DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=15417>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=15417

jsp_precompile seems like a possible DOS vulnerability

[EMAIL PROTECTED] changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |INVALID



------- Additional Comments From [EMAIL PROTECTED]  2002-12-16 22:33 -------
A request to a page with jsp_precompile option is just like the request without
the option, except that the request is not delivered, i.e.
http://foo.bar.jsp?pre_compile is not more expensive that http://foo.bar.jsp. 
The compilation is done only once, and if the JSP page has been compiled, the
compilation won't happen.  Therefore I fail to see how this can be used as a DOS
attack.

A production application should precompile all JSP pages, and that will reduce 
jsp_precompile to a nop.

A more useful server option is probably one that tells it that the JSP pages in
an application have been precompiled, and that it should not have to check for
the time stamps for the pages and their servlet files.  This might improve the
performance of the pages somewhat.

--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to