RE: OpenSSL config for Tomcat 7

2020-03-02 Thread John Beaulaurier -X (jbeaulau - ADVANCED NETWORK INFORMATION INC at Cisco)
Below are the two connector configs I have tested with.






-John 

-Original Message-
From: Mark Thomas  
Sent: Saturday, February 29, 2020 2:12 AM
To: users@tomcat.apache.org
Subject: Re: OpenSSL config for Tomcat 7



On 29/02/2020 00:22, John Beaulaurier -X (jbeaulau - ADVANCED NETWORK 
INFORMATION INC at Cisco) wrote:
> Hello,
> 
> We're running Tomcat 7 and need to implement SSL. We are using 
> APR/OpenSSL, but I can't get the intermediate certificates pulled in when 
> starting Tomcat. The server certificate is recognized and used but not the 
> other two. I have tried the following in PEM format.
> 
> 
>   *   Stacking them in one file and using the "SSLCertificateFile" directive
>   *   Using the "SSLCertificateFile" directive for the server cert, and 
> "SSLCertificateChainFile" directive for the CA and root cert
> 
> 
>  *   APR 1.4.8
>  *   Tomcat 7.0.39
> 
> Any additional information needed please let me know. Any insight would be 
> greatly appreciated.

The exact connector configuration you are using for each test case along with a 
description of how you created the files referenced in each configuration.

Mark

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: OpenSSL config for Tomcat 7

2020-03-02 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

John,

On 3/2/20 12:26, John Beaulaurier -X (jbeaulau - ADVANCED NETWORK
INFORMATION INC at Cisco) wrote:
> Yes, that is what I have done.

Can you please post your actual  configuration? Also,
please list the order of certificates in your SSLCertificateFile file.

Maybe:

$ grep '===' [SSLCertificateFile].pem

and post that?

- -chris

> -Original Message- From: Jason Wee 
> Sent: Friday, February 28, 2020 11:29 PM To: Tomcat Users List
>  Subject: Re: OpenSSL config for Tomcat 7
>
> when you stack them, do you mean you cat those certificates into
> one pem file?
>
> On Sat, Feb 29, 2020 at 8:22 AM John Beaulaurier -X (jbeaulau -
> ADVANCED NETWORK INFORMATION INC at Cisco)
>  wrote:
>>
>> Hello,
>>
>> We're running Tomcat 7 and need to implement SSL. We are using
>> APR/OpenSSL, but I can't get the intermediate certificates pulled
>> in when starting Tomcat. The server certificate is recognized and
>> used but not the other two. I have tried the following in PEM
>> format.
>>
>>
>> *   Stacking them in one file and using the "SSLCertificateFile"
>> directive *   Using the "SSLCertificateFile" directive for the
>> server cert, and "SSLCertificateChainFile" directive for the CA
>> and root cert
>>
>>
>> *   APR 1.4.8 *   Tomcat 7.0.39
>>
>> Any additional information needed please let me know. Any insight
>> would be greatly appreciated.
>>
>> Regards -John
>>
>>
>
> -
>
>
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>
> -
>
>
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
-BEGIN PGP SIGNATURE-
Comment: Using GnuPG with Thunderbird - https://www.enigmail.net/

iQIzBAEBCAAdFiEEMmKgYcQvxMe7tcJcHPApP6U8pFgFAl5dRI8ACgkQHPApP6U8
pFg/YxAAix8Mjs9gKydKDMJGra5ltPx1J7VuTMeFaLCp35QwxlqJL1iPMsN7fjpH
A/BAItqlIS6qPmOOwfe5PQMyr1FlQn73heimddpAu6WyuzPcOK6cLSY9cmEVUsJg
qQ5D/UmL0hqSDA3jcfoq7MvPU5GxvkK8QpHcnCOjFzVSd1XkZ3WqvTAkMN3JdJbM
tGdYHTyukCgvVcK0PtwGQvfOkxxFw/NaYJfzb0ka1D9Qt18OGQpEeZgJK48m72qN
0L681QG2grQZju50FZv+GCFLbNxBBfL1xV80B+q8+hzMc04T8s0HsVjtLJCAq08X
+mrwt7RcGPW/1nQLNI+JRzR0a1Epd0R9mZRTZQYUpSsGliOFucPqgCL33R2zCukm
/4X0ILEb73fGOfrzS9WhGJ18133jSCLAfrkW2zl0FfPTbliCw03kGOxcwOdbeY+w
jt0W3+KISWGZXUj0hSCgvASH10mNRVKxNioPgHX7LMSG0eAoHpj6+wClRM4FX9ca
3kf10sI0kX13D2gVjFyaAQXnLogUmNRrd75HtXNFZ0PcGoNQIzSemm/8crVxUHKI
jyWBaEpdRqX9H76D8YWaBwa7BaDYaU4amWB0jpGmcaUYTeoRW0w5KA4sOn7Q0ksV
KNIDj1KkOM71kSskHoB04923ns/TF1jlQsZzMUioiAtMalctwRI=
=rtZu
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Proposal: Note on web site that Tomcat 10 is a milestone-release

2020-03-02 Thread Johan Compagner
And when you are at it, also mention there in big letters that they really
should read the release notes... This tomcat will not work with all the
major frameworks people use for quite some time...

Op ma 2 mrt. 2020 18:23 schreef Christopher Schultz <
ch...@christopherschultz.net>:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> All,
>
> If you go to tomcat.apache.org right now, you'll see documentation and
> downloads for Tomcat 10. In the news section, it's shown as 10.0.0-M1
> so that might be an indication that it's not a "normal" release.
>
> Anyone going to the site and not reading the (current) top-item of
> news might think that Tomcat 10 is the current best version to download.
>
> I propose the following:
>
> 1. Add a [beta] (or similar) badge to the [Tomcat 10] download and
> [Tomcat 10.0] documentation links.
>
> 2. On the "which version" page, add a [beta] (or similar) badge to the
> Tomcat 10 release
>
> 3. On the Tomcat 10 downloads page, in the summary section, add a very
> prominent statement that says Tomcat 10 is in [beta] or similar. I
> might even use a large font and/or red or some other
> attention-grabbing text color.
>
> 4. Similar to [3] above, but on the Tomcat 10 documentation page
> introduction.
>
> WDYT?
>
> - -chris
> -BEGIN PGP SIGNATURE-
> Comment: Using GnuPG with Thunderbird - https://www.enigmail.net/
>
> iQIzBAEBCAAdFiEEMmKgYcQvxMe7tcJcHPApP6U8pFgFAl5dQOkACgkQHPApP6U8
> pFglHA//XKKCS260Hvx+gA5YshiPYOpKS7FOG/bDzef9Y+JqMpuFMrOt/7d2AG2/
> X7GqQ57mJ+aew5p+nncXWV5yXd3fGyhPCeDsdF5pNc3K87dYs0MZCt/5nB9D2mJK
> 3uoRQjQscwo2pBuozpBViw19HoeoEjQGWHWrs60LTckODDQj1IcT6zZUgckGkMaP
> sPu1x+kra+5psKWtK91S6KOERoYQ13gNhIAIlEgCavLzwOoyz3El5/9iXne2rP/w
> tePV+1e9r7ltF6WBJtA72xMAS1mXvK+bW1Wpm/5dMicpnRF04vaOUlZularWgbvO
> 8p67YCJ3keaVtKcfDVHxSUVUUbjroWX9beoOnTDujw6zUapoKzibtU9EEyEOQXIW
> C946ZhyPjS6I+liRHGQHKkQgBMUpHC+WGmasC5RW6+hySJCTjp6TGKlr5vuDk0th
> OtcuHgzaOoqqVjYOZwArQi96c0l5/RW/6wxseunvK5n8TzP/l3F5jP627dUodsWV
> B1qQfP3aePMGaTnRDuookTBoS1FLANc2Fc0m6hpTJmVkgcrYSFo4vmlljSGUCSkB
> rUzY10W3rLu467ipcoFEzMGgVmM0cO29qk35JqPj0DtZa5BbFQTQa95iERxnRx45
> izIC7Nz5+UUdjdcoMhIVMdq/oA1TC++MXpRMOoYlOpnOf7hT+yo=
> =nLsr
> -END PGP SIGNATURE-
>
> -
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>


RE: OpenSSL config for Tomcat 7

2020-03-02 Thread John Beaulaurier -X (jbeaulau - ADVANCED NETWORK INFORMATION INC at Cisco)
Yes, that is what I have done.

-Original Message-
From: Jason Wee  
Sent: Friday, February 28, 2020 11:29 PM
To: Tomcat Users List 
Subject: Re: OpenSSL config for Tomcat 7

when you stack them, do you mean you cat those certificates into one pem file?

On Sat, Feb 29, 2020 at 8:22 AM John Beaulaurier -X (jbeaulau - ADVANCED 
NETWORK INFORMATION INC at Cisco)  wrote:
>
> Hello,
>
> We're running Tomcat 7 and need to implement SSL. We are using 
> APR/OpenSSL, but I can't get the intermediate certificates pulled in when 
> starting Tomcat. The server certificate is recognized and used but not the 
> other two. I have tried the following in PEM format.
>
>
>   *   Stacking them in one file and using the "SSLCertificateFile" directive
>   *   Using the "SSLCertificateFile" directive for the server cert, and 
> "SSLCertificateChainFile" directive for the CA and root cert
>
>
>  *   APR 1.4.8
>  *   Tomcat 7.0.39
>
> Any additional information needed please let me know. Any insight would be 
> greatly appreciated.
>
> Regards
> -John
>
>

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Proposal: Note on web site that Tomcat 10 is a milestone-release

2020-03-02 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

All,

If you go to tomcat.apache.org right now, you'll see documentation and
downloads for Tomcat 10. In the news section, it's shown as 10.0.0-M1
so that might be an indication that it's not a "normal" release.

Anyone going to the site and not reading the (current) top-item of
news might think that Tomcat 10 is the current best version to download.

I propose the following:

1. Add a [beta] (or similar) badge to the [Tomcat 10] download and
[Tomcat 10.0] documentation links.

2. On the "which version" page, add a [beta] (or similar) badge to the
Tomcat 10 release

3. On the Tomcat 10 downloads page, in the summary section, add a very
prominent statement that says Tomcat 10 is in [beta] or similar. I
might even use a large font and/or red or some other
attention-grabbing text color.

4. Similar to [3] above, but on the Tomcat 10 documentation page
introduction.

WDYT?

- -chris
-BEGIN PGP SIGNATURE-
Comment: Using GnuPG with Thunderbird - https://www.enigmail.net/
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=nLsr
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



RE: Tomcat 10.0.0-M1 can't get JSP taglib to work

2020-03-02 Thread ed
Thanks Mark

-Original Message-
From: Mark Thomas  
Sent: Monday, March 2, 2020 12:11 PM
To: users@tomcat.apache.org
Subject: Re: Tomcat 10.0.0-M1 can't get JSP taglib to work

On 02/03/2020 14:49, e...@wolfecomputerservices.com wrote:
> Thanks for the reply Mark!
> 
> Well, that stinks!  It is new development and so it would only make 
> sense to use the latest server; however, if it is a step backward in 
> functionality (because supporting libraries are not available) then I 
> guess I'll have to use the previous version.

Jakarta EE 9 is still in development - hence why the Tomcat 10 release is a 
Milestone.

It isn't a given that libraries written to the Java EE 8 APIs will be updated 
for the Jakarta EE 9.

If Jakarta EE 9 versions of libraries are not available then there are a couple 
of options:

1. Convert an existing JAR written for Java EE 8 to Jakarta EE 9 using the 
migration tool the Tomcat team has written for that purpose.

2. Stick with Tomcat 9. We will be producing versions of Tomcat (9.10.x, 9.11.x 
etc) that align with Tomcat 10, Tomcat 11, etc. apart from the fact they will 
continue to support the Java EE 8 APIs so there is an upgrade path for newer 
Tomcat functionality while retaining Java EE 8 compatibility,

Mark


> 
> -Original Message-
> From: Mark Thomas 
> Sent: Monday, March 2, 2020 9:34 AM
> To: users@tomcat.apache.org
> Subject: Re: Tomcat 10.0.0-M1 can't get JSP taglib to work
> 
> On 02/03/2020 14:16, e...@wolfecomputerservices.com wrote:
>> I have tried everything in the multiple threads on this site (non of 
>> them were for Tomcat 10 and non of the solved problem.  I am using 
>> Apache NetBeans 11.1 with Apache Tomcat 10.0.0-M1. Below is my 
>> configuration -- if I remove the taglib line from my jsp file, the 
>> error
> goes away.
> 
> From the Tomcat 10.0.0-M1 release announcement:
> 
> 
> Users of Tomcat 10 onwards should be aware that, as a result of the 
> move from Java EE to Jakarta EE as part of the transfer of Java EE to 
> the Eclipse Foundation, the primary package for all implemented APIs 
> has changed from
> javax.* to jakarta.*. This will almost certainly require code changes 
> to enable applications to migrate from Tomcat 9 and earlier to Tomcat 
> 10 and later.
> 
> 
> 
>> 
>>
>> javax
>>
>> javaee-web-api
>>
>> 8.0.1
>>
>> provided
>>
>> 
> 
> That is never going to work on Tomact 10. You can't use Java EE 8 
> libraries with a Jakarta EE 9 server.
> 
>> 
>>
>> javax.mail
>>
>> mail
>>
>> 1.4.7
>>
>> jar
>>
>> 
> 
> That needs to be replaced with Jakarta Mail (there might be an RC for 
> that on Maven Central)
> 
>>
>> 
>>
>> org.springframework
>>
>> spring-web
>>
>> 5.1.10.RELEASE
>>
>> 
> 
> That won't work and, as far as I am aware, there is no Jakarta EE 9 
> version available (or even being worked on) yet.
> 
>> 
>>
>> javax.servlet
>>
>> jstl
>>
>> 1.2
>>
>> 
>>
>> 
> 
> You need the Jakarta Standard Tag Library 2.0 or later. I think that 
> is one of the Jakarta projects struggling for active committers.
> 
> Tomcat 10 ships with an API and implementation for the Jakarta 
> Standard Tag Library 2.0 in the examples web application. It was 
> created by taking the JSTL 1.2 JARs and running them through Tomcat's 
> Java EE 8 to Jakarta EE 9 conversion / migration tool.
> 
>> test.jsp
> 
> 
> 
> Might sticking with Tomcat 9 be a better option for you for now?
> 
> Mark
> 
> -
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 
> 
> 
> 
> 
> -
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org





-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Tomcat 10.0.0-M1 can't get JSP taglib to work

2020-03-02 Thread Mark Thomas
On 02/03/2020 14:49, e...@wolfecomputerservices.com wrote:
> Thanks for the reply Mark!
> 
> Well, that stinks!  It is new development and so it would only make sense to
> use the latest server; however, if it is a step backward in functionality
> (because supporting libraries are not available) then I guess I'll have to
> use the previous version.

Jakarta EE 9 is still in development - hence why the Tomcat 10 release
is a Milestone.

It isn't a given that libraries written to the Java EE 8 APIs will be
updated for the Jakarta EE 9.

If Jakarta EE 9 versions of libraries are not available then there are a
couple of options:

1. Convert an existing JAR written for Java EE 8 to Jakarta EE 9 using
the migration tool the Tomcat team has written for that purpose.

2. Stick with Tomcat 9. We will be producing versions of Tomcat (9.10.x,
9.11.x etc) that align with Tomcat 10, Tomcat 11, etc. apart from the
fact they will continue to support the Java EE 8 APIs so there is an
upgrade path for newer Tomcat functionality while retaining Java EE 8
compatibility,

Mark


> 
> -Original Message-
> From: Mark Thomas  
> Sent: Monday, March 2, 2020 9:34 AM
> To: users@tomcat.apache.org
> Subject: Re: Tomcat 10.0.0-M1 can't get JSP taglib to work
> 
> On 02/03/2020 14:16, e...@wolfecomputerservices.com wrote:
>> I have tried everything in the multiple threads on this site (non of 
>> them were for Tomcat 10 and non of the solved problem.  I am using 
>> Apache NetBeans 11.1 with Apache Tomcat 10.0.0-M1. Below is my 
>> configuration -- if I remove the taglib line from my jsp file, the error
> goes away.
> 
> From the Tomcat 10.0.0-M1 release announcement:
> 
> 
> Users of Tomcat 10 onwards should be aware that, as a result of the move
> from Java EE to Jakarta EE as part of the transfer of Java EE to the Eclipse
> Foundation, the primary package for all implemented APIs has changed from
> javax.* to jakarta.*. This will almost certainly require code changes to
> enable applications to migrate from Tomcat 9 and earlier to Tomcat 10 and
> later.
> 
> 
> 
>> 
>>
>> javax
>>
>> javaee-web-api
>>
>> 8.0.1
>>
>> provided
>>
>> 
> 
> That is never going to work on Tomact 10. You can't use Java EE 8 libraries
> with a Jakarta EE 9 server.
> 
>> 
>>
>> javax.mail
>>
>> mail
>>
>> 1.4.7
>>
>> jar
>>
>> 
> 
> That needs to be replaced with Jakarta Mail (there might be an RC for that
> on Maven Central)
> 
>>
>> 
>>
>> org.springframework
>>
>> spring-web
>>
>> 5.1.10.RELEASE
>>
>> 
> 
> That won't work and, as far as I am aware, there is no Jakarta EE 9 version
> available (or even being worked on) yet.
> 
>> 
>>
>> javax.servlet
>>
>> jstl
>>
>> 1.2
>>
>> 
>>
>> 
> 
> You need the Jakarta Standard Tag Library 2.0 or later. I think that is one
> of the Jakarta projects struggling for active committers.
> 
> Tomcat 10 ships with an API and implementation for the Jakarta Standard Tag
> Library 2.0 in the examples web application. It was created by taking the
> JSTL 1.2 JARs and running them through Tomcat's Java EE 8 to Jakarta EE 9
> conversion / migration tool.
> 
>> test.jsp
> 
> 
> 
> Might sticking with Tomcat 9 be a better option for you for now?
> 
> Mark
> 
> -
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 
> 
> 
> 
> 
> -
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



RE: Tomcat 10.0.0-M1 can't get JSP taglib to work

2020-03-02 Thread ed
Thanks for the reply Mark!

Well, that stinks!  It is new development and so it would only make sense to
use the latest server; however, if it is a step backward in functionality
(because supporting libraries are not available) then I guess I'll have to
use the previous version.

-Original Message-
From: Mark Thomas  
Sent: Monday, March 2, 2020 9:34 AM
To: users@tomcat.apache.org
Subject: Re: Tomcat 10.0.0-M1 can't get JSP taglib to work

On 02/03/2020 14:16, e...@wolfecomputerservices.com wrote:
> I have tried everything in the multiple threads on this site (non of 
> them were for Tomcat 10 and non of the solved problem.  I am using 
> Apache NetBeans 11.1 with Apache Tomcat 10.0.0-M1. Below is my 
> configuration -- if I remove the taglib line from my jsp file, the error
goes away.

>From the Tomcat 10.0.0-M1 release announcement:


Users of Tomcat 10 onwards should be aware that, as a result of the move
from Java EE to Jakarta EE as part of the transfer of Java EE to the Eclipse
Foundation, the primary package for all implemented APIs has changed from
javax.* to jakarta.*. This will almost certainly require code changes to
enable applications to migrate from Tomcat 9 and earlier to Tomcat 10 and
later.



> 
> 
> javax
> 
> javaee-web-api
> 
> 8.0.1
> 
> provided
> 
> 

That is never going to work on Tomact 10. You can't use Java EE 8 libraries
with a Jakarta EE 9 server.

> 
> 
> javax.mail
> 
> mail
> 
> 1.4.7
> 
> jar
> 
> 

That needs to be replaced with Jakarta Mail (there might be an RC for that
on Maven Central)

> 
> 
> 
> org.springframework
> 
> spring-web
> 
> 5.1.10.RELEASE
> 
> 

That won't work and, as far as I am aware, there is no Jakarta EE 9 version
available (or even being worked on) yet.

> 
> 
> javax.servlet
> 
> jstl
> 
> 1.2
> 
> 
> 
> 

You need the Jakarta Standard Tag Library 2.0 or later. I think that is one
of the Jakarta projects struggling for active committers.

Tomcat 10 ships with an API and implementation for the Jakarta Standard Tag
Library 2.0 in the examples web application. It was created by taking the
JSTL 1.2 JARs and running them through Tomcat's Java EE 8 to Jakarta EE 9
conversion / migration tool.

> test.jsp



Might sticking with Tomcat 9 be a better option for you for now?

Mark

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org





-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Tomcat 10.0.0-M1 can't get JSP taglib to work

2020-03-02 Thread Mark Thomas
On 02/03/2020 14:16, e...@wolfecomputerservices.com wrote:
> I have tried everything in the multiple threads on this site (non of them
> were for Tomcat 10 and non of the solved problem.  I am using Apache
> NetBeans 11.1 with Apache Tomcat 10.0.0-M1. Below is my configuration -- if
> I remove the taglib line from my jsp file, the error goes away.

>From the Tomcat 10.0.0-M1 release announcement:


Users of Tomcat 10 onwards should be aware that, as a result of the move
from Java EE to Jakarta EE as part of the transfer of Java EE to the
Eclipse Foundation, the primary package for all implemented APIs has
changed from javax.* to jakarta.*. This will almost certainly require
code changes to enable applications to migrate from Tomcat 9 and earlier
to Tomcat 10 and later.



> 
> 
> javax
> 
> javaee-web-api
> 
> 8.0.1
> 
> provided
> 
> 

That is never going to work on Tomact 10. You can't use Java EE 8
libraries with a Jakarta EE 9 server.

> 
> 
> javax.mail
> 
> mail
> 
> 1.4.7
> 
> jar
> 
> 

That needs to be replaced with Jakarta Mail (there might be an RC for
that on Maven Central)

> 
> 
> 
> org.springframework
> 
> spring-web
> 
> 5.1.10.RELEASE
> 
> 

That won't work and, as far as I am aware, there is no Jakarta EE 9
version available (or even being worked on) yet.

> 
> 
> javax.servlet
> 
> jstl
> 
> 1.2
> 
> 
> 
> 

You need the Jakarta Standard Tag Library 2.0 or later. I think that is
one of the Jakarta projects struggling for active committers.

Tomcat 10 ships with an API and implementation for the Jakarta Standard
Tag Library 2.0 in the examples web application. It was created by
taking the JSTL 1.2 JARs and running them through Tomcat's Java EE 8 to
Jakarta EE 9 conversion / migration tool.

> test.jsp



Might sticking with Tomcat 9 be a better option for you for now?

Mark

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Tomcat 10.0.0-M1 can't get JSP taglib to work

2020-03-02 Thread ed
I have tried everything in the multiple threads on this site (non of them
were for Tomcat 10 and non of the solved problem.  I am using Apache
NetBeans 11.1 with Apache Tomcat 10.0.0-M1. Below is my configuration -- if
I remove the taglib line from my jsp file, the error goes away.

 

web.xml:

 



http://xmlns.jcp.org/xml/ns/javaee";

xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance";

xsi:schemaLocation="http://xmlns.jcp.org/xml/ns/javaee
http://xmlns.jcp.org/xml/ns/javaee/web-app_4_0.xsd";

version="4.0">









 

pom.xml dependencies:

 





javax

javaee-web-api

8.0.1

provided





com.google.code.gson

gson

2.8.5





org.json

json

20190722





javax.mail

mail

1.4.7

jar





   com.zaxxer

   HikariCP

   3.3.1

   compile





org.springframework

spring-context

5.1.10.RELEASE





org.springframework

spring-web

5.1.10.RELEASE





javax.servlet

jstl

1.2







 

test.jsp

 

<%@ taglib uri="http://java.sun.com/jsp/jstl/core"; prefix="c" %>

<%@page contentType="text/html" pageEncoding="UTF-8"%>









JSP Page







Test Results







 

error displayed:

 

org.apache.jasper.JasperException: The absolute uri:
[http://java.sun.com/jsp/jstl/core] cannot be resolved in either web.xml or
the jar files deployed with this application

 
org.apache.jasper.compiler.DefaultErrorHandler.jspError(DefaultErrorHandler.
java:55)

 
org.apache.jasper.compiler.ErrorDispatcher.dispatch(ErrorDispatcher.java:294
)

 
org.apache.jasper.compiler.ErrorDispatcher.jspError(ErrorDispatcher.java:81)

 
org.apache.jasper.compiler.TagLibraryInfoImpl.generateTldResourcePath(TagLib
raryInfoImpl.java:251)

 
org.apache.jasper.compiler.TagLibraryInfoImpl.(TagLibraryInfoImpl.java
:122)

 
org.apache.jasper.compiler.Parser.parseTaglibDirective(Parser.java:431)

 
org.apache.jasper.compiler.Parser.parseDirective(Parser.java:489)

 
org.apache.jasper.compiler.Parser.parseElements(Parser.java:1445)

org.apache.jasper.compiler.Parser.parse(Parser.java:144)

 
org.apache.jasper.compiler.ParserController.doParse(ParserController.java:24
4)

 
org.apache.jasper.compiler.ParserController.parse(ParserController.java:105)

 
org.apache.jasper.compiler.Compiler.generateJava(Compiler.java:206)

 
org.apache.jasper.compiler.Compiler.compile(Compiler.java:386)

 
org.apache.jasper.compiler.Compiler.compile(Compiler.java:362)

 
org.apache.jasper.compiler.Compiler.compile(Compiler.java:346)

 
org.apache.jasper.JspCompilationContext.compile(JspCompilationContext.java:6
05)

 
org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:4
00)

 
org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:385)

 
org.apache.jasper.servlet.JspServlet.service(JspServlet.java:329)

 
jakarta.servlet.http.HttpServlet.service(HttpServlet.java:741)

 
org.apache.jasper.runtime.JspRuntimeLibrary.include(JspRuntimeLibrary.java:9
55)

org.apache.jsp.index_jsp._jspService(index_jsp.java:128)

 
org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:71)

 
jakarta.servlet.http.HttpServlet.service(HttpServlet.java:741)

 
org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:4
77)

 
org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:385)

 
org.apache.jasper.servlet.JspServlet.service(JspServlet.java:329)

 
jakarta.servlet.http.HttpServlet.service(HttpServlet.java:741)

 
org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)

 



Re: Client cert auth on demand

2020-03-02 Thread Martynas Jusevičius
My bad - I was looking in the catalina log, not the localhost log...
Now I see the config being parsed:

01-Mar-2020 21:12:49.147 FINE [localhost-startStop-1]
org.apache.catalina.valves.rewrite.RewriteValve.startInternal Read
configuration from: /WEB-INF/rewrite.config
01-Mar-2020 21:12:49.155 FINE [localhost-startStop-1]
org.apache.catalina.valves.rewrite.RewriteValve.parse Add rule with
pattern ^(.*)(localhost\%3A5443)(.*)$ and substitution $1localhost$3
01-Mar-2020 21:12:49.155 FINE [localhost-startStop-1]
org.apache.catalina.valves.rewrite.RewriteValve.parse Add condition
localhost%3A5443 test %{QUERY_STRING} to rule with pattern
^(.*)(localhost\%3A5443)(.*)$ and substitution $1localhost$3

On Mon, Mar 2, 2020 at 11:51 AM Martynas Jusevičius
 wrote:
>
> No matter where I place the rewrite.config, cannot get the
> RewriteValve to find it.
>
> I tried:
> * /usr/local/tomcat/conf/Catalina/localhost/ROOT.xml and
> /usr/local/tomcat/webapps/ROOT/WEB-INF/rewrite.config
> * /usr/local/tomcat/conf/context.xml and
> /usr/local/tomcat/conf/localhost/rewrite.config
>
> The only log output I get is:
>
> 01-Mar-2020 18:45:50.647 FINE [localhost-startStop-1]
> org.apache.catalina.util.LifecycleBase.setStateInternal Setting state
> for [org.apache.catalina.valves.rewrite.RewriteValve[]] to
> [INITIALIZING]
> 01-Mar-2020 18:45:50.650 FINE [localhost-startStop-1]
> org.apache.catalina.util.LifecycleBase.setStateInternal Setting state
> for [org.apache.catalina.valves.rewrite.RewriteValve[]] to
> [INITIALIZED]
> 01-Mar-2020 18:45:50.651 FINE [localhost-startStop-1]
> org.apache.catalina.util.LifecycleBase.setStateInternal Setting state
> for [org.apache.catalina.valves.rewrite.RewriteValve[]] to
> [STARTING_PREP]
> 01-Mar-2020 18:45:50.652 FINE [localhost-startStop-1]
> org.apache.catalina.util.LifecycleBase.setStateInternal Setting state
> for [org.apache.catalina.valves.rewrite.RewriteValve[]] to [STARTING]
> 01-Mar-2020 18:45:50.654 FINE [localhost-startStop-1]
> org.apache.catalina.util.LifecycleBase.setStateInternal Setting state
> for [org.apache.catalina.valves.rewrite.RewriteValve[]] to [STARTED]
>
>
>
> On Sun, Mar 1, 2020 at 2:15 PM Martynas Jusevičius
>  wrote:
> >
> > I hit a snag with the query string. In some cases it contains the
> > webapp base URI in a query parameter, such as:
> >
> > 
> > /admin/acl/authorizations/?forClass=https%3A//localhost%3A5443/admin/ns%23Authorization
> >
> > So I'm trying to rewrite those as well, from
> > https%3A//localhost%3A5443/ to https%3A//localhost/ (remove the port
> > number).
> >
> > RewriteValve seems to do what I need:
> > https://tomcat.apache.org/tomcat-8.0-doc/rewrite.html
> >
> > I have mounted the following under
> > /usr/local/tomcat/conf/Catalina/localhost/ROOT.xml
> >
> > 
> > 
> > 
> > 
> >
> > and this under /usr/local/tomcat/webapps/ROOT/WEB-INF/rewrite.config
> >
> > RewriteCond %{QUERY_STRING} localhost%3A5443
> > RewriteRule ^(.*)(localhost%3A5443)(.*)$ $1localhost$2
> >
> > However I'm not seeing any output re. RewriteValve in the Tomcat log.
> > The rewrite is not happening and it doesn't look like the config is
> > even read.
> >
> > On Sat, Feb 29, 2020 at 4:21 PM Martynas Jusevičius
> >  wrote:
> > >
> > > Thanks! I actually needed proxyPort="443" to make the URL
> > > https://localhost, but your suggestion did the trick.
> > >
> > > On Sat, Feb 29, 2020 at 11:12 AM Mark Thomas  wrote:
> > > >
> > > >
> > > >
> > > > On 28/02/2020 22:26, Martynas Jusevičius wrote:
> > > > > Yes the clients connect only directly to nginx.
> > > > >
> > > > > So the proxy config within 2 pairs of containers is like this:
> > > > >
> > > > > # website service; clientAuth=false
> > > > > nginx:80 -> tomcat:8080
> > > > > nginx:443 -> tomcat:8443
> > > > >
> > > > > # API service; clientAuth=true
> > > > > nginx-api:90 -> tomcat-api:8080
> > > > > nginx-api:5443 -> tomcat-api:8443
> > > >
> > > > Try using proxyPort="5443" on the HTTPS connector in Tomcat for this
> > > > instance. That should do the trick.
> > > >
> > > > Mark
> > > >
> > > >
> > > > >
> > > > > nginx and nginx-api ports are exposed to the Docker host and that is
> > > > > where the clients access them, therefore the host name the webapp sees
> > > > > is localhost (as in my rewrite example).
> > > > >
> > > > > What I'm trying to do is to fool the webapp on tomcat-api into
> > > > > thinking it's being accessed on localhost:80/443 instead of
> > > > > localhost:90/5443.
> > > > >
> > > > > Absolute URIs matter in this case because they are used for direct
> > > > > lookups in an RDF triplestore and RDF uses absolute URIs.
> > > > >
> > > > >
> > > > > On Fri, Feb 28, 2020 at 10:59 PM Mark Thomas  wrote:
> > > > >>
> > > > >> On 28/02/2020 21:00, Martynas Jusevičius wrote:
> > > > >>> Setting up a second container with a different port was easy enough.
> > > > >>>
> > > > >>> However I got stuck on the URL mapping/rewriting. Using nginx as a
> > > > >>> proxy, I don't

Re: Client cert auth on demand

2020-03-02 Thread Martynas Jusevičius
No matter where I place the rewrite.config, cannot get the
RewriteValve to find it.

I tried:
* /usr/local/tomcat/conf/Catalina/localhost/ROOT.xml and
/usr/local/tomcat/webapps/ROOT/WEB-INF/rewrite.config
* /usr/local/tomcat/conf/context.xml and
/usr/local/tomcat/conf/localhost/rewrite.config

The only log output I get is:

01-Mar-2020 18:45:50.647 FINE [localhost-startStop-1]
org.apache.catalina.util.LifecycleBase.setStateInternal Setting state
for [org.apache.catalina.valves.rewrite.RewriteValve[]] to
[INITIALIZING]
01-Mar-2020 18:45:50.650 FINE [localhost-startStop-1]
org.apache.catalina.util.LifecycleBase.setStateInternal Setting state
for [org.apache.catalina.valves.rewrite.RewriteValve[]] to
[INITIALIZED]
01-Mar-2020 18:45:50.651 FINE [localhost-startStop-1]
org.apache.catalina.util.LifecycleBase.setStateInternal Setting state
for [org.apache.catalina.valves.rewrite.RewriteValve[]] to
[STARTING_PREP]
01-Mar-2020 18:45:50.652 FINE [localhost-startStop-1]
org.apache.catalina.util.LifecycleBase.setStateInternal Setting state
for [org.apache.catalina.valves.rewrite.RewriteValve[]] to [STARTING]
01-Mar-2020 18:45:50.654 FINE [localhost-startStop-1]
org.apache.catalina.util.LifecycleBase.setStateInternal Setting state
for [org.apache.catalina.valves.rewrite.RewriteValve[]] to [STARTED]



On Sun, Mar 1, 2020 at 2:15 PM Martynas Jusevičius
 wrote:
>
> I hit a snag with the query string. In some cases it contains the
> webapp base URI in a query parameter, such as:
>
> 
> /admin/acl/authorizations/?forClass=https%3A//localhost%3A5443/admin/ns%23Authorization
>
> So I'm trying to rewrite those as well, from
> https%3A//localhost%3A5443/ to https%3A//localhost/ (remove the port
> number).
>
> RewriteValve seems to do what I need:
> https://tomcat.apache.org/tomcat-8.0-doc/rewrite.html
>
> I have mounted the following under
> /usr/local/tomcat/conf/Catalina/localhost/ROOT.xml
>
> 
> 
> 
> 
>
> and this under /usr/local/tomcat/webapps/ROOT/WEB-INF/rewrite.config
>
> RewriteCond %{QUERY_STRING} localhost%3A5443
> RewriteRule ^(.*)(localhost%3A5443)(.*)$ $1localhost$2
>
> However I'm not seeing any output re. RewriteValve in the Tomcat log.
> The rewrite is not happening and it doesn't look like the config is
> even read.
>
> On Sat, Feb 29, 2020 at 4:21 PM Martynas Jusevičius
>  wrote:
> >
> > Thanks! I actually needed proxyPort="443" to make the URL
> > https://localhost, but your suggestion did the trick.
> >
> > On Sat, Feb 29, 2020 at 11:12 AM Mark Thomas  wrote:
> > >
> > >
> > >
> > > On 28/02/2020 22:26, Martynas Jusevičius wrote:
> > > > Yes the clients connect only directly to nginx.
> > > >
> > > > So the proxy config within 2 pairs of containers is like this:
> > > >
> > > > # website service; clientAuth=false
> > > > nginx:80 -> tomcat:8080
> > > > nginx:443 -> tomcat:8443
> > > >
> > > > # API service; clientAuth=true
> > > > nginx-api:90 -> tomcat-api:8080
> > > > nginx-api:5443 -> tomcat-api:8443
> > >
> > > Try using proxyPort="5443" on the HTTPS connector in Tomcat for this
> > > instance. That should do the trick.
> > >
> > > Mark
> > >
> > >
> > > >
> > > > nginx and nginx-api ports are exposed to the Docker host and that is
> > > > where the clients access them, therefore the host name the webapp sees
> > > > is localhost (as in my rewrite example).
> > > >
> > > > What I'm trying to do is to fool the webapp on tomcat-api into
> > > > thinking it's being accessed on localhost:80/443 instead of
> > > > localhost:90/5443.
> > > >
> > > > Absolute URIs matter in this case because they are used for direct
> > > > lookups in an RDF triplestore and RDF uses absolute URIs.
> > > >
> > > >
> > > > On Fri, Feb 28, 2020 at 10:59 PM Mark Thomas  wrote:
> > > >>
> > > >> On 28/02/2020 21:00, Martynas Jusevičius wrote:
> > > >>> Setting up a second container with a different port was easy enough.
> > > >>>
> > > >>> However I got stuck on the URL mapping/rewriting. Using nginx as a
> > > >>> proxy, I don't think it's possible to rewrite headers with the
> > > >>> upstream module:
> > > >>> https://nginx.org/en/docs/http/ngx_http_upstream_module.html
> > > >>>
> > > >>> As I understand it just forwards raw traffic, so the URL rewriting
> > > >>> would have to be done on the Tomcat's side. Basically I want to
> > > >>> rewrite:
> > > >>>
> > > >>> https://localhost:5443/ => https://localhost/
> > > >>>
> > > >>> which requires rewriting the Host request header, I think.
> > > >>>
> > > >>> I was looking at the RewriteValve, but it says:
> > > >>> "Unlike newer mod_rewrite versions, the Tomcat rewrite valve does not
> > > >>> automatically support absolute URLs (the specific redirect flag must
> > > >>> be used to be able to specify an absolute URLs, see below) or direct
> > > >>> file serving."
> > > >>>
> > > >>> Is there a way to rewrite the hostname/port in configuration?
> > > >>> Something placed in context.xml would be ideal.
> > > >>
> > > >>
> > > >> What port is n

[ANN] End of life for Apache Tomcat 7.0.x

2020-03-02 Thread Mark Thomas
The Apache Tomcat team announces that support for Apache Tomcat 7.0.x
will end on 31 March 2021.

This means that after 31 March 2021:
- releases from the 7.0.x branch are highly unlikely
- bugs affecting only the 7.0.x branch will not be addressed
- security vulnerability reports will not be checked against the 7.0.x
  branch

Three months later (i.e. after 30 June 2021)
- the 7.0.x download pages will be removed
- the latest 7.0.x release will be removed from the mirror system
- the 7.0.x branch will be made read-only
- the links to the 7.0.x documentation will be removed from
  tomcat.apache.org
- The bugzilla project for 7.0.x will be made read-only

Note that all 7.0.x releases will always be available from the archive.

It is anticipated that the final 7.0.x release will be made shortly
before 31 March 2021.

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: AW: [SECURITY] CVE-2020-1938 AJP Request Injection and potentialRemote Code Execution

2020-03-02 Thread Mark Thomas
On 02/03/2020 10:12, js84 wrote:
> Hello!
> 
> Proposed work-arounds don’t cover possible vulnerability over a reverse proxy:

Correct.

> Can an attacker abuse AJP vulnerability when access is mapped by mod_jk or 
> mod_proxy_ajp?

No.

Mark

> 
> Kind regards,
> Johann
> 
> Von: Mark Thomas
> Gesendet: Montag, 2. März 2020 10:11
> An: users@tomcat.apache.org
> Betreff: Re: [SECURITY] CVE-2020-1938 AJP Request Injection and 
> potentialRemote Code Execution
> 
> On 01/03/2020 23:34, Stefan Mayr wrote:
>> Am 24.02.2020 um 13:47 schrieb Mark Thomas:
>>> CVE-2020-1938 AJP Request Injection and potential Remote Code Execution
>>>
>>> Severity: High
>>>
>>> ...
>>> - returning arbitrary files from anywhere in the web application
>>>   including under the WEB-INF and META-INF directories or any other
>>>   location reachable via ServletContext.getResourceAsStream()
>>> - processing any file in the web application as a JSP
>>> Further, if the web application allowed file upload and stored those
>>> files within the web application (or the attacker was able to control
>>> the content of the web application by some other means) then this, along
>>> with the ability to process a file as a JSP, made remote code execution
>>> possible.
>>
>> Is this a bug which is or will be fixed or is this a fundamental design
>> flaw of AJP which cannot be fixed? So to trust or not to trust are the
>> only options?
> 
> Not really.
> 
> The ability for an AJP client to obtain arbitrary files from the web
> application has been blocked by default.
> 
> The ability for an AJP client to trigger the processing of any file from
> the web application as a JSP has been blocked by default.
> 
> The above two points are, essentially, CVE-2020-1928.
> 
> If the web application depends on knowing the true user IP address then
> Tomcat has to trust the AJP client to provide that data.
> 
> If the web application depends on the reverse proxy (the AJP client)
> performing authentication and passing the authenticated identify to
> Tomcat then Tomcat has to trust that the reverse proxy does this correctly.
> 
> And so on for all the other user information that the AJP protocol can
> pass to Tomcat.
> 
> How Tomcat decides to trust the AJP client is a decision for the system
> administrator. Options include:
> 
> - have the AJP Connector listen on a non-public IP address that only the
>   reverse proxy can access
> - use firewall rules to limit connections to the AJP port to trusted
>   hosts
> - configure a shared secret in the reverse proxy and the AJP Connector
> 
> Mark
> 
> 
> 
> 
>>
>> Thanks,
>>
>>   Stefan Mayr
>>
>> -
>> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
>> For additional commands, e-mail: users-h...@tomcat.apache.org
>>
> 
> 
> -
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 
> 
> 


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



AW: [SECURITY] CVE-2020-1938 AJP Request Injection and potentialRemote Code Execution

2020-03-02 Thread js84
Hello!

Proposed work-arounds don’t cover possible vulnerability over a reverse proxy: 
Can an attacker abuse AJP vulnerability when access is mapped by mod_jk or 
mod_proxy_ajp?

Kind regards,
Johann

Von: Mark Thomas
Gesendet: Montag, 2. März 2020 10:11
An: users@tomcat.apache.org
Betreff: Re: [SECURITY] CVE-2020-1938 AJP Request Injection and potentialRemote 
Code Execution

On 01/03/2020 23:34, Stefan Mayr wrote:
> Am 24.02.2020 um 13:47 schrieb Mark Thomas:
>> CVE-2020-1938 AJP Request Injection and potential Remote Code Execution
>>
>> Severity: High
>>
>> ...
>> - returning arbitrary files from anywhere in the web application
>>   including under the WEB-INF and META-INF directories or any other
>>   location reachable via ServletContext.getResourceAsStream()
>> - processing any file in the web application as a JSP
>> Further, if the web application allowed file upload and stored those
>> files within the web application (or the attacker was able to control
>> the content of the web application by some other means) then this, along
>> with the ability to process a file as a JSP, made remote code execution
>> possible.
> 
> Is this a bug which is or will be fixed or is this a fundamental design
> flaw of AJP which cannot be fixed? So to trust or not to trust are the
> only options?

Not really.

The ability for an AJP client to obtain arbitrary files from the web
application has been blocked by default.

The ability for an AJP client to trigger the processing of any file from
the web application as a JSP has been blocked by default.

The above two points are, essentially, CVE-2020-1928.

If the web application depends on knowing the true user IP address then
Tomcat has to trust the AJP client to provide that data.

If the web application depends on the reverse proxy (the AJP client)
performing authentication and passing the authenticated identify to
Tomcat then Tomcat has to trust that the reverse proxy does this correctly.

And so on for all the other user information that the AJP protocol can
pass to Tomcat.

How Tomcat decides to trust the AJP client is a decision for the system
administrator. Options include:

- have the AJP Connector listen on a non-public IP address that only the
  reverse proxy can access
- use firewall rules to limit connections to the AJP port to trusted
  hosts
- configure a shared secret in the reverse proxy and the AJP Connector

Mark




> 
> Thanks,
> 
>   Stefan Mayr
> 
> -
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




AW: [SECURITY] CVE-2020-1938 AJP Request Injection and potentialRemote Code Execution

2020-03-02 Thread js84
Hello!

Proposed work-arounds don’t cover possible vulnerability over a reverse proxy: 
Can an attacker abuse AJP vulnerability when access is mapped by mod_jk or 
mod_proxy_ajp?

Kind regards,
Johann

Von: Mark Thomas
Gesendet: Montag, 2. März 2020 10:11
An: users@tomcat.apache.org
Betreff: Re: [SECURITY] CVE-2020-1938 AJP Request Injection and potentialRemote 
Code Execution

On 01/03/2020 23:34, Stefan Mayr wrote:
> Am 24.02.2020 um 13:47 schrieb Mark Thomas:
>> CVE-2020-1938 AJP Request Injection and potential Remote Code Execution
>>
>> Severity: High
>>
>> ...
>> - returning arbitrary files from anywhere in the web application
>>   including under the WEB-INF and META-INF directories or any other
>>   location reachable via ServletContext.getResourceAsStream()
>> - processing any file in the web application as a JSP
>> Further, if the web application allowed file upload and stored those
>> files within the web application (or the attacker was able to control
>> the content of the web application by some other means) then this, along
>> with the ability to process a file as a JSP, made remote code execution
>> possible.
> 
> Is this a bug which is or will be fixed or is this a fundamental design
> flaw of AJP which cannot be fixed? So to trust or not to trust are the
> only options?

Not really.

The ability for an AJP client to obtain arbitrary files from the web
application has been blocked by default.

The ability for an AJP client to trigger the processing of any file from
the web application as a JSP has been blocked by default.

The above two points are, essentially, CVE-2020-1928.

If the web application depends on knowing the true user IP address then
Tomcat has to trust the AJP client to provide that data.

If the web application depends on the reverse proxy (the AJP client)
performing authentication and passing the authenticated identify to
Tomcat then Tomcat has to trust that the reverse proxy does this correctly.

And so on for all the other user information that the AJP protocol can
pass to Tomcat.

How Tomcat decides to trust the AJP client is a decision for the system
administrator. Options include:

- have the AJP Connector listen on a non-public IP address that only the
  reverse proxy can access
- use firewall rules to limit connections to the AJP port to trusted
  hosts
- configure a shared secret in the reverse proxy and the AJP Connector

Mark




> 
> Thanks,
> 
>   Stefan Mayr
> 
> -
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




Re: [SECURITY] CVE-2020-1938 AJP Request Injection and potential Remote Code Execution

2020-03-02 Thread Mark Thomas
On 01/03/2020 23:34, Stefan Mayr wrote:
> Am 24.02.2020 um 13:47 schrieb Mark Thomas:
>> CVE-2020-1938 AJP Request Injection and potential Remote Code Execution
>>
>> Severity: High
>>
>> ...
>> - returning arbitrary files from anywhere in the web application
>>   including under the WEB-INF and META-INF directories or any other
>>   location reachable via ServletContext.getResourceAsStream()
>> - processing any file in the web application as a JSP
>> Further, if the web application allowed file upload and stored those
>> files within the web application (or the attacker was able to control
>> the content of the web application by some other means) then this, along
>> with the ability to process a file as a JSP, made remote code execution
>> possible.
> 
> Is this a bug which is or will be fixed or is this a fundamental design
> flaw of AJP which cannot be fixed? So to trust or not to trust are the
> only options?

Not really.

The ability for an AJP client to obtain arbitrary files from the web
application has been blocked by default.

The ability for an AJP client to trigger the processing of any file from
the web application as a JSP has been blocked by default.

The above two points are, essentially, CVE-2020-1928.

If the web application depends on knowing the true user IP address then
Tomcat has to trust the AJP client to provide that data.

If the web application depends on the reverse proxy (the AJP client)
performing authentication and passing the authenticated identify to
Tomcat then Tomcat has to trust that the reverse proxy does this correctly.

And so on for all the other user information that the AJP protocol can
pass to Tomcat.

How Tomcat decides to trust the AJP client is a decision for the system
administrator. Options include:

- have the AJP Connector listen on a non-public IP address that only the
  reverse proxy can access
- use firewall rules to limit connections to the AJP port to trusted
  hosts
- configure a shared secret in the reverse proxy and the AJP Connector

Mark




> 
> Thanks,
> 
>   Stefan Mayr
> 
> -
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: issue faced in tomcat 8.5.51

2020-03-02 Thread tomcat/perl

On 02.03.2020 07:38, Rathore, Rajendra wrote:

Hi Calder/Team,

I set the below flag as false but still it will giving the same error.


If you really changed that attribute in the right place, and you restarted tomcat, it is 
quite unlikely that you would have the same error in the log.


But if you really do, could you please copy the latest Connector configuration here, and 
another new extract of the log showing the error ?

(Just copy/paste here please, not in an attachmemnt)



I am using Apache http server(with AJP worker) and tomcat configuration, Is am 
I missing something in configuration, please let me know?

Thanks and Regards,
Rajendra Rathore
9922701491

-Original Message-
From: calder 
Sent: Friday, February 28, 2020 7:41 PM
To: Tomcat Users List 
Subject: Re: issue faced in tomcat 8.5.51

External email from: users-return-269823-rarathore=ptc@tomcat.apache.org

On Fri, Feb 28, 2020, 07:39 Rathore, Rajendra  wrote:


Hi Team,

I am using below configuration in server.xml for tomcat



but I got below exception in start up time



< snip >





Caused by: java.lang.IllegalArgumentException:

The AJP Connector is configured with secretRequired="true" but the secret

attribute is either null or "". This combination is not valid







Please let me know what should I put to fix the issue, it will be very

helpful for me.

I am stuck because of the above issue, we are using Apache and tomcat
for serving the request.

Let me know if anything else required from my side.



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org