On 19/02/2015 13:23, andrea del bene wrote:

On 19/02/2015 11:28, lucast wrote:
Dear forum,


Reading the Apache Wicket Guide on  URL Encryption in detail
<https://wicket.apache.org/guide/guide/security.html#security_4> , the
section suggests that simply calling

is not enough for url encryption at production level.

Further down on that section, there is one recommendation of making the url
encryption stronger:



Is simply adding *getSecuritySettings().setCryptFactory(new
KeyInSessionSunJceCryptFactory())*; line enough to make the URLs on my
application better as suggested on  URL Encryption in detail
<https://wicket.apache.org/guide/guide/security.html#security_4> ?

My impression is that maybe it isn't since I understand
KeyInSessionSunJceCryptFactory is the default CryptFactory for the
application.
Well no, the default one is CachingSunJceCryptFactory which does NOT generate a separate key for each user. On the contrary KeyInSessionSunJceCryptFactory creates a different key for each user (session). It uses a password-based algorithm to encrypt/decrypt urls which is secure enough for this purpose.


Sorry, with Wicket 6.19.0 the default CryptFactory is actually KeyInSessionSunJceCryptFactory so you are ok with just :

WicketApplication.init() {
  setRootRequestMapper(new CryptoMapper(getRootRequestMapper(), this));
}

you might need to implement you own stronger CryptFactory only if you are not satisfied with password-based cypher.

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@wicket.apache.org
For additional commands, e-mail: users-h...@wicket.apache.org

Reply via email to