Wrong logic for NONE as certificateKeystoreFile?

2021-08-05 Thread Mikael Sterner
It seems like the logic implemented for NONE as certificateKeystoreFile
deviates from the documentation. Currently NONE is always interpreted as
a file path, even for PKCS11. Looks like the comparison with NONE should
be inside the parentheses for the negation? A workaround is to use ""
instead of NONE.

https://github.com/apache/tomcat/blob/main/java/org/apache/tomcat/util/net/SSLUtilBase.java#L196

Yours,
Mikael

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Minor doc bug, DSS should be DSA for certificate type?

2021-08-04 Thread Mikael Sterner
In tomcat/webapps/docs/config/http.xml, it seems like the valid values for
the type attribute of the Certificate element should include DSA instead
of DSS, to match the enum used in the code?

https://github.com/apache/tomcat/blob/main/java/org/apache/tomcat/util/net/SSLHostConfigCertificate.java#L276

Yours,
Mikael

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Cache-Control for INTEGRAL transport guarantee?

2021-07-22 Thread Mikael Sterner
On Wed, Jul 21, 2021, at 16:35, Mark Thomas wrote:
> I'm reluctant to remove the Expires header from the the 
> securePagesWithPragma branch because that branch is for older HTTP/1.0 
> proxies and I'm not confident that it isn't required for some proxies. 
> I'm not confident it is required either so my default position is to 
> effectively leave it as it is. If someone reports a problem with it with 
> an HTTP/1.0 proxy we can look at it then.

Makes sense.

> For the other branch, I am confident that Cache-Control header will be 
> honoured which means that the Expires header is unnecessary. Since the 
> Expires header is also triggering unnecessary cache validations then I 
> can see a benefit to effectively removing it for that branch.

Sounds good. I guess it's also better the fewer headers Tomcat sets, since
there doesn't seem to be a portable way to remove a single header from a
response, only to replace it.

Yours,
Mikael

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Cache-Control for INTEGRAL transport guarantee?

2021-07-21 Thread Mikael Sterner
On Tue, Jul 20, 2021, at 10:04, Mark Thomas wrote:
> Cache headers have been somewhat of a moving target with different 
> browsers behaving in different ways at different times over the years.
> 
> I wanted to review the current state of things before forming an opinion 
> on this suggestion. I found the following the most useful:
> 
> https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cache-Control
> https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Expires
> https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Pragma

Thanks for the investigation!

This surely seems a difficult area to find a one-size-fits-all solution.
My hope was that a new default for the no-authorization-constraint and
INTEGRAL-transport-guarantee case would make it unnecessary to set these
headers explicitly for static contexts. But if I anyway want to set
something exotic like "immutable" for static resources, the best I could
hope for from such a new default would be a clean slate, i.e. as few
headers set as possible.

> I'm wondering if an alternative solution would be to move the code that 
> sets "Expires: Thu, 01 Jan 1970 00:00:00 GMT" to the 
> securePagesWithPragma section. If we are sending "Cache-control: 
> private" then I don't, at the moment, see a need to force revalidation 
> of that cached content on every request. That would leave the 
> application free to set its own expires headers (or not) as it saw fit.
> 
> Anyone using an HTTP/1.0 proxy would need to be using 
> securePagesWithPragma anyway so would be unaffected by this.

That would leave the slate cleaner at least. Though I'm not sure why
Expires would still be needed for the securePagesWithPragma branch; if
it's not, I guess it could simply be removed. (Sorry for any confusion
talking about Cache-Control: no-cache in the first post. I hadn't noticed
that securePagesWithPragma was now by default false, so I looked at the
wrong code branch.)

Yours,
Mikael

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Cache-Control for INTEGRAL transport guarantee?

2021-07-19 Thread Mikael Sterner
Hi!

I can understand the motivation for adding a Cache-Control header for
CONFIDENTIAL transport guarantees, as discussed in
http://tomcat.10.x6.nabble.com/tomcat-8-0-jre8-user-data-constraint-CONFIDENTIAL-user-data-constraint-adds-Cache-Control-private-tp5077170p5077201.html

But if the transport guarantee is only INTEGRAL (and there are no
authorization constraints), wouldn't it make more sense to let the
resource be fully cached?

One use case would be a single-page app where some static resources never
change (e.g. due to content hashes in their names). These resources would
require data integrity, since it's important that the app logic and
content cannot be modified in transit. But if the resources don't require
authorization they aren't secret, so they don't require confidentiality.
And since they never change, it's wasteful for the client to check with
the server to validate its cache on every request.

What I'm proposing, if the above makes sense, would be to add an
additional criteria to the disableProxyCaching logic in AuthenticatorBase,
that goes through the constraints array and checks if there are any
authorization constraints or user data constraint with CONFIDENTIAL
transport guarantee. If not, no cache control headers should be added.

Static resources could then be configured with a transport guarantee of
INTEGRAL and still redirect to a secure connector if needed, but retain
full caching.

Yours,
Mikael

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org