Re: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

2011-09-30 Thread Mark H. Wood
Consider something like:

  $ openssl rand -base64 32
  DJaLgg+fcT8ygQVCd1uKcpLAuxGPmEWhv7j+aorobVs=

if you want help coming up with reasonably hard-to-guess secrets.

-- 
Mark H. Wood, Lead System Programmer   mw...@iupui.edu
Asking whether markets are efficient is like asking whether people are smart.


pgpiuMMjY4F6L.pgp
Description: PGP signature


Re: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

2011-09-30 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

André,

On 9/29/2011 5:59 PM, André Warnier wrote:
 Addendum : And then we're gonna make sure that the configuration
 files of Tomcat are given appropriate permissions so that only
 Tomcat and authorized users can browse said secret. End of
 addendum.

While that's a good idea in general, it doesn't help prevent this
attack unless there is a trusted insider.

Setting the shared secret means that nobody entirely outside your
environment can inject an AJP message into Tomcat. Read the bug report
if you haven't already done so... it's quite a brilliant attack.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk6F/94ACgkQ9CaO5/Lv0PCozwCcCu6BnHUq6EChu3VINrbONppg
SYEAn1mPwXnmOsi52zSsMN+XPH9lvB0/
=LVAr
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

2011-09-30 Thread André Warnier

Christopher Schultz wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

André,

On 9/29/2011 5:59 PM, André Warnier wrote:

Addendum : And then we're gonna make sure that the configuration
files of Tomcat are given appropriate permissions so that only
Tomcat and authorized users can browse said secret. End of
addendum.


While that's a good idea in general, 


That is how it was meant.
It just seemed to fit well with the general gist of this conversation.

it doesn't help prevent this

attack unless there is a trusted insider.

Setting the shared secret means that nobody entirely outside your
environment can inject an AJP message into Tomcat. Read the bug report
if you haven't already done so... it's quite a brilliant attack.


I'll do that then.
Trusted insider ? sounds intriguing.


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

2011-09-29 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Harold,

On 9/22/2011 11:51 AM, BARRON, HAROLD H CTR DISA EE wrote:
 Classification:  UNCLASSIFIED

Thank god none of this is classified.

 I might have to write a plan of action to temporarily mitigate
 this issue until the update is posted. I just want to be able to
 present it in a way that my users that my users will not have a
 problem understanding when I do.

Here's your plan:

We're gonna set a pre-shared secret on both our web servers and our
application servers and bounce everything. Then the chances of this
attack being carried-out are reduced to the key space of the secret.
So, make-up a big long string of random characters and set:

workers.properties:
worker.myWorker.secret=[super secret string]

server.xml:
Connector request.secret=[super secret string] ...


mod_jk has a 8192-character limit on each configuration line of
workers.properties. The form of the directive is:

worker.[workerName].secret=[here goes the secret]

That means that you have (8192 - 15 - strlen(workerName)) characters
for your shared secret. That's a big space to search.

This is not a terribly arduous technique to mitigate this attack.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk6E4yEACgkQ9CaO5/Lv0PDKkQCgjJoCQkxYOuodTu1/CAHYdGtD
3vkAoJ3k/mgmruwYSvVKPBBHzduEwmgI
=Su3s
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

2011-09-29 Thread André Warnier

Christopher Schultz wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Harold,

On 9/22/2011 11:51 AM, BARRON, HAROLD H CTR DISA EE wrote:

Classification:  UNCLASSIFIED


Thank god none of this is classified.


I might have to write a plan of action to temporarily mitigate
this issue until the update is posted. I just want to be able to
present it in a way that my users that my users will not have a
problem understanding when I do.


Here's your plan:

We're gonna set a pre-shared secret on both our web servers and our
application servers and bounce everything. 


Addendum :
And then we're gonna make sure that the configuration files of Tomcat are given 
appropriate permissions so that only Tomcat and authorized users can browse said secret.

End of addendum.

Then the chances of this

attack being carried-out are reduced to the key space of the secret.
So, make-up a big long string of random characters and set:

workers.properties:
worker.myWorker.secret=[super secret string]

server.xml:
Connector request.secret=[super secret string] ...


mod_jk has a 8192-character limit on each configuration line of
workers.properties. The form of the directive is:

worker.[workerName].secret=[here goes the secret]

That means that you have (8192 - 15 - strlen(workerName)) characters
for your shared secret. That's a big space to search.

This is not a terribly arduous technique to mitigate this attack.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk6E4yEACgkQ9CaO5/Lv0PDKkQCgjJoCQkxYOuodTu1/CAHYdGtD
3vkAoJ3k/mgmruwYSvVKPBBHzduEwmgI
=Su3s
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org





-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



RE: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

2011-09-22 Thread BARRON, HAROLD H CTR DISA EE
Classification:  UNCLASSIFIED 
Caveats: NONE

Thanksit's kind of hard to understand how to implement this workaround but 
I will look into it.
Appreciate the response.

-Original Message-
From: Konstantin Kolinko [mailto:knst.koli...@gmail.com] 
Sent: Wednesday, September 21, 2011 7:02 PM
To: Tomcat Users List
Subject: Re: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

2011/9/21 BARRON, HAROLD H CTR DISA EE harold.barron@disa.mil:

 Apache Tomcat AJP Protocol Security Bypass and Information Disclosure
 Vulnerability - (CVE-2011-3190):


1. Mitigation options are listed here:
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html

Both 5.5 and 6.0 have a connector implementation that is not
vulnerable to this issue

2. 5.5.34 binaries are already available for testing and have good
chances to be officially released in the following days.  6.0.34
release plans have not been discussed (with 6.0.33 being released not
so long ago).

Best regards,
Konstantin Kolinko

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Classification:  UNCLASSIFIED 
Caveats: NONE



smime.p7s
Description: S/MIME cryptographic signature


Re: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

2011-09-22 Thread Pid *
On 22 Sep 2011, at 14:21, BARRON, HAROLD H CTR DISA EE
harold.barron@disa.mil wrote:

 Classification:  UNCLASSIFIED
 Caveats: NONE

 Thanksit's kind of hard to understand how to implement this workaround 
 but I will look into it.

Do you use HTTPD with mod_jk or mod_proxy_ajp in front if Tomcat?

What is hard to understand, maybe we can help... ?


p


 Appreciate the response.

 -Original Message-
 From: Konstantin Kolinko [mailto:knst.koli...@gmail.com]
 Sent: Wednesday, September 21, 2011 7:02 PM
 To: Tomcat Users List
 Subject: Re: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

 2011/9/21 BARRON, HAROLD H CTR DISA EE harold.barron@disa.mil:

 Apache Tomcat AJP Protocol Security Bypass and Information Disclosure
 Vulnerability - (CVE-2011-3190):


 1. Mitigation options are listed here:
 http://tomcat.apache.org/security-5.html
 http://tomcat.apache.org/security-6.html

 Both 5.5 and 6.0 have a connector implementation that is not
 vulnerable to this issue

 2. 5.5.34 binaries are already available for testing and have good
 chances to be officially released in the following days.  6.0.34
 release plans have not been discussed (with 6.0.33 being released not
 so long ago).

 Best regards,
 Konstantin Kolinko

 -
 To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
 For additional commands, e-mail: users-h...@tomcat.apache.org

 Classification:  UNCLASSIFIED
 Caveats: NONE


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



RE: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

2011-09-22 Thread BARRON, HAROLD H CTR DISA EE
Classification:  UNCLASSIFIED 
Caveats: NONE

I might have to write a plan of action to temporarily mitigate this issue until 
the update is posted. I just want to be able to present it in a way that my 
users that my users will not have a problem understanding when I do.

-Original Message-
From: Pid * [mailto:p...@pidster.com] 
Sent: Thursday, September 22, 2011 11:47 AM
To: Tomcat Users List
Subject: Re: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

On 22 Sep 2011, at 14:21, BARRON, HAROLD H CTR DISA EE
harold.barron@disa.mil wrote:

 Classification:  UNCLASSIFIED
 Caveats: NONE

 Thanksit's kind of hard to understand how to implement this workaround 
 but I will look into it.

Do you use HTTPD with mod_jk or mod_proxy_ajp in front if Tomcat?

What is hard to understand, maybe we can help... ?


p


 Appreciate the response.

 -Original Message-
 From: Konstantin Kolinko [mailto:knst.koli...@gmail.com]
 Sent: Wednesday, September 21, 2011 7:02 PM
 To: Tomcat Users List
 Subject: Re: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

 2011/9/21 BARRON, HAROLD H CTR DISA EE harold.barron@disa.mil:

 Apache Tomcat AJP Protocol Security Bypass and Information Disclosure
 Vulnerability - (CVE-2011-3190):


 1. Mitigation options are listed here:
 http://tomcat.apache.org/security-5.html
 http://tomcat.apache.org/security-6.html

 Both 5.5 and 6.0 have a connector implementation that is not
 vulnerable to this issue

 2. 5.5.34 binaries are already available for testing and have good
 chances to be officially released in the following days.  6.0.34
 release plans have not been discussed (with 6.0.33 being released not
 so long ago).

 Best regards,
 Konstantin Kolinko

 -
 To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
 For additional commands, e-mail: users-h...@tomcat.apache.org

 Classification:  UNCLASSIFIED
 Caveats: NONE


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Classification:  UNCLASSIFIED 
Caveats: NONE



Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

2011-09-21 Thread BARRON, HAROLD H CTR DISA EE
Classification:  UNCLASSIFIED 
Caveats: NONE


Team,


Since Tomcat 5.5.34 has not been made available for the current
Apache Tomcat Injection Vulnerability=20
(IAVA 2011-B-0114), is there a workaround for this problem until the
patch is out. This software is being used on a Windows 2003 Server and
the current problem is stated below:

Executive Summary:=20
Apache Software Foundation has addressed a vulnerability affecting
various versions of Apache Tomcat.  Apache Tomcat is an open source
software implementation of the Java Servlet and JavaServer Pages
technologies.  To exploit this vulnerability, a remote attacker would
create and send a malicious request to an affected system.  If
successfully exploited, this vulnerability would allow a remote attacker
to bypass security restrictions and obtain access to sensitive
information.

Technical Overview:
Apache Tomcat AJP Protocol Security Bypass and Information Disclosure
Vulnerability - (CVE-2011-3190):
Apache Tomcat supports the AJP protocol which is used with reverse
proxies to pass requests and associated data about the request from the
reverse proxy to Tomcat. The AJP protocol is designed so that when a
request includes a request body, an unsolicited AJP message is sent to
Tomcat that includes the first part (or possibly all) of the request
body. In certain circumstances, Tomcat did not process this message as a
request body but as a new request. This permitted an attacker to have
full control over the AJP message permitting authentication bypass and
information disclosure.=20

Again, is there a workaround or a temporary mitigation process
that anyone knows of that can be implemented until that patch is made
available for download. Thanks


Harold Barron

Classification:  UNCLASSIFIED=20
Caveats: NONE

Classification:  UNCLASSIFIED 
Caveats: NONE


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Apache Tomcat 5.5.34 Question (UNCLASSIFIED)

2011-09-21 Thread Konstantin Kolinko
2011/9/21 BARRON, HAROLD H CTR DISA EE harold.barron@disa.mil:

 Apache Tomcat AJP Protocol Security Bypass and Information Disclosure
 Vulnerability - (CVE-2011-3190):


1. Mitigation options are listed here:
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html

Both 5.5 and 6.0 have a connector implementation that is not
vulnerable to this issue

2. 5.5.34 binaries are already available for testing and have good
chances to be officially released in the following days.  6.0.34
release plans have not been discussed (with 6.0.33 being released not
so long ago).

Best regards,
Konstantin Kolinko

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org