Discouraging Rogue Users In Tomcat

2020-08-03 Thread Alan Basche
Hello, I have recently developed code for Tomcat 8.5 that defends against black-hats probing Tomcat and the website apps for vulnerabilities. This coding effort started a year ago, and the latest code has been running successfully on Tomcat 8.5.49 (Linux server) for about 3 months. I feel that To

Discouraging Rogue Users In Tomcat

2020-08-05 Thread Alan Basche
> > Alan, > > > What kind of protections does this module provide? How does it > integrate into Tomcat (e.g. custom > Filter/Valve/ServletContextListener, patches to arbitrary places in > Tomcat internals, etc.)? > The point of this code is to prevent malicious users from probing Tomcat hosted app

Re: Discouraging Rogue Users In Tomcat

2020-08-04 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Alan, On 8/3/20 21:25, Alan Basche wrote: > I have recently developed code for Tomcat 8.5 that defends against > black-hats probing Tomcat and the website apps for > vulnerabilities. This coding effort started a year ago, and the > latest code has b

Re: Discouraging Rogue Users In Tomcat

2020-08-05 Thread Dave Fisher
Hi - In my experience the scans you are reporting may be from a white hat security scan of your website that is contracted by your security team. These tend to try every exploit that is known for any web server to make sure that your web apps is secure. I’m not sure how the Tomcat team will re

Re: Discouraging Rogue Users In Tomcat

2020-08-14 Thread Mark Thomas
This looks like a Tomcat specific fail2ban clone to me. My recommendation for users that want this sort of functionality is have the app write the offending IP address (and optional additional info) to a log file and configure fail2ban to monitor that log file. Mark On 05/08/2020 18:51, Dave Fi