Re: avoiding ssl vulnerabilities in tomcat

2009-09-10 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Sunil,

On 9/7/2009 10:18 AM, sunil chandran wrote:
 Hello all,
 As per the suggestion from tomcat forum users,I went ahead and installed 
 tomcat4.1.40
 Then i copied the original webapps file from the back up tomcat (old version).
 I tried to start the server. It shows this error

 Sep 7, 2009 10:13:11 PM org.apache.coyote.http11.Http11BaseProtocol
 initINFO: Initializing Coyote HTTP/1.1 on http-8080Sep 7, 2009
 10:13:12 PM org.apache.coyote.http11.Http11BaseProtocol initINFO:
 Initializing Coyote HTTP/1.1 on http-8443Starting service
 Tomcat-StandaloneApache Tomcat/4.1.40Catalina.start:
 LifecycleException:  Context startup failed due to previous
 errorsStopping service Tomcat-StandaloneCatalina.stop:
 LifecycleException:  Coyote connector has not been
 startedLifecycleException:  Coyote connector has not been started

Care to post the error messages from the other log file(s)?

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkqpM4kACgkQ9CaO5/Lv0PA4zQCfWSzGqfgBKUkMamg597bYZMoq
GxEAnibTiLlMo0SPhWm3YS6Mpp/EHsAo
=Z5Iv
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: avoiding ssl vulnerabilities in tomcat

2009-09-08 Thread sunil chandran

Hello all,
As per the suggestion from tomcat forum users,I went ahead and installed 
tomcat4.1.40
Then i copied the original webapps file from the back up tomcat (old version).
I tried to start the server. It shows this error
Sep 7, 2009 10:13:11 PM org.apache.coyote.http11.Http11BaseProtocol initINFO: 
Initializing Coyote HTTP/1.1 on http-8080Sep 7, 2009 10:13:12 PM 
org.apache.coyote.http11.Http11BaseProtocol initINFO: Initializing Coyote 
HTTP/1.1 on http-8443Starting service Tomcat-StandaloneApache 
Tomcat/4.1.40Catalina.start: LifecycleException:  Context startup failed due to 
previous errorsStopping service Tomcat-StandaloneCatalina.stop: 
LifecycleException:  Coyote connector has not been startedLifecycleException:  
Coyote connector has not been started
Please help me 
regardsSunil C



--- On Fri, 14/8/09, Christopher Schultz ch...@christopherschultz.net wrote:

From: Christopher Schultz ch...@christopherschultz.net
Subject: Re: avoiding ssl vulnerabilities in tomcat
To: Tomcat Users List users@tomcat.apache.org
Date: Friday, 14 August, 2009, 7:55 PM

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Sunil,

On 8/13/2009 1:11 AM, sunil chandran wrote:
 Now installing tomcat 4.1.40 what all changes will be required in my sevice..
 
 no change in application?

You are very unlikely to require any webapp changes.

 maybe installation and configuration changes will be needed?

You are very unlikely to require any configuration changes. That's what
moving from patch level (4.1.x to 4.1.y) means: very little should be
required of you.

That being said, it is up to you to read the change log to find out of
any breaking changes have been introduced. This often happens when a
security bug is fixed which requires, say, URLs to be interpreted
differently. If your webapp relies on that old behavior, you'll need to
make arrangements for that (often using a configuration parameter).

The ChangeLog for Tomcat 4.1 can be found here:

http://archive.apache.org/dist/tomcat/tomcat-4/v4.1.40/RELEASE-NOTES-4.1.txt

It's not in the most easily-read format (changes are described by
component, then by version, rather than the other way around, which is
how I would have done it), but you still have to read it: look for every
change between 4.1.24 (that's your current version, right?) and 4.1.40.
You may have to read relevant bug reports, too.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkqFc9oACgkQ9CaO5/Lv0PAYhQCeJkuKdCkwd/UcQHxUh7/Zii8l
KnIAoIClIURe/eRpAavc/HO2KtnkWhPc
=KB5m
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




      See the Web's breaking stories, chosen by people like you. Check out 
Yahoo! Buzz. http://in.buzz.yahoo.com/


  Love Cricket? Check out live scores, photos, video highlights and more. 
Click here http://cricket.yahoo.com

Re: avoiding ssl vulnerabilities in tomcat

2009-09-08 Thread Mark Thomas
sunil chandran wrote:
 Hello all,
 As per the suggestion from tomcat forum users,I went ahead and installed 
 tomcat4.1.40
 Then i copied the original webapps file from the back up tomcat (old version).
 I tried to start the server. It shows this error
 Sep 7, 2009 10:13:11 PM org.apache.coyote.http11.Http11BaseProtocol initINFO: 
 Initializing Coyote HTTP/1.1 on http-8080Sep 7, 2009 10:13:12 PM 
 org.apache.coyote.http11.Http11BaseProtocol initINFO: Initializing Coyote 
 HTTP/1.1 on http-8443Starting service Tomcat-StandaloneApache 
 Tomcat/4.1.40Catalina.start: LifecycleException:  Context startup failed due 
 to previous errorsStopping service Tomcat-StandaloneCatalina.stop: 
 LifecycleException:  Coyote connector has not been startedLifecycleException: 
  Coyote connector has not been started
 Please help me 

Look in your log files.

Mark



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: avoiding ssl vulnerabilities in tomcat

2009-09-07 Thread sunil chandran
Hello all,
As per the suggestion from tomcat forum users,I went ahead and installed 
tomcat4.1.40
Then i copied the original webapps file from the back up tomcat (old version).
I tried to start the server. It shows this error
Sep 7, 2009 10:13:11 PM org.apache.coyote.http11.Http11BaseProtocol initINFO: 
Initializing Coyote HTTP/1.1 on http-8080Sep 7, 2009 10:13:12 PM 
org.apache.coyote.http11.Http11BaseProtocol initINFO: Initializing Coyote 
HTTP/1.1 on http-8443Starting service Tomcat-StandaloneApache 
Tomcat/4.1.40Catalina.start: LifecycleException:  Context startup failed due to 
previous errorsStopping service Tomcat-StandaloneCatalina.stop: 
LifecycleException:  Coyote connector has not been startedLifecycleException:  
Coyote connector has not been started
Please help me 
regardsSunil C



--- On Fri, 14/8/09, Christopher Schultz ch...@christopherschultz.net wrote:

From: Christopher Schultz ch...@christopherschultz.net
Subject: Re: avoiding ssl vulnerabilities in tomcat
To: Tomcat Users List users@tomcat.apache.org
Date: Friday, 14 August, 2009, 7:55 PM

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Sunil,

On 8/13/2009 1:11 AM, sunil chandran wrote:
 Now installing tomcat 4.1.40 what all changes will be required in my sevice..
 
 no change in application?

You are very unlikely to require any webapp changes.

 maybe installation and configuration changes will be needed?

You are very unlikely to require any configuration changes. That's what
moving from patch level (4.1.x to 4.1.y) means: very little should be
required of you.

That being said, it is up to you to read the change log to find out of
any breaking changes have been introduced. This often happens when a
security bug is fixed which requires, say, URLs to be interpreted
differently. If your webapp relies on that old behavior, you'll need to
make arrangements for that (often using a configuration parameter).

The ChangeLog for Tomcat 4.1 can be found here:

http://archive.apache.org/dist/tomcat/tomcat-4/v4.1.40/RELEASE-NOTES-4.1.txt

It's not in the most easily-read format (changes are described by
component, then by version, rather than the other way around, which is
how I would have done it), but you still have to read it: look for every
change between 4.1.24 (that's your current version, right?) and 4.1.40.
You may have to read relevant bug reports, too.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkqFc9oACgkQ9CaO5/Lv0PAYhQCeJkuKdCkwd/UcQHxUh7/Zii8l
KnIAoIClIURe/eRpAavc/HO2KtnkWhPc
=KB5m
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




  See the Web#39;s breaking stories, chosen by people like you. Check out 
Yahoo! Buzz. http://in.buzz.yahoo.com/

Re: avoiding ssl vulnerabilities in tomcat

2009-08-14 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Sunil,

On 8/13/2009 1:11 AM, sunil chandran wrote:
 Now installing tomcat 4.1.40 what all changes will be required in my sevice..
 
 no change in application?

You are very unlikely to require any webapp changes.

 maybe installation and configuration changes will be needed?

You are very unlikely to require any configuration changes. That's what
moving from patch level (4.1.x to 4.1.y) means: very little should be
required of you.

That being said, it is up to you to read the change log to find out of
any breaking changes have been introduced. This often happens when a
security bug is fixed which requires, say, URLs to be interpreted
differently. If your webapp relies on that old behavior, you'll need to
make arrangements for that (often using a configuration parameter).

The ChangeLog for Tomcat 4.1 can be found here:

http://archive.apache.org/dist/tomcat/tomcat-4/v4.1.40/RELEASE-NOTES-4.1.txt

It's not in the most easily-read format (changes are described by
component, then by version, rather than the other way around, which is
how I would have done it), but you still have to read it: look for every
change between 4.1.24 (that's your current version, right?) and 4.1.40.
You may have to read relevant bug reports, too.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkqFc9oACgkQ9CaO5/Lv0PAYhQCeJkuKdCkwd/UcQHxUh7/Zii8l
KnIAoIClIURe/eRpAavc/HO2KtnkWhPc
=KB5m
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: avoiding ssl vulnerabilities in tomcat

2009-08-13 Thread Pid

On 13/08/2009 06:17, sunil chandran wrote:

Hello all,
As per Christopher response.
1. Upgrade to the latest version of 4.1.x, which is 4.1.40. This will
provide the least headache because you will be staying on your
current Tomcat version, just improving your patch level.
Plan to upgrade to a newer release of Tomcat in the future.
Can you please tell me what you mean by improving patch level.
How should i install tomcat 4.1.40 on tomcat 4.1.24? is it sperate installation 
or patch? Please help me


1. Install a new Tomcat version 4.1.40.
2. Configure as needed.
3. Consider investing in some Tomcat training/books/tutorials.

p



--- On Wed, 12/8/09, Christopher Schultzch...@christopherschultz.net  wrote:

From: Christopher Schultzch...@christopherschultz.net
Subject: Re: avoiding ssl vulnerabilities in tomcat
To: Tomcat Users Listusers@tomcat.apache.org
Date: Wednesday, 12 August, 2009, 8:15 PM

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Sunil,

On 8/12/2009 3:12 AM, sunil chandran wrote:

The issue is SSL vulnerability. from the responses, i understood that
i need to upgrade to tomcat latest version. As per the team, it is
recommended to go for Tomcat 5 in our environment.


With all due respect to your team, I think they are making a mistake.
Either of these are better choices in my opinion:

1. Upgrade to the latest version of 4.1.x, which is 4.1.40. This will
provide the least headache because you will be staying on your
current Tomcat version, just improving your patch level.
Plan to upgrade to a newer release of Tomcat in the future.

2. Upgrade directly to Tomcat 6 without making a stop at Tomcat 5.5.
If you are going to upgrade major versions, there is absolutely
no reason for you to go to Tomcat 5.5, which will eventually have
support dropped just like Tomcat 4.1 did.


my quesiton is: Is this vulernability solved in tomcat 5 version?


Sheesh. Did you read the CVE description?
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-1858

It clearly says that Tomcat 5.5 is vulnerable through 5.5.17 (which is
inaccurate: the fix for this is documented to be in 5.5.17). Make sure
you are using a version later than that if you must use 5.5.

Now, before you ask about what version of Tomcat 6 you need in order to
avoid this vulnerability, let me help you:

1. Go to Tomcat's web site (http://tomcat.apache.org/)
2. Follow the link that says Security
3. Pick your major Tomcat version
4. Read the fixes. Each one mentions the CVE identifier, a description
of the problem, the versions of Tomcat affected, and the version in
which a fix appears.

All this information is easy to find on the Tomcat web site. Please read
the documentation before continuing to ask questions such as these.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkqC1ZUACgkQ9CaO5/Lv0PCU0ACfRTpiCEBpHAPCHyU0zB9nEX7s
ZSEAoJb6rG+4aQCzX2iyP9B3VqLODGFX
=z6Bp
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




   Looking for local information? Find it on Yahoo! Local 
http://in.local.yahoo.com/



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: avoiding ssl vulnerabilities in tomcat

2009-08-12 Thread sunil chandran
Hello Sir,
I wish to confirm one more thing.
The issue is SSL vulnerability. from the responses, i understood that i need to 
upgrade to tomcat latest version. As per the team, it is recommended to go for 
Tomcat 5 in our environment.
my quesiton is:
Is this vulernability solved in tomcat 5 version?Do i need to perform some 
additional stuff to avoid this vulnerability?Any modification to be done in 
server.xml file to avoid the SSL vulnerability

regardsSunil C
--- On Tue, 11/8/09, Mark Thomas ma...@apache.org wrote:

From: Mark Thomas ma...@apache.org
Subject: Re: avoiding ssl vulnerabilities in tomcat
To: Tomcat Users List users@tomcat.apache.org
Date: Tuesday, 11 August, 2009, 4:55 PM

sunil chandran wrote:
 Hello all,
  
 OK i will upgrade.
 But what all changes required to update to tomcat 5.
 what all changes reuired to upgrade to tomcat 4.1.40

You may as well do the job properly and upgrade to 6.0.20.

For you app? No changes should be required.

For your Tomcat configuration? Start with the clean configuration
provided with 6.0.20 and add any modifications you need. Be aware that
the config has changed in particular:
- the Logger element is no longer used
- Resource configuration has changed

See the docs for the details.

Mark



  
  
 
 --- On Mon, 10/8/09, Caldarale, Charles R chuck.caldar...@unisys.com wrote:
 
 
 From: Caldarale, Charles R chuck.caldar...@unisys.com
 Subject: RE: avoiding ssl vulnerabilities in tomcat
 To: Tomcat Users List users@tomcat.apache.org
 Date: Monday, 10 August, 2009, 7:10 PM
 
 
 From: sunil chandran [mailto:sunilonweb2...@yahoo.co.in]
 Subject: Re: avoiding ssl vulnerabilities in tomcat

 Is there any patch provided so that i can still use the same version
 4.1.24 itself.
 
 No, you *must* upgrade.  Your reluctance to do so borders on the ridiculous.
 
 - Chuck
 
 
 THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY 
 MATERIAL and is thus for use only by the intended recipient. If you received 
 this in error, please contact the sender and delete the e-mail and its 
 attachments from all computers.
 
 
 
 Send free SMS to your Friends on Mobile from your Yahoo! Messenger. Download 
 Now! http://messenger.yahoo.com/download.php




-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




  Yahoo! recommends that you upgrade to the new and safer Internet Explorer 
8. http://downloads.yahoo.com/in/internetexplorer/

Re: avoiding ssl vulnerabilities in tomcat

2009-08-12 Thread Mark Thomas
sunil chandran wrote:
 Hello Sir,
 I wish to confirm one more thing.
 The issue is SSL vulnerability. from the responses, i understood that i need 
 to upgrade to tomcat latest version. As per the team, it is recommended to go 
 for Tomcat 5 in our environment.
 my quesiton is:
 Is this vulernability solved in tomcat 5 version?
http://tomcat.apache.org/security-5.html

 Do i need to perform some additional stuff to avoid this vulnerability?
No.

Mark

 
 regardsSunil C
 --- On Tue, 11/8/09, Mark Thomas ma...@apache.org wrote:
 
 From: Mark Thomas ma...@apache.org
 Subject: Re: avoiding ssl vulnerabilities in tomcat
 To: Tomcat Users List users@tomcat.apache.org
 Date: Tuesday, 11 August, 2009, 4:55 PM
 
 sunil chandran wrote:
 Hello all,
   
 OK i will upgrade.
 But what all changes required to update to tomcat 5.
 what all changes reuired to upgrade to tomcat 4.1.40
 
 You may as well do the job properly and upgrade to 6.0.20.
 
 For you app? No changes should be required.
 
 For your Tomcat configuration? Start with the clean configuration
 provided with 6.0.20 and add any modifications you need. Be aware that
 the config has changed in particular:
 - the Logger element is no longer used
 - Resource configuration has changed
 
 See the docs for the details.
 
 Mark
 
 
 
   
   

 --- On Mon, 10/8/09, Caldarale, Charles R chuck.caldar...@unisys.com wrote:


 From: Caldarale, Charles R chuck.caldar...@unisys.com
 Subject: RE: avoiding ssl vulnerabilities in tomcat
 To: Tomcat Users List users@tomcat.apache.org
 Date: Monday, 10 August, 2009, 7:10 PM


 From: sunil chandran [mailto:sunilonweb2...@yahoo.co.in]
 Subject: Re: avoiding ssl vulnerabilities in tomcat

 Is there any patch provided so that i can still use the same version
 4.1.24 itself.
 No, you *must* upgrade.  Your reluctance to do so borders on the ridiculous.

 - Chuck


 THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY 
 MATERIAL and is thus for use only by the intended recipient. If you received 
 this in error, please contact the sender and delete the e-mail and its 
 attachments from all computers.



 Send free SMS to your Friends on Mobile from your Yahoo! Messenger. Download 
 Now! http://messenger.yahoo.com/download.php
 
 
 
 
 -
 To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
 For additional commands, e-mail: users-h...@tomcat.apache.org
 
 
 
 
   Yahoo! recommends that you upgrade to the new and safer Internet 
 Explorer 8. http://downloads.yahoo.com/in/internetexplorer/



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



RE: avoiding ssl vulnerabilities in tomcat

2009-08-12 Thread Caldarale, Charles R
 From: sunil chandran [mailto:sunilonweb2...@yahoo.co.in]
 Subject: Re: avoiding ssl vulnerabilities in tomcat
 
 As per the team, it is recommended to go for Tomcat 5
 in our environment.

Why would you waste your time with Tomcat 5?  If you're going to upgrade from 
4, move to the version that's being actively maintained - Tomcat 6.0.x.

 - Chuck


THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY 
MATERIAL and is thus for use only by the intended recipient. If you received 
this in error, please contact the sender and delete the e-mail and its 
attachments from all computers.


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: avoiding ssl vulnerabilities in tomcat

2009-08-12 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Sunil,

On 8/12/2009 3:12 AM, sunil chandran wrote:
 The issue is SSL vulnerability. from the responses, i understood that
 i need to upgrade to tomcat latest version. As per the team, it is
 recommended to go for Tomcat 5 in our environment.

With all due respect to your team, I think they are making a mistake.
Either of these are better choices in my opinion:

1. Upgrade to the latest version of 4.1.x, which is 4.1.40. This will
   provide the least headache because you will be staying on your
   current Tomcat version, just improving your patch level.
   Plan to upgrade to a newer release of Tomcat in the future.

2. Upgrade directly to Tomcat 6 without making a stop at Tomcat 5.5.
   If you are going to upgrade major versions, there is absolutely
   no reason for you to go to Tomcat 5.5, which will eventually have
   support dropped just like Tomcat 4.1 did.

 my quesiton is: Is this vulernability solved in tomcat 5 version?

Sheesh. Did you read the CVE description?
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-1858

It clearly says that Tomcat 5.5 is vulnerable through 5.5.17 (which is
inaccurate: the fix for this is documented to be in 5.5.17). Make sure
you are using a version later than that if you must use 5.5.

Now, before you ask about what version of Tomcat 6 you need in order to
avoid this vulnerability, let me help you:

1. Go to Tomcat's web site (http://tomcat.apache.org/)
2. Follow the link that says Security
3. Pick your major Tomcat version
4. Read the fixes. Each one mentions the CVE identifier, a description
   of the problem, the versions of Tomcat affected, and the version in
   which a fix appears.

All this information is easy to find on the Tomcat web site. Please read
the documentation before continuing to ask questions such as these.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkqC1ZUACgkQ9CaO5/Lv0PCU0ACfRTpiCEBpHAPCHyU0zB9nEX7s
ZSEAoJb6rG+4aQCzX2iyP9B3VqLODGFX
=z6Bp
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



RE: avoiding ssl vulnerabilities in tomcat

2009-08-12 Thread Jeffrey Janner

***  NOTICE  *
This message is intended for the use of the individual or entity to which
it is addressed and may contain information that is privileged,
confidential, and exempt from disclosure under applicable law.  If the
reader of this message is not the intended recipient or the employee or
agent responsible for delivering this message to the intended recipient,
you are hereby notified that any dissemination, distribution, or copying
of this communication is strictly prohibited.  If you have received this
communication in error, please notify us immediately by reply or by
telephone (call us collect at 512-343-9100) and immediately delete this
message and all its attachments.
---BeginMessage---
Just to clarify some things:  This CVE only applies to the default SSL 
connector functionality.  It doesn't apply to the APR/OpenSSL connector. 
Correct?
Jeff

-Original Message-
From: Christopher Schultz [mailto:ch...@christopherschultz.net] 
Sent: Wednesday, August 12, 2009 9:46 AM
To: Tomcat Users List
Subject: Re: avoiding ssl vulnerabilities in tomcat

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Sunil,

On 8/12/2009 3:12 AM, sunil chandran wrote:
 The issue is SSL vulnerability. from the responses, i understood that
 i need to upgrade to tomcat latest version. As per the team, it is
 recommended to go for Tomcat 5 in our environment.

With all due respect to your team, I think they are making a mistake.
Either of these are better choices in my opinion:

1. Upgrade to the latest version of 4.1.x, which is 4.1.40. This will
   provide the least headache because you will be staying on your
   current Tomcat version, just improving your patch level.
   Plan to upgrade to a newer release of Tomcat in the future.

2. Upgrade directly to Tomcat 6 without making a stop at Tomcat 5.5.
   If you are going to upgrade major versions, there is absolutely
   no reason for you to go to Tomcat 5.5, which will eventually have
   support dropped just like Tomcat 4.1 did.

 my quesiton is: Is this vulernability solved in tomcat 5 version?

Sheesh. Did you read the CVE description?
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-1858

It clearly says that Tomcat 5.5 is vulnerable through 5.5.17 (which is
inaccurate: the fix for this is documented to be in 5.5.17). Make sure
you are using a version later than that if you must use 5.5.

Now, before you ask about what version of Tomcat 6 you need in order to
avoid this vulnerability, let me help you:

1. Go to Tomcat's web site (http://tomcat.apache.org/)
2. Follow the link that says Security
3. Pick your major Tomcat version
4. Read the fixes. Each one mentions the CVE identifier, a description
   of the problem, the versions of Tomcat affected, and the version in
   which a fix appears.

All this information is easy to find on the Tomcat web site. Please read
the documentation before continuing to ask questions such as these.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkqC1ZUACgkQ9CaO5/Lv0PCU0ACfRTpiCEBpHAPCHyU0zB9nEX7s
ZSEAoJb6rG+4aQCzX2iyP9B3VqLODGFX
=z6Bp
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


---End Message---

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Re: avoiding ssl vulnerabilities in tomcat

2009-08-12 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Jeff,

(Strange... to me, your message looked like an attachment to the
security notice that would typically be put at the end of a message.
When I tried to reply to that, all the characters got all wonky. At
least coy-paste still works :)

On 8/12/2009 10:51 AM, Jeffrey Janner wrote:
 Just to clarify some things:  This CVE only applies to the default
 SSL connector functionality.  It doesn't apply to the APR/OpenSSL
 connector. Correct?

I would guess not, since APR uses openssl which has its own default set
of ciphers. On the other hand, Tomcat could override the default set of
ciphers when configuring APR at runtime.

I can't seem to find this bug listed in bugzilla for any version of
Tomcat, so I can't see which commit fixed it (and whether it included
connectors other than Coyote). I also looked at the release notes, but
they don't include a changelog. The changelog itself for Tomcat 5.5 does
not contain the text 1858. The only thing I can find in the changelog
is this note under 5.5.17 which is listed as a fix without a bug number:


Make the default cipher suites available for SSL the same as the set of
cipher suites enabled by default rather than the set of all cipher
suites. This prevents ciphers suites that do not provide confidentiality
protection and/or server authentication being used by default. (markt)


Tomcat 6.0 does not appear to suffer from this vulnerability, and there
does not appear to be a changelog for Tomcat 4 (at least not easily
accessible from the web site).

Fortunately, GI/M/F:

http://archive.apache.org/dist/tomcat/tomcat-4/v4.1.40/RELEASE-NOTES-4.1.txt

...though I can't find anything in there :(

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkqC3BIACgkQ9CaO5/Lv0PDHsACgrKo9iE3r4dX/8nbbMFH1szRX
AvQAni40g61cQnBe4oEmgd51SnICMZ3c
=9m0c
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



RE: avoiding ssl vulnerabilities in tomcat

2009-08-12 Thread Martin Gainty

Jeff-
the first patch (for WEB-INF) was supposed to be fixed for 6.0.20
http://svn.apache.org/viewvc?view=revrevision=734734

after re-implementing your webapps to TC 6.0.20
please let us know if you have a corner case which is able to bypass this patch

as this is an important patch feel free to ping me offline 
thanks,
Martin Gainty 
__ 
Verzicht und Vertraulichkeitanmerkung/Note de déni et de confidentialité
 
Diese Nachricht ist vertraulich. Sollten Sie nicht der vorgesehene Empfaenger 
sein, so bitten wir hoeflich um eine Mitteilung. Jede unbefugte Weiterleitung 
oder Fertigung einer Kopie ist unzulaessig. Diese Nachricht dient lediglich dem 
Austausch von Informationen und entfaltet keine rechtliche Bindungswirkung. 
Aufgrund der leichten Manipulierbarkeit von E-Mails koennen wir keine Haftung 
fuer den Inhalt uebernehmen.
Ce message est confidentiel et peut être privilégié. Si vous n'êtes pas le 
destinataire prévu, nous te demandons avec bonté que pour satisfaire informez 
l'expéditeur. N'importe quelle diffusion non autorisée ou la copie de ceci est 
interdite. Ce message sert à l'information seulement et n'aura pas n'importe 
quel effet légalement obligatoire. Étant donné que les email peuvent facilement 
être sujets à la manipulation, nous ne pouvons accepter aucune responsabilité 
pour le contenu fourni.




Subject: RE: avoiding ssl vulnerabilities in tomcat
Date: Wed, 12 Aug 2009 09:51:30 -0500
From: jeffrey.jan...@polydyne.com
To: users@tomcat.apache.org





 




***  NOTICE  *

This message is intended for the use of the individual or entity to which 

it is addressed and may contain information that is privileged, 

confidential, and exempt from disclosure under applicable law.  If the 

reader of this message is not the intended recipient or the employee or 

agent responsible for delivering this message to the intended recipient, 

you are hereby notified that any dissemination, distribution, or copying 

of this communication is strictly prohibited.  If you have received this 

communication in error, please notify us immediately by reply or by 

telephone (call us collect at 512-343-9100) and immediately delete this 

message and all its attachments.



--Forwarded Message Attachment--
Subject: RE: avoiding ssl vulnerabilities in tomcat
Date: Wed, 12 Aug 2009 09:51:30 -0500
From: jeffrey.jan...@polydyne.com
To: users@tomcat.apache.org

Just to clarify some things:  This CVE only applies to the default SSL 
connector functionality.  It doesn't apply to the APR/OpenSSL connector. 
Correct?
Jeff
 
-Original Message-
From: Christopher Schultz [mailto:ch...@christopherschultz.net] 
Sent: Wednesday, August 12, 2009 9:46 AM
To: Tomcat Users List
Subject: Re: avoiding ssl vulnerabilities in tomcat
 
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Sunil,
 
On 8/12/2009 3:12 AM, sunil chandran wrote:
 The issue is SSL vulnerability. from the responses, i understood that
 i need to upgrade to tomcat latest version. As per the team, it is
 recommended to go for Tomcat 5 in our environment.
 
With all due respect to your team, I think they are making a mistake.
Either of these are better choices in my opinion:
 
1. Upgrade to the latest version of 4.1.x, which is 4.1.40. This will
   provide the least headache because you will be staying on your
   current Tomcat version, just improving your patch level.
   Plan to upgrade to a newer release of Tomcat in the future.
 
2. Upgrade directly to Tomcat 6 without making a stop at Tomcat 5.5.
   If you are going to upgrade major versions, there is absolutely
   no reason for you to go to Tomcat 5.5, which will eventually have
   support dropped just like Tomcat 4.1 did.
 
 my quesiton is: Is this vulernability solved in tomcat 5 version?
 
Sheesh. Did you read the CVE description?
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-1858
 
It clearly says that Tomcat 5.5 is vulnerable through 5.5.17 (which is
inaccurate: the fix for this is documented to be in 5.5.17). Make sure
you are using a version later than that if you must use 5.5.
 
Now, before you ask about what version of Tomcat 6 you need in order to
avoid this vulnerability, let me help you:
 
1. Go to Tomcat's web site (http://tomcat.apache.org/)
2. Follow the link that says Security
3. Pick your major Tomcat version
4. Read the fixes. Each one mentions the CVE identifier, a description
   of the problem, the versions of Tomcat affected, and the version in
   which a fix appears.
 
All this information is easy to find on the Tomcat web site. Please read
the documentation before continuing to ask questions such as these.
 
- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
 
iEYEARECAAYFAkqC1ZUACgkQ9CaO5/Lv0PCU0ACfRTpiCEBpHAPCHyU0zB9nEX7s
ZSEAoJb6rG+4aQCzX2iyP9B3VqLODGFX
=z6Bp
-END PGP

RE: avoiding ssl vulnerabilities in tomcat

2009-08-12 Thread Jeffrey Janner
Chris -
(I just did a reply in Outlook and this is how it got packaged. Didn't look 
that way to me, but got it that way on the send-back.  Either Exchange or my 
email filter - which adds the confidentialiy footer - did this.)

I figured it was only with the regular.  Just wanted a clarification in case 
some folks were thinking it applied to the native libraries (APR). I've noticed 
a lot of folks confuse the two on this list.

Also it was a slight prompt to the original poster that perhaps he should 
install the native libraries when he does finally go to 6.x.  IIRC, they are 
not available to 4.x.
Jeff

-Original Message-
From: Christopher Schultz [mailto:ch...@christopherschultz.net] 

Jeff,

(Strange... to me, your message looked like an attachment to the
security notice that would typically be put at the end of a message.
When I tried to reply to that, all the characters got all wonky. At
least coy-paste still works :)

On 8/12/2009 10:51 AM, Jeffrey Janner wrote:
 Just to clarify some things:  This CVE only applies to the default
 SSL connector functionality.  It doesn't apply to the APR/OpenSSL
 connector. Correct?

I would guess not, since APR uses openssl which has its own default set
of ciphers. On the other hand, Tomcat could override the default set of
ciphers when configuring APR at runtime.


***  NOTICE  *
This message is intended for the use of the individual or entity to which 
it is addressed and may contain information that is privileged, 
confidential, and exempt from disclosure under applicable law.  If the 
reader of this message is not the intended recipient or the employee or 
agent responsible for delivering this message to the intended recipient, 
you are hereby notified that any dissemination, distribution, or copying 
of this communication is strictly prohibited.  If you have received this 
communication in error, please notify us immediately by reply or by 
telephone (call us collect at 512-343-9100) and immediately delete this 
message and all its attachments.


Re: avoiding ssl vulnerabilities in tomcat

2009-08-12 Thread sunil chandran
Hello all,
A slight change. After discussions , the production team in SIngapore wants us 
to go for upgrade to 4.1.40
Comments from tomcat forum responses:
1. Upgrade to the latest version of 4.1.x, which is 4.1.40. This will
   provide the least headache because you will be staying on your
   current Tomcat version, just improving your patch level.
   Plan to upgrade to a newer release of Tomcat in the future.
Now i feel the vulnerability is fixed in this version. 
Now installing tomcat 4.1.40 what all changes will be required in my sevice..

no change in application?
maybe installation and configuration changes will be needed?

change needed in logging?
should i stop the tomcat 4 service running and then install this new tomcat 
4.1.40?
Please help
--- On Wed, 12/8/09, Christopher Schultz ch...@christopherschultz.net wrote:

From: Christopher Schultz ch...@christopherschultz.net
Subject: Re: avoiding ssl vulnerabilities in tomcat
To: Tomcat Users List users@tomcat.apache.org
Date: Wednesday, 12 August, 2009, 8:15 PM

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Sunil,

On 8/12/2009 3:12 AM, sunil chandran wrote:
 The issue is SSL vulnerability. from the responses, i understood that
 i need to upgrade to tomcat latest version. As per the team, it is
 recommended to go for Tomcat 5 in our environment.

With all due respect to your team, I think they are making a mistake.
Either of these are better choices in my opinion:

1. Upgrade to the latest version of 4.1.x, which is 4.1.40. This will
   provide the least headache because you will be staying on your
   current Tomcat version, just improving your patch level.
   Plan to upgrade to a newer release of Tomcat in the future.

2. Upgrade directly to Tomcat 6 without making a stop at Tomcat 5.5.
   If you are going to upgrade major versions, there is absolutely
   no reason for you to go to Tomcat 5.5, which will eventually have
   support dropped just like Tomcat 4.1 did.

 my quesiton is: Is this vulernability solved in tomcat 5 version?

Sheesh. Did you read the CVE description?
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-1858

It clearly says that Tomcat 5.5 is vulnerable through 5.5.17 (which is
inaccurate: the fix for this is documented to be in 5.5.17). Make sure
you are using a version later than that if you must use 5.5.

Now, before you ask about what version of Tomcat 6 you need in order to
avoid this vulnerability, let me help you:

1. Go to Tomcat's web site (http://tomcat.apache.org/)
2. Follow the link that says Security
3. Pick your major Tomcat version
4. Read the fixes. Each one mentions the CVE identifier, a description
   of the problem, the versions of Tomcat affected, and the version in
   which a fix appears.

All this information is easy to find on the Tomcat web site. Please read
the documentation before continuing to ask questions such as these.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkqC1ZUACgkQ9CaO5/Lv0PCU0ACfRTpiCEBpHAPCHyU0zB9nEX7s
ZSEAoJb6rG+4aQCzX2iyP9B3VqLODGFX
=z6Bp
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




  See the Web#39;s breaking stories, chosen by people like you. Check out 
Yahoo! Buzz. http://in.buzz.yahoo.com/

Re: avoiding ssl vulnerabilities in tomcat

2009-08-12 Thread sunil chandran
Hello all,
As per Christopher response.
1. Upgrade to the latest version of 4.1.x, which is 4.1.40. This will
   provide the least headache because you will be staying on your
   current Tomcat version, just improving your patch level.
   Plan to upgrade to a newer release of Tomcat in the future.
Can you please tell me what you mean by improving patch level.
How should i install tomcat 4.1.40 on tomcat 4.1.24? is it sperate installation 
or patch? Please help me


--- On Wed, 12/8/09, Christopher Schultz ch...@christopherschultz.net wrote:

From: Christopher Schultz ch...@christopherschultz.net
Subject: Re: avoiding ssl vulnerabilities in tomcat
To: Tomcat Users List users@tomcat.apache.org
Date: Wednesday, 12 August, 2009, 8:15 PM

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Sunil,

On 8/12/2009 3:12 AM, sunil chandran wrote:
 The issue is SSL vulnerability. from the responses, i understood that
 i need to upgrade to tomcat latest version. As per the team, it is
 recommended to go for Tomcat 5 in our environment.

With all due respect to your team, I think they are making a mistake.
Either of these are better choices in my opinion:

1. Upgrade to the latest version of 4.1.x, which is 4.1.40. This will
   provide the least headache because you will be staying on your
   current Tomcat version, just improving your patch level.
   Plan to upgrade to a newer release of Tomcat in the future.

2. Upgrade directly to Tomcat 6 without making a stop at Tomcat 5.5.
   If you are going to upgrade major versions, there is absolutely
   no reason for you to go to Tomcat 5.5, which will eventually have
   support dropped just like Tomcat 4.1 did.

 my quesiton is: Is this vulernability solved in tomcat 5 version?

Sheesh. Did you read the CVE description?
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-1858

It clearly says that Tomcat 5.5 is vulnerable through 5.5.17 (which is
inaccurate: the fix for this is documented to be in 5.5.17). Make sure
you are using a version later than that if you must use 5.5.

Now, before you ask about what version of Tomcat 6 you need in order to
avoid this vulnerability, let me help you:

1. Go to Tomcat's web site (http://tomcat.apache.org/)
2. Follow the link that says Security
3. Pick your major Tomcat version
4. Read the fixes. Each one mentions the CVE identifier, a description
   of the problem, the versions of Tomcat affected, and the version in
   which a fix appears.

All this information is easy to find on the Tomcat web site. Please read
the documentation before continuing to ask questions such as these.

- -chris
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkqC1ZUACgkQ9CaO5/Lv0PCU0ACfRTpiCEBpHAPCHyU0zB9nEX7s
ZSEAoJb6rG+4aQCzX2iyP9B3VqLODGFX
=z6Bp
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




  Looking for local information? Find it on Yahoo! Local 
http://in.local.yahoo.com/

RE: avoiding ssl vulnerabilities in tomcat

2009-08-11 Thread sunil chandran

Hello all,
 
OK i will upgrade.
But what all changes required to update to tomcat 5.
what all changes reuired to upgrade to tomcat 4.1.40
 
 

--- On Mon, 10/8/09, Caldarale, Charles R chuck.caldar...@unisys.com wrote:


From: Caldarale, Charles R chuck.caldar...@unisys.com
Subject: RE: avoiding ssl vulnerabilities in tomcat
To: Tomcat Users List users@tomcat.apache.org
Date: Monday, 10 August, 2009, 7:10 PM


 From: sunil chandran [mailto:sunilonweb2...@yahoo.co.in]
 Subject: Re: avoiding ssl vulnerabilities in tomcat
 
 Is there any patch provided so that i can still use the same version
 4.1.24 itself.

No, you *must* upgrade.  Your reluctance to do so borders on the ridiculous.

- Chuck


THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY 
MATERIAL and is thus for use only by the intended recipient. If you received 
this in error, please contact the sender and delete the e-mail and its 
attachments from all computers.



Send free SMS to your Friends on Mobile from your Yahoo! Messenger. Download 
Now! http://messenger.yahoo.com/download.php

Re: avoiding ssl vulnerabilities in tomcat

2009-08-11 Thread Mark Thomas
sunil chandran wrote:
 Hello all,
  
 OK i will upgrade.
 But what all changes required to update to tomcat 5.
 what all changes reuired to upgrade to tomcat 4.1.40

You may as well do the job properly and upgrade to 6.0.20.

For you app? No changes should be required.

For your Tomcat configuration? Start with the clean configuration
provided with 6.0.20 and add any modifications you need. Be aware that
the config has changed in particular:
- the Logger element is no longer used
- Resource configuration has changed

See the docs for the details.

Mark



  
  
 
 --- On Mon, 10/8/09, Caldarale, Charles R chuck.caldar...@unisys.com wrote:
 
 
 From: Caldarale, Charles R chuck.caldar...@unisys.com
 Subject: RE: avoiding ssl vulnerabilities in tomcat
 To: Tomcat Users List users@tomcat.apache.org
 Date: Monday, 10 August, 2009, 7:10 PM
 
 
 From: sunil chandran [mailto:sunilonweb2...@yahoo.co.in]
 Subject: Re: avoiding ssl vulnerabilities in tomcat

 Is there any patch provided so that i can still use the same version
 4.1.24 itself.
 
 No, you *must* upgrade.  Your reluctance to do so borders on the ridiculous.
 
 - Chuck
 
 
 THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY 
 MATERIAL and is thus for use only by the intended recipient. If you received 
 this in error, please contact the sender and delete the e-mail and its 
 attachments from all computers.
 
 
 
 Send free SMS to your Friends on Mobile from your Yahoo! Messenger. Download 
 Now! http://messenger.yahoo.com/download.php




-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: avoiding ssl vulnerabilities in tomcat

2009-08-10 Thread sunil chandran
Hello all,
I found this issue form support team:
THREAT:
The Secure 
Socket Layer (SSL) protocol allows for secure communication between a client 
and 
a server. The client usually authenticates the server using an  algorithm like 
RSA or DSS. Some SSL ciphers allow SSL communication without authentication. 
Most common Web browsers like Microsoft Internet Explorer, Netscape and Mozilla 
do not use anonymous authentication ciphers by default.
A vulnerability 
exists in SSL communications when clients are allowed to connect using no 
authentication algorithm. 
SSL 
client-server communication may use several different types of authentication: 
RSA, Diffie-Hellman, DSS or none. When 'none' is 
used, the communications are vulnerable to a man-in-the-middle 
attack.
IMPACT:
An attacker can 
exploit this vulnerability to impersonate your server to 
clients.
SOLUTION:
Disable support 
for anonymous authentication
Please tell me what exactly i must do in tomcat 4 to avoid this ssl 
vulnerabilties.
Please help.
regardsSunil C

--- On Tue, 4/8/09, Mark Thomas ma...@apache.org wrote:

From: Mark Thomas ma...@apache.org
Subject: Re: avoiding ssl vulnerabilities in tomcat
To: Tomcat Users List users@tomcat.apache.org
Date: Tuesday, 4 August, 2009, 9:39 PM

sunil chandran wrote:
 Hello sir,
  
 I am sorry. I am using tomcat 4

Tomcat 4 is no longer supported. You *really* need to upgrade.

  !-- Define a SSL Coyote HTTP/1.1 Connector on port 8443 --
     Connector className=org.apache.coyote.tomcat4..CoyoteConnector
                port=8443 minProcessors=5 maxProcessors=150
                enableLookups=true
                acceptCount=100 debug=0 scheme=https secure=true
                useURIValidationHack=false disableUploadTimeout=true

Again, read the docs. If you must use Tomcat 4 (and that is a bad idea)
you should not be using the Factory element.

       Factory className=org.apache.coyote.tomcat4.CoyoteServerSocketFactory
                keystoreFile=.keystore keystorePass=mypass
                clientAuth=false protocol=TLS /
     /Connector
 
 this is the portion of server.xml. I have anabled ssl.
  
 still there is some vulnerabilities as informed by supprot team. They say 
 that tomcat is configured to access without authentication. 
  
 1. is it true?

Maybe.

 2. How can we confirm  if the tomcat SSL is configure using any algorithm to 
 authenticate or “none”.

With clientAuth=false authentication will be controlled by your app's
web.xml.

Mark




-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Send free SMS to your Friends on Mobile from your Yahoo! Messenger. Download 
Now! http://messenger.yahoo.com/download.php

Re: avoiding ssl vulnerabilities in tomcat

2009-08-10 Thread Mark Thomas
sunil chandran wrote:
 Hello all,
 I found this issue form support team:
 THREAT:
 The Secure 
 Socket Layer (SSL) protocol allows for secure communication between a client 
 and 
 a server. The client usually authenticates the server using an  algorithm 
 like 
 RSA or DSS. Some SSL ciphers allow SSL communication without authentication. 
 Most common Web browsers like Microsoft Internet Explorer, Netscape and 
 Mozilla 
 do not use anonymous authentication ciphers by default.
 A vulnerability 
 exists in SSL communications when clients are allowed to connect using no 
 authentication algorithm. 
 SSL 
 client-server communication may use several different types of 
 authentication: 
 RSA, Diffie-Hellman, DSS or none. When 'none' is 
 used, the communications are vulnerable to a man-in-the-middle 
 attack.
 IMPACT:
 An attacker can 
 exploit this vulnerability to impersonate your server to 
 clients.

It would have saved a lot of time of you had quoted the CVE reference
for this issue. It is CVE-2007-1858.

 SOLUTION:
 Disable support 
 for anonymous authentication
 Please tell me what exactly i must do in tomcat 4 to avoid this ssl 
 vulnerabilties.
 Please help.

Again, *Tomcat 4 is no longer supported - you REALLY need to upgrade*.

If you insist on continuing to use Tomcat 4 then as per
http://tomcat.apache.org/security-4.html you need to upgrade to 4.1.32
or later to avoid this issue.

Given that there are other, arguably more serious vulnerabilities, still
present in 4.1.32 if you must stay on 4.1.x then you should upgrade to
4.1.40.

Mark

 regardsSunil C
 
 --- On Tue, 4/8/09, Mark Thomas ma...@apache.org wrote:
 
 From: Mark Thomas ma...@apache.org
 Subject: Re: avoiding ssl vulnerabilities in tomcat
 To: Tomcat Users List users@tomcat.apache.org
 Date: Tuesday, 4 August, 2009, 9:39 PM
 
 sunil chandran wrote:
 Hello sir,
   
 I am sorry. I am using tomcat 4
 
 Tomcat 4 is no longer supported. You *really* need to upgrade.
 
   !-- Define a SSL Coyote HTTP/1.1 Connector on port 8443 --
  Connector className=org.apache.coyote.tomcat4..CoyoteConnector
 port=8443 minProcessors=5 maxProcessors=150
 enableLookups=true
 acceptCount=100 debug=0 scheme=https secure=true
 useURIValidationHack=false disableUploadTimeout=true
 
 Again, read the docs. If you must use Tomcat 4 (and that is a bad idea)
 you should not be using the Factory element.
 
Factory 
 className=org.apache.coyote.tomcat4.CoyoteServerSocketFactory
 keystoreFile=.keystore keystorePass=mypass
 clientAuth=false protocol=TLS /
  /Connector

 this is the portion of server.xml. I have anabled ssl.
   
 still there is some vulnerabilities as informed by supprot team. They say 
 that tomcat is configured to access without authentication. 
   
 1. is it true?
 
 Maybe.
 
 2. How can we confirm  if the tomcat SSL is configure using any algorithm to 
 authenticate or “none”.
 
 With clientAuth=false authentication will be controlled by your app's
 web.xml.
 
 Mark
 
 
 
 
 -
 To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
 For additional commands, e-mail: users-h...@tomcat.apache.org
 
 
 
 Send free SMS to your Friends on Mobile from your Yahoo! Messenger. Download 
 Now! http://messenger.yahoo.com/download.php



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: avoiding ssl vulnerabilities in tomcat

2009-08-10 Thread sunil chandran
Hello,
I read the link. I found that my tomcat is 4.1.24 version.
So i read that the issue is fixed in 4.1.32.
Is there any patch provided so that i can still use the same version 4.1.24 
itself.
Is it must to upgrade? is there any patch to fix this?

--- On Mon, 10/8/09, Mark Thomas ma...@apache.org wrote:

From: Mark Thomas ma...@apache.org
Subject: Re: avoiding ssl vulnerabilities in tomcat
To: Tomcat Users List users@tomcat.apache.org
Date: Monday, 10 August, 2009, 3:37 PM

sunil chandran wrote:
 Hello all,
 I found this issue form support team:
 THREAT:
 The Secure 
 Socket Layer (SSL) protocol allows for secure communication between a client 
 and 
 a server. The client usually authenticates the server using an  algorithm 
 like 
 RSA or DSS. Some SSL ciphers allow SSL communication without authentication. 
 Most common Web browsers like Microsoft Internet Explorer, Netscape and 
 Mozilla 
 do not use anonymous authentication ciphers by default.
 A vulnerability 
 exists in SSL communications when clients are allowed to connect using no 
 authentication algorithm. 
 SSL 
 client-server communication may use several different types of 
 authentication: 
 RSA, Diffie-Hellman, DSS or none. When 'none' is 
 used, the communications are vulnerable to a man-in-the-middle 
 attack.
 IMPACT:
 An attacker can 
 exploit this vulnerability to impersonate your server to 
 clients.

It would have saved a lot of time of you had quoted the CVE reference
for this issue. It is CVE-2007-1858.

 SOLUTION:
 Disable support 
 for anonymous authentication
 Please tell me what exactly i must do in tomcat 4 to avoid this ssl 
 vulnerabilties.
 Please help.

Again, *Tomcat 4 is no longer supported - you REALLY need to upgrade*.

If you insist on continuing to use Tomcat 4 then as per
http://tomcat.apache.org/security-4.html you need to upgrade to 4.1.32
or later to avoid this issue.

Given that there are other, arguably more serious vulnerabilities, still
present in 4.1.32 if you must stay on 4.1.x then you should upgrade to
4.1.40.

Mark

 regardsSunil C
 
 --- On Tue, 4/8/09, Mark Thomas ma...@apache.org wrote:
 
 From: Mark Thomas ma...@apache.org
 Subject: Re: avoiding ssl vulnerabilities in tomcat
 To: Tomcat Users List users@tomcat.apache.org
 Date: Tuesday, 4 August, 2009, 9:39 PM
 
 sunil chandran wrote:
 Hello sir,
   
 I am sorry. I am using tomcat 4
 
 Tomcat 4 is no longer supported. You *really* need to upgrade.
 
   !-- Define a SSL Coyote HTTP/1.1 Connector on port 8443 --
      Connector className=org.apache.coyote.tomcat4..CoyoteConnector
                 port=8443 minProcessors=5 maxProcessors=150
                 enableLookups=true
                 acceptCount=100 debug=0 scheme=https secure=true
                 useURIValidationHack=false disableUploadTimeout=true
 
 Again, read the docs. If you must use Tomcat 4 (and that is a bad idea)
 you should not be using the Factory element.
 
        Factory 
className=org.apache.coyote.tomcat4.CoyoteServerSocketFactory
                 keystoreFile=.keystore keystorePass=mypass
                 clientAuth=false protocol=TLS /
      /Connector

 this is the portion of server.xml. I have anabled ssl.
   
 still there is some vulnerabilities as informed by supprot team. They say 
 that tomcat is configured to access without authentication. 
   
 1. is it true?
 
 Maybe.
 
 2. How can we confirm  if the tomcat SSL is configure using any algorithm to 
 authenticate or “none”.
 
 With clientAuth=false authentication will be controlled by your app's
 web.xml.
 
 Mark
 
 
 
 
 -
 To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
 For additional commands, e-mail: users-h...@tomcat.apache.org
 
 
 
 Send free SMS to your Friends on Mobile from your Yahoo! Messenger. Download 
 Now! http://messenger.yahoo.com/download.php



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




  Love Cricket? Check out live scores, photos, video highlights and more. 
Click here http://cricket.yahoo.com

RE: avoiding ssl vulnerabilities in tomcat

2009-08-10 Thread Caldarale, Charles R
 From: sunil chandran [mailto:sunilonweb2...@yahoo.co.in]
 Subject: Re: avoiding ssl vulnerabilities in tomcat
 
 Is there any patch provided so that i can still use the same version
 4.1.24 itself.

No, you *must* upgrade.  Your reluctance to do so borders on the ridiculous.

 - Chuck


THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY 
MATERIAL and is thus for use only by the intended recipient. If you received 
this in error, please contact the sender and delete the e-mail and its 
attachments from all computers.



avoiding ssl vulnerabilities in tomcat

2009-08-04 Thread sunil chandran
Hello all,
 
there are some vulnerability existing on my server:
 
SSL Server Allows Cleartext Communication Vulnerability 
 
soultion provided by the team was:
 
SOLUTION: 
Disable support for anonymous authentication.
 
SOLUTION: 
Disable ciphers which support cleartext communication.
 
These vulnerabilities still exist on my server as the modifications done on the 
configuration file ssl.conf was meant for httpd service which is not being used 
in my server.
Ports 443  8443 where the vulnerabilities were detected are used by the Tomcat 
service running on my server.
 
Can someone help me identify the place in server.xml file to avoid these 
vulnerabilties.
 
regards
Sunil C
 
 


  See the Web#39;s breaking stories, chosen by people like you. Check out 
Yahoo! Buzz. http://in.buzz.yahoo.com/

Re: avoiding ssl vulnerabilities in tomcat

2009-08-04 Thread Mark Thomas
sunil chandran wrote:
 there are some vulnerability existing on my server:
  
 SSL Server Allows Cleartext Communication Vulnerability 

snip/

 Can someone help me identify the place in server.xml file to avoid these 
 vulnerabilties.

You didn't say which Tomcat version so I am going to assume 6.0.20.
Neither did you say which connector you are using. I am going to assume
the default Java blocking IO connector.

The info you require is in the docs. Take a look at the SSL section of
this page:
http://tomcat.apache.org/tomcat-6.0-doc/config/http.html

Mark



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: avoiding ssl vulnerabilities in tomcat

2009-08-04 Thread sunil chandran
Hello sir,
 
I am sorry. I am using tomcat 4
 
 !-- Define a SSL Coyote HTTP/1.1 Connector on port 8443 --
    Connector className=org.apache.coyote.tomcat4.CoyoteConnector
   port=8443 minProcessors=5 maxProcessors=150
   enableLookups=true
   acceptCount=100 debug=0 scheme=https secure=true
   useURIValidationHack=false disableUploadTimeout=true
  Factory className=org.apache.coyote.tomcat4.CoyoteServerSocketFactory
   keystoreFile=.keystore keystorePass=mypass
   clientAuth=false protocol=TLS /
    /Connector

this is the portion of server.xml. I have anabled ssl.
 
still there is some vulnerabilities as informed by supprot team. They say 
that tomcat is configured to access without authentication. 
 
1. is it true?
2. How can we confirm  if the tomcat SSL is configure using any algorithm to 
authenticate or “none”.
 
please help me.
 
regards
Sunil C
 
 


--- On Tue, 4/8/09, Mark Thomas ma...@apache.org wrote:


From: Mark Thomas ma...@apache.org
Subject: Re: avoiding ssl vulnerabilities in tomcat
To: Tomcat Users List users@tomcat.apache.org
Date: Tuesday, 4 August, 2009, 2:42 PM


sunil chandran wrote:
 there are some vulnerability existing on my server:
  
 SSL Server Allows Cleartext Communication Vulnerability 

snip/

 Can someone help me identify the place in server.xml file to avoid these 
 vulnerabilties.

You didn't say which Tomcat version so I am going to assume 6.0.20.
Neither did you say which connector you are using. I am going to assume
the default Java blocking IO connector.

The info you require is in the docs. Take a look at the SSL section of
this page:
http://tomcat.apache.org/tomcat-6.0-doc/config/http.html

Mark



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




  Yahoo! recommends that you upgrade to the new and safer Internet Explorer 
8. http://downloads.yahoo.com/in/internetexplorer/

Re: avoiding ssl vulnerabilities in tomcat

2009-08-04 Thread David Smith
Just to clarify, authentication to my mind means providing
username/password credentials.  There's nothing in the connector aside
from maybe the clientAuth=false attribute that controls this.  Setting
that true would mean the client browser is required to send an
authentication certificate during the initial handshake.  Do you mean
accessing without encryption or server certificate?  If so, are there
any other connectors configured?  Can you offer any more specific
information regarding what the support team found?

--David

sunil chandran wrote:
 Hello sir,
  
 I am sorry. I am using tomcat 4
  
  !-- Define a SSL Coyote HTTP/1.1 Connector on port 8443 --
 Connector className=org.apache.coyote.tomcat4.CoyoteConnector
port=8443 minProcessors=5 maxProcessors=150
enableLookups=true
acceptCount=100 debug=0 scheme=https secure=true
useURIValidationHack=false disableUploadTimeout=true
   Factory className=org.apache.coyote.tomcat4.CoyoteServerSocketFactory
keystoreFile=.keystore keystorePass=mypass
clientAuth=false protocol=TLS /
 /Connector

 this is the portion of server.xml. I have anabled ssl.
  
 still there is some vulnerabilities as informed by supprot team. They say 
 that tomcat is configured to access without authentication. 
  
 1. is it true?
 2. How can we confirm  if the tomcat SSL is configure using any algorithm to 
 authenticate or “none”.
  
 please help me.
  
 regards
 Sunil C
  
  


 --- On Tue, 4/8/09, Mark Thomas ma...@apache.org wrote:


 From: Mark Thomas ma...@apache.org
 Subject: Re: avoiding ssl vulnerabilities in tomcat
 To: Tomcat Users List users@tomcat.apache.org
 Date: Tuesday, 4 August, 2009, 2:42 PM


 sunil chandran wrote:
   
 there are some vulnerability existing on my server:
   
 SSL Server Allows Cleartext Communication Vulnerability 
 

 snip/

   
 Can someone help me identify the place in server.xml file to avoid these 
 vulnerabilties.
 

 You didn't say which Tomcat version so I am going to assume 6.0.20.
 Neither did you say which connector you are using. I am going to assume
 the default Java blocking IO connector.

 The info you require is in the docs. Take a look at the SSL section of
 this page:
 http://tomcat.apache.org/tomcat-6.0-doc/config/http.html

 Mark



 -
 To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
 For additional commands, e-mail: users-h...@tomcat.apache.org




   Yahoo! recommends that you upgrade to the new and safer Internet 
 Explorer 8. http://downloads.yahoo.com/in/internetexplorer/
   


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: avoiding ssl vulnerabilities in tomcat

2009-08-04 Thread Mark Thomas
sunil chandran wrote:
 Hello sir,
  
 I am sorry. I am using tomcat 4

Tomcat 4 is no longer supported. You *really* need to upgrade.

  !-- Define a SSL Coyote HTTP/1.1 Connector on port 8443 --
 Connector className=org.apache.coyote.tomcat4.CoyoteConnector
port=8443 minProcessors=5 maxProcessors=150
enableLookups=true
acceptCount=100 debug=0 scheme=https secure=true
useURIValidationHack=false disableUploadTimeout=true

Again, read the docs. If you must use Tomcat 4 (and that is a bad idea)
you should not be using the Factory element.

   Factory className=org.apache.coyote.tomcat4.CoyoteServerSocketFactory
keystoreFile=.keystore keystorePass=mypass
clientAuth=false protocol=TLS /
 /Connector
 
 this is the portion of server.xml. I have anabled ssl.
  
 still there is some vulnerabilities as informed by supprot team. They say 
 that tomcat is configured to access without authentication. 
  
 1. is it true?

Maybe.

 2. How can we confirm  if the tomcat SSL is configure using any algorithm to 
 authenticate or “none”.

With clientAuth=false authentication will be controlled by your app's
web.xml.

Mark




-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org