwoch, 5. Mrz 2003 10:45
 To: Tomcat Users List
 Subject: Security Question
 
 
 I have a server with Apache 2.0.44 and Jakarta-Tomcat 4.1.18. 
 I am using OpenSSL 0.9.7a with Apache.
 
 Question:
 
 If the user activates a jsp page with a javabean component 
 with access to a PostgreSQL database server (communicates 
 with port 5432) from the secure area (https) - is it then 
 possible to 'sniff' the communication between the component 
 and the database server or is this communication encrypted by 
 apache with ssl?
 
 If it is possible to 'sniff' the communication - how do I 
 best prevent this?
 
 Best regards,
 
 Lars Nielsen Lind
 


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Security question

2002-09-23 Thread Andreas Probst

Hi David,

if it weren't Apache I would say: try 
HttpServletRequest.getUserPrincipal().getName(). Maybe it could 
be that this also works with Apache...

Andreas


 I'm trying to retrieve the userid that logged into apache and accessed 
 the current JSP page.  How can I get this info?
 
 Explanation: I'm implementing a very crude security system on my site 
 for right now (mainly to just keep people from accessing the email 
 addresses and photos on the site), but I need to implement a password 
 change page.  So what I did (and yes I know it's a hack 8), I 
 implemented a JNI interface to call htpasswd in the background.  I'm 
 trying to have an html page (that's in a secured area of course) post 
 the new password to a jsp page which will in turn retrieve the logged in 
 userID and call the interface class.
 
 Any help would be appreciated,
 David J
 -- 
 If you only compete with yourself,
  you can always be a winner. - David Jenkins
 Of course, you could always be a loser too. - Miles Thornton
 
 
 --
 To unsubscribe, e-mail:   mailto:[EMAIL PROTECTED]
 For additional commands, e-mail: mailto:[EMAIL PROTECTED]
 



--
To unsubscribe, e-mail:   mailto:[EMAIL PROTECTED]
For additional commands, e-mail: mailto:[EMAIL PROTECTED]




Security question

2002-09-22 Thread David Jenkins

I'm trying to retrieve the userid that logged into apache and accessed 
the current JSP page.  How can I get this info?

Explanation: I'm implementing a very crude security system on my site 
for right now (mainly to just keep people from accessing the email 
addresses and photos on the site), but I need to implement a password 
change page.  So what I did (and yes I know it's a hack 8), I 
implemented a JNI interface to call htpasswd in the background.  I'm 
trying to have an html page (that's in a secured area of course) post 
the new password to a jsp page which will in turn retrieve the logged in 
userID and call the interface class.

Any help would be appreciated,
David J
-- 
If you only compete with yourself,
 you can always be a winner. - David Jenkins
Of course, you could always be a loser too. - Miles Thornton


--
To unsubscribe, e-mail:   mailto:[EMAIL PROTECTED]
For additional commands, e-mail: mailto:[EMAIL PROTECTED]




Jboss Tomcat integrated security question.

2002-08-21 Thread Austin Gonyou

Is there a list of security related changes made to Jboss and Tomcat
between 2.4.1-3.2.3 and the most recent stable releases? We're trying to
compile a list of security related reasons for upgrading. TIA
-- 
Austin Gonyou [EMAIL PROTECTED]
Coremetrics, Inc.



signature.asc
Description: This is a digitally signed message part


Realm Security Question

2002-07-22 Thread Jamie M. Guillemette

Ok here is a straight forward question:

I understand how to change my server.xml and setup my web.xml files so that security 
reaml on my server uses odbc to verify the roles / passwords. 

The catch is im not very happy with having to edit the server.xml file. I would like 
to know if their is anyway to accomplish the same results by editing only files that 
are contained in the webapps directory. ( the idead behind this is im creating war 
files and do not wish to have editing the server.xml file as part of the installation 
procedure of my application)

Thanks,
j.




Re: Realm Security Question

2002-07-22 Thread Craig R. McClanahan



On Mon, 22 Jul 2002, Jamie M. Guillemette wrote:

 Date: Mon, 22 Jul 2002 14:54:17 -0400
 From: Jamie M. Guillemette [EMAIL PROTECTED]
 Reply-To: Tomcat Users List [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Realm Security Question

 Ok here is a straight forward question:

 I understand how to change my server.xml and setup my web.xml files so
 that security reaml on my server uses odbc to verify the roles /
 passwords.


Off topic comment -- you probably do not want to use ODBC for this, at
least not with the standard JDBC-ODBC driver which is not thread safe.

 The catch is im not very happy with having to edit the server.xml file.
 I would like to know if their is anyway to accomplish the same results
 by editing only files that are contained in the webapps directory. ( the
 idead behind this is im creating war files and do not wish to have
 editing the server.xml file as part of the installation procedure of my
 application)


Tomcat 4.1.x lets you have a thing called a context configuration file
that is separate from server.xml, and store one of these in webapps if you
want to (or deploy it via the Manager webapp).

Basically, a context configuration file takes the Context element, and
all its nested elements, out of server.xml into a separately maintainable
file -- so you can still configure all the stuff that requires nested
elements in a Context element, without having to physically modify the
server.xml file.  And, if you put such a file in the webapps directory,
the corresponding app is auto-deployed just like if you had put a
directory or WAR file there.

In a standard 4.1.x release, the admin and manager webapps are both
auto-deployed from such a context configuration file -- see
$CATALINA_HOME/webapps/admin.xml and
$CATALINA_HOME/webapps/manager.xml for examples of the kinds of things
you can do.

And no, none of this stuff works (or ever will work) on 4.0.x -- it's a
new 4.1.x feature.

 Thanks,
 j.



Craig



--
To unsubscribe, e-mail:   mailto:[EMAIL PROTECTED]
For additional commands, e-mail: mailto:[EMAIL PROTECTED]




jsp:include security question

2002-02-25 Thread Pat Schaider

Hello --

I am trying to get a new Tomcat system configured for my school's CS
department.  We want to use version 4 (I am working with 4.0.2).

We need a system that lets students keep their files private, to make sure
that nobody cheats by stealing somebody's servlets or jsp.  I am testing
it out to make sure that student1 cannot access the files of 
student2.  Also I should note that students will not be logging in to this
box so standard file permissions will not cut it.  Students will upload
all files through a script utility, so all files will be owned bt that
user.

The problem is this: with a more-or-less default installation of Tomcat
using the security manager, in a jsp:include you can access outside of
your context using ../../../ .  Note that in other forms of reading the
files, the security manager correctly prohibits access (both in a
jsp:include giving the real path, and in standard programmatic file 
opening with real and ../ paths).  It's just in the case of the include
with relative path that it allows access to others' files.

Here's a sample line of a jsp that should generate an error, but
doesn't.  The contexts are foo1/ and foo2/, they are defined in separate
context tags.  This line is from a file in foo1/.
jsp:include page=../../../foo2/jsp/include/junk.txt/

That line allows the script in foo1 to access the file in foo2/.  The same
path in a BufferedReader causes an error.

Somebody please help me.  Is this a configuration error, a bug, or am I
just being thick-headed about it???

Thanks for your time.

--==pat schaider==--
[EMAIL PROTECTED]


--
To unsubscribe:   mailto:[EMAIL PROTECTED]
For additional commands: mailto:[EMAIL PROTECTED]
Troubles with the list: mailto:[EMAIL PROTECTED]




Re: Security question

2001-11-16 Thread Pritpal Dhaliwal

You could always use Referrer to see where the request is coming from.  I am
not sure if this would work if you used  a dispatcher.

Pritpal Dhaliwal


- Original Message -
From: Laurent Michenaud [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, November 15, 2001 7:38 AM
Subject: Security question


 Hi,

 It is possible de verify that a servlet has been called by a specific
 servlet or jsp
 and that it can't be called by another one.


 Michenaud Laurent
 - Adeuza -
 [ Développeur Web - Administrateur Réseau ]


 --
 To unsubscribe:   mailto:[EMAIL PROTECTED]
 For additional commands: mailto:[EMAIL PROTECTED]
 Troubles with the list: mailto:[EMAIL PROTECTED]




--
To unsubscribe:   mailto:[EMAIL PROTECTED]
For additional commands: mailto:[EMAIL PROTECTED]
Troubles with the list: mailto:[EMAIL PROTECTED]




Re: Fixed - Repost:HELP! Security question - grant entries

2001-11-16 Thread Antony Bowesman

Hi,

Got it to work, permissions for JSPs can only be given at the context
root level.  I was trying to be more fine grained which is not possible.

Antony

Antony Bowesman wrote:
 
 Hi,
 
 How can you assign permissions to code compiled from a JSP, it is
 possible or do you have to put all code that performs actions that may
 encounter security checks inside a bean and then allocate permissions to
 the bean class?
 
 I tried adding
 
 grant codeBase
 file:${catalina.home}/work/localhost/examples/jsp/security/protected/-
 {
 permission java.security.AllPermission;
 };
 
 to the conf/catalina.policy but I get an AccessControlException because
 the compiled code in the stack frame
 
 org.apache.jsp.index$jsp._jspService(index$jsp.java:116)
 
 does not have permission.
 
 It's tomcat 4.0
 
 Any ideas?
 Antony
 
 --
 To unsubscribe:   mailto:[EMAIL PROTECTED]
 For additional commands: mailto:[EMAIL PROTECTED]
 Troubles with the list: mailto:[EMAIL PROTECTED]

-- 
Antony Bowesman
Teamware Group 
[EMAIL PROTECTED]
phone: +358 9 5128 2562
fax  : +358 9 5128 2705

intra / extra / Internet solutions at www.teamware.com

--
To unsubscribe:   mailto:[EMAIL PROTECTED]
For additional commands: mailto:[EMAIL PROTECTED]
Troubles with the list: mailto:[EMAIL PROTECTED]




Security question

2001-11-15 Thread Laurent Michenaud

Hi,

It is possible de verify that a servlet has been called by a specific
servlet or jsp
and that it can't be called by another one.


Michenaud Laurent
- Adeuza -
[ Développeur Web - Administrateur Réseau ]


--
To unsubscribe:   mailto:[EMAIL PROTECTED]
For additional commands: mailto:[EMAIL PROTECTED]
Troubles with the list: mailto:[EMAIL PROTECTED]




Re: Security question

2001-11-15 Thread Frank Lawlor

You can pass (possibly encrypted) information that
only the two parties know.  This is essentially 
authentication like your username/password.

Frank Lawlor
Athens Group, Inc.
(512) 345-0600 x151
Athens Group, an employee-owned consulting firm integrating technology
strategy and software solutions.




--
To unsubscribe:   mailto:[EMAIL PROTECTED]
For additional commands: mailto:[EMAIL PROTECTED]
Troubles with the list: mailto:[EMAIL PROTECTED]




Security question - grant entries

2001-11-15 Thread Antony Bowesman

Hi,

How do you grant permissions in the policy file to jsp pages. I've tried

grant codeBase
file:${catalina.home}/work/localhost/examples/jsp/security/protected/-
{
permission java.security.AllPermission;
};

but I get an AccessControlException when some code in the jsp tries to
do something that requires certain permission.

It's tomcat 4.0

Any ideas?
Antony

--
To unsubscribe:   mailto:[EMAIL PROTECTED]
For additional commands: mailto:[EMAIL PROTECTED]
Troubles with the list: mailto:[EMAIL PROTECTED]




Repost:HELP! Security question - grant entries

2001-11-15 Thread Antony Bowesman

Hi,

How can you assign permissions to code compiled from a JSP, it is
possible or do you have to put all code that performs actions that may
encounter security checks inside a bean and then allocate permissions to
the bean class?

I tried adding 

grant codeBase
file:${catalina.home}/work/localhost/examples/jsp/security/protected/-
{
permission java.security.AllPermission;
};

to the conf/catalina.policy but I get an AccessControlException because
the compiled code in the stack frame

org.apache.jsp.index$jsp._jspService(index$jsp.java:116)

does not have permission.

It's tomcat 4.0

Any ideas?
Antony

--
To unsubscribe:   mailto:[EMAIL PROTECTED]
For additional commands: mailto:[EMAIL PROTECTED]
Troubles with the list: mailto:[EMAIL PROTECTED]




Re: Security Question

2001-10-26 Thread Frank Lawlor

I've started looking at some of the security issues
but I'm still behind where you are in the area of
your questions.

Where did you find this document that has 
section 8 on Existing Risks and Problems 

Thanks,

Frank Lawlor
Athens Group, Inc.
(512) 345-0600 x151
Athens Group, an employee-owned consulting firm integrating technology
strategy and software solutions.






Security Question

2001-10-25 Thread Drasko . Kokic



Hi there,
I have read the Existing Risks and Problems (Chapter 8 in the internal
document of the TC-3.3) and spotted that there is a potentional security
risk in using Tomcat as a platform for the Application Gateway to an
enterprise business support system.
One of very important subprojects I still need to solve is providing a
secure environment and currently we are constructing a sort of Checking
Engine that basically test every parameter against predescribed conditions
and reject all invalid requests.
Has anybody already thought about this or eventually produced some
code/concept?  I hope some of original contributors will also read this
post.
I have some development resources allocated to this task, but would prefer
if we could join forces with other interested parties as this must be a
very important issue.
Drasko





Fw: Security Question

2001-10-19 Thread Gerry Duhig

I am using Tomcat with JBoss and JBoss is handling security. Everything
works fine and each time a secured component is accessed I see two lines in
the logs:

User: name is authenticated
User: name is authorized

There are now thousands of these lines! How do I get rid of them?

There are so many it must be a significant impact on performance and its
over-filling the logs.

Help please

Gerry




RE: Security Question

2001-10-19 Thread Darrell Porter

What is your debug level in the context?

Darrell


-Original Message-
From: Gerry Duhig [mailto:[EMAIL PROTECTED]]
Sent: Friday, October 19, 2001 9:34 AM
To: [EMAIL PROTECTED]
Subject: Fw: Security Question


I am using Tomcat with JBoss and JBoss is handling security. Everything
works fine and each time a secured component is accessed I see two lines in
the logs:

User: name is authenticated
User: name is authorized

There are now thousands of these lines! How do I get rid of them?

There are so many it must be a significant impact on performance and its
over-filling the logs.

Help please

Gerry



Re: Security Question

2001-10-19 Thread Gerry Duhig

In server.xml, Context Manager, I have debug=0 and showDebugInfo=false.

In the same file, all logging verbosity levels are set to ERROR.

These messages seem to be on stdout or sterr not a specific log file.

Gerry

- Original Message -
From: Darrell Porter [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, October 19, 2001 5:56 PM
Subject: RE: Security Question


 What is your debug level in the context?

 Darrell


 -Original Message-
 From: Gerry Duhig [mailto:[EMAIL PROTECTED]]
 Sent: Friday, October 19, 2001 9:34 AM
 To: [EMAIL PROTECTED]
 Subject: Fw: Security Question


 I am using Tomcat with JBoss and JBoss is handling security. Everything
 works fine and each time a secured component is accessed I see two lines
in
 the logs:

 User: name is authenticated
 User: name is authorized

 There are now thousands of these lines! How do I get rid of them?

 There are so many it must be a significant impact on performance and its
 over-filling the logs.

 Help please

 Gerry




Re: Security question

2001-09-01 Thread Craig R. McClanahan



On Wed, 29 Aug 2001, Achim Baier wrote:


 Now my question:
 Am I wrong-minded, is it bug or is it a jsp/servlet/j2ee-feature? Any
 comments?


Security constraints that you mention in your web.xml deployment
descriptor are *only* applied to the original request URI, *not* to any
request URI that is included by your servlet or JSP page.  That is by
design.

If the content from a particular include should not be displayed to a
particular user (because they don't have a required role), you should not
be doing the include in the first place.

 Thanks in advance,
 Achim


Craig McClanahan





Security question

2001-08-29 Thread Achim Baier

Hello everybody, 

I just tried to make a HTTPS connection to a web-application on tomcat
3.2.2. Because of the documentation it was not difficult but I
recognized something I want to ask about.

I have a directory /secure/. Every resource inside is protected by
web.xml security constraint (pattern /secure/* transport-guarantee
CONFIDENTIAL). In this directory I have 2 files (index_1.jsp and
component.jsp). I also have another JSP page (index_2.jsp) outside
the secured directory. index_1.jsp makes a jsp:include
page=component.jsp. 

If I try to view index_1.jsp (or component.jsp directly) I have to
use HTTPS and to login. But if index_2.jsp also does a jsp:include
page=component.jsp I'm able to view the page with HTTP and without
login. Because jsp:include is executed at request time it should (be
able to) check permissions. 

I could use userInRole and check the schema inside component.jsp but
this would break my goal to just use declarative security. My business
layer objects could check this (if I use EJBs I could also use
declaratice security) but I still have a bad feeling about that. It will
be possible to view secured content within every JSP-page. It's not
enough to look at the deployment descriptor and the page/component which
should be protected but also to every other page.

Now my question:
Am I wrong-minded, is it bug or is it a jsp/servlet/j2ee-feature? Any
comments?

Thanks in advance,
Achim



Tomcat security question

2001-07-19 Thread Hamish Barney

Just hoping someone can help me deal with this question...

In the application I'm developing I need to restrict access to a bunch of
binary files (sound recordings). Each user should only be able to download
their own files. Files and users will be added and deleted dynamically. The
realm based security in Tomcat doesn't seem to support the security model I
require (creating a new role for every single user and associating that with
their files isn't really practical). Does anyone have an idea as to how
acheive the required security within a Tomcat framework.

Thanks,
Hamish



RE: Tomcat security question

2001-07-19 Thread Randy Layman


You would probably be best off implementing it in a servlet.  The
servlet can authenticate  the user, determine the specific file, and then
send the file (not redirect) to the client.  Since you are sending the file
the files can reside anywhere on the system or even on another system.

Randy

 -Original Message-
 From: Hamish Barney [mailto:[EMAIL PROTECTED]]
 Sent: Thursday, July 19, 2001 10:56 AM
 To: '[EMAIL PROTECTED]'
 Subject: Tomcat security question
 
 
 Just hoping someone can help me deal with this question...
 
 In the application I'm developing I need to restrict access 
 to a bunch of
 binary files (sound recordings). Each user should only be 
 able to download
 their own files. Files and users will be added and deleted 
 dynamically. The
 realm based security in Tomcat doesn't seem to support the 
 security model I
 require (creating a new role for every single user and 
 associating that with
 their files isn't really practical). Does anyone have an idea 
 as to how
 acheive the required security within a Tomcat framework.
 
 Thanks,
 Hamish
 



Newbie security question

2001-04-25 Thread laurent . citton




Hi guys,

I have a very simple problem: how can I prevent Tomcat from displaying a
directory listing ? My servlets are installed in webapps/app directory and
asking for the URL http://localhost:8080/app/ just displays the content of the
directory, which I obviously do not want.


Thanks for your answer


*

Ce message et toutes les pieces jointes (ci-apres le message) sont
confidentiels et etablis a l'intention exclusive de ses destinataires.
Toute utilisation ou diffusion non autorisee est interdite. 
Tout message electronique est susceptible d'alteration. 
La SOCIETE GENERALE et ses filiales declinent toute responsabilite au titre de ce 
message s'il a ete altere, deforme ou falsifie.



This message and any attachments (the message) are confidential and
intended solely for the addressees.
Any unauthorised use or dissemination is prohibited. 
E-mails are susceptible to alteration.   
Neither SOCIETE GENERALE nor any of its subsidiaries or affiliates shall be liable for 
the message if altered, changed or falsified. 

*



Re: security question

2001-04-06 Thread skolski

Hello Jeff, Hello List,

thank you very much for your reply. A look at this example would have
prevent me from spending a lot of time and writeing the other mail. The
build in example doesn't work at my installation. That j_security_check
stuff is missing. But that doesn't matter, I try to use basic auth for the
first throw.

I copied the parts of examples web.xml to my context and modified the path.
If I try to surf to that "secret" path the password box pops up. The
password box then only accepts the valid users, so far everything is o.k.
But then there is a 404 Error. The Browser points to the right file in the
right directory but there is a 404 not found. How is that possible? What do
I do wrong?

thannks in advance,

Sascha





security question

2001-04-05 Thread skolski

Hello everybody,

the "problem" is that I should have some security on my site. I think of
authentifikation by a username and password and then access rights for
special areas of the site. so far, so good. I started looking arround. I
know have a login form, a jsp to chaeck username and password and a bean to
store weather the user is loged in or not. OK. but that didn't help me,
because I have cocoon-generated html pages on my site. And as far as I know
in html beans can not be used.

What I thinkis, that you can configure tomcat to check those security
things. I've been to the faq but the security section is empty, i've read
the userguide many times but this points I couldn't find. So the questions
are:

1.) How to set up (for example) basic security in tomcat?

2.) Do I need my own login forms, and how would they work together with
tomcat?

3.) Do I have to check somewhere if a user is loged on?

4.) Is there any FAQ or Tutorial about webserver security?

so thanks for reading this, feel free to answer,

Sascha





Re: security question

2001-04-05 Thread Jeff Turner

It's all defined in the servlet spec, downloadable from
http://java.sun.com/products/servlet/index.html.

Tomcat comes with a preconfigured example (examples/jsp/security)
demonstrating this.

--Jeff

On Fri, Apr 06, 2001 at 09:49:38AM +0800, [EMAIL PROTECTED] wrote:
 Hello everybody,
 
 the "problem" is that I should have some security on my site. I think of
 authentifikation by a username and password and then access rights for
 special areas of the site. so far, so good. I started looking arround. I
 know have a login form, a jsp to chaeck username and password and a bean to
 store weather the user is loged in or not. OK. but that didn't help me,
 because I have cocoon-generated html pages on my site. And as far as I know
 in html beans can not be used.
 
 What I thinkis, that you can configure tomcat to check those security
 things. I've been to the faq but the security section is empty, i've read
 the userguide many times but this points I couldn't find. So the questions
 are:
 
 1.) How to set up (for example) basic security in tomcat?
 
 2.) Do I need my own login forms, and how would they work together with
 tomcat?
 
 3.) Do I have to check somewhere if a user is loged on?
 
 4.) Is there any FAQ or Tutorial about webserver security?
 
 so thanks for reading this, feel free to answer,
 
 Sascha