Hi there I had a private discussion couple of week ago with Jean HELOU who complained of webadmin being hard top secure and hé proposer settings up an optional basic auth scheme, easier to use that the jwt bearer token. Would this be helping? Would this be something you would be willing to contribute, with guidance? Idem for repairing the TLS setup, or making it usable with pem files...
-- Best regards, Benoit TELLIER General manager of Linagora VIETNAM. Product owner for Team-Mail product. Chairman of the Apache James project. Mail: btell...@linagora.com Tel: (0033) 6 77 26 04 58 (WhatsApp, Signal) Le févr. 8, 2025 6:06 PM, de Cryptearth <cryptea...@cryptearth.de.INVALID>Hi Ilya, for me in my very own personal opinion using RSA keys would be fine already, or any other established public-key auth like SSH. But JWT already is some sorts of this which just has to be implemented correctly. I tried to look into it but honestly not really understood it. So I guess if someone could give me just an example I likely would be able to figure it out on my own. Another option I already use on other projects: mutual TLS. It's easy to setup your own PKI and using client certificates for both authentication and identification is part of the TLS standard itself and works with established servers like apache httpd. Implementing it in java is as easy as to set your own root-ca-cert as trustanchor when creating the TLS server socket. The server then requests a client certificate signed by the root-ca-cert (even works with intermediate certs) during the handshake and if none is presented the connection is terminated. All the verification is done by the java SSE itself - nothin complicated to implement - just setup two certificates. Should this be a (or THE) route to implement security on webadmin? I don'T think so. It's an open admin control port and no matter if it comes with some sort of auth or ident it should always be treated as such - which means: only accessible local and protected by firewall at the very least. Yes, there still should be some security on top - but it often comes down to: if an attacker already got local access to your server in most cases you lost already. So, TLDR: For me if, for some reason, one need remote access to james webadmin just use ssh tunneling like ssh user@host -L8443:localhost:8443 and use the local 8443 and let ssh handle the auth and ident and crypto and all that stuff. We already have this tool at hand - and: "Don't roll your own crypto!". Am 07.02.25 um 10:26 schrieb Ilya Terskov: > yeah guys i tried that in the end but one problem - if i have forwards to > other email - it need to delete also, same for aliases, so if doing script > it need to do all that and recursively. > we sure need 3.9.0 with actions working :) about security on it i think we > need just RSA keys just like used in SSH and ofc encryption on this > chanel no plaintext for sure :)