[ 
https://issues.apache.org/jira/browse/DERBY-4990?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12988895#comment-12988895
 ] 

Dag H. Wanvik commented on DERBY-4990:
--------------------------------------

Checking line subversion line annotation on the template file I see several 
lines added, e.g.

748448   kristwaa   // The next two properties are used to determine if the VM 
is 32 or 64 bit.
748448   kristwaa   permission java.util.PropertyPermission 
"sun.arch.data.model", "read";
748448   kristwaa   permission java.util.PropertyPermission "os.arch", "read";

corresponding to DERBY-3731. As for the server policies, I see there have been 
updates also,
corresponding to DERBY-4441:

935700   kmarsden   permission java.util.PropertyPermission 
"java.runtime.version", "read";
935700   kmarsden   permission java.util.PropertyPermission "java.fullversion", 
"read";
935700   kmarsden   permission java.io.FilePermission "java.runtime.version", 
"read";
935700   kmarsden   permission java.io.FilePermission "java.fullversion", 
"read";

DERBY-4869:

1060422  rhillegas   // The following permission must be granted for 
Connection.abort(Executor) to work.
1060422  rhillegas   // Note that this permission must also be granted to outer 
(application) code domains.
1060422  rhillegas   //
1060422  rhillegas   permission java.sql.SQLPermission "callAbort";

and
DERBY-4715:

965647   kmarsden   // getProtectionDomain is an optional permission needed for 
printing classpath
965647   kmarsden   // information to derby.log
965647   kmarsden   permission java.lang.RuntimePermission 
"getProtectionDomain";

or even back to DERBY-3657:
653387    johnemb // JMX: Uncomment this permission to allow the ping operation 
of the 
653387    johnemb //      NetworkServerMBean to connect to the Network Server.
653387    johnemb //permission java.net.SocketPermission "*", "connect,resolve";

I am not sure how many of these are reflected in the docs..

> Documentation should state a custom security policy being required to use 
> LDAP in conjunction with network driver
> -----------------------------------------------------------------------------------------------------------------
>
>                 Key: DERBY-4990
>                 URL: https://issues.apache.org/jira/browse/DERBY-4990
>             Project: Derby
>          Issue Type: Task
>          Components: Documentation
>            Reporter: Thomas Hill
>            Assignee: Kim Haase
>
> The documentation is lacking a statement that defining and using a >custom< 
> security manager template is required when wanting to use LDAP authorization 
> provider in conjunction with the network driver client. driver. Otherwise, 
> i.e. just using the default security policy will lead to socket permission 
> errors. Details on which permission exactely needs to be granted to which 
> code base would be very helpful.
> Chapter 'Running Derby under a security manager', section 'granting 
> permissions to Derby' in the Developer's guide seems a good place to mention 
> the permission java.net.SocketPermission as optional, but required to be set 
> when wanting to use LDAP authorization in conjunction with the network client 
> driver and defining the authorisation provider properties as system-level 
> properties.
> Adding this to the documentation and preferrably also providing some more 
> guidance seems desirable as migrating off the builtin user system to LDAP is 
> strongly recommened and the documentation has explicit statements about 
> security risks otherwise incurred. 
> I also realized that the template included in the documentation at 
> http://db.apache.org/derby/docs/10.7/adminguide/tadminnetservbasic.html and 
> the default template included in 10.7.1.1 software are no longer in sync.

-- 
This message is automatically generated by JIRA.
-
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to