[ 
https://issues.apache.org/jira/browse/DERBY-3083?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12547151
 ] 

Rick Hillegas commented on DERBY-3083:
--------------------------------------

Hi Knut. I agree that if someone has subverted getProtectionDomain(), then the 
fox is already in the hen house. I think this could be our sequence of 
operations:

1) Determine the protection domains (e.g. jar files) which will receive 
privileges.

2) Construct a DerbyPolicy from those protection domains.

3) Install the default SecurityManager with a dummy policy which lets us change 
policies immediately afterwards

4) Install the DerbyPolicy (Policy.setPolicy( derbyPolicy ) )

If there is a window of vulnerability, then I sense that it would lie between 
steps (3) and (4). However, I don't see a vulnerability right now.

> Network server demands a file called "derbynet.jar" in classpath
> ----------------------------------------------------------------
>
>                 Key: DERBY-3083
>                 URL: https://issues.apache.org/jira/browse/DERBY-3083
>             Project: Derby
>          Issue Type: Bug
>          Components: Tools
>    Affects Versions: 10.3.1.4
>            Reporter: Aaron Digulla
>         Attachments: derby-3083-01-requireDerbynet-aa.diff, 
> derby-3083-01-requireDerbynet-ab.diff, derby-716-10-datatypesCollation-aa.diff
>
>
> The network server will not start if the derbynet jar is added under a 
> different name than "derbynet.jar" to the classpath. This makes it impossible 
> to use it in maven projects where the jar is renamed to 
> "derbynet-10.3.1.4.jar".
> This did work with 10.2.2.0

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to