DO NOT REPLY [Bug 13772] - Class loader HOWTO needs to href security HOWTO for WebappX

2004-02-01 Thread bugzilla
/show_bug.cgi?id=13772 Class loader HOWTO needs to href security HOWTO for WebappX [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED

DO NOT REPLY [Bug 26421] New: - can not config different security-constraint for differenct folders under same webapp

2004-01-25 Thread bugzilla
/show_bug.cgi?id=26421 can not config different security-constraint for differenct folders under same webapp Summary: can not config different security-constraint for differenct folders under same webapp Product: Tomcat 5 Version: 5.0.16

DO NOT REPLY [Bug 26421] - can not config different security-constraint for differenct folders under same webapp

2004-01-25 Thread bugzilla
/show_bug.cgi?id=26421 can not config different security-constraint for differenct folders under same webapp [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW

DO NOT REPLY [Bug 26421] - can not config different security-constraint for differenct folders under same webapp

2004-01-25 Thread bugzilla
/show_bug.cgi?id=26421 can not config different security-constraint for differenct folders under same webapp --- Additional Comments From [EMAIL PROTECTED] 2004-01-25 20:27 --- Changed to 5.0.18, it does solve my problem, thanks a lot

DO NOT REPLY [Bug 26421] - can not config different security-constraint for differenct folders under same webapp

2004-01-25 Thread bugzilla
/show_bug.cgi?id=26421 can not config different security-constraint for differenct folders under same webapp [EMAIL PROTECTED] changed: What|Removed |Added Status|RESOLVED

DO NOT REPLY [Bug 26174] New: - NoClassDefFoundError when calling getNamedDispatcher with security manager

2004-01-15 Thread bugzilla
/show_bug.cgi?id=26174 NoClassDefFoundError when calling getNamedDispatcher with security manager Summary: NoClassDefFoundError when calling getNamedDispatcher with security manager Product: Tomcat 4 Version: 4.1.24 Platform: PC OS

Re: SECURITY BUG: No place to disable HTTP TRACE vulnerability

2004-01-12 Thread Remy Maucherat
, and it seems that Tomcat is working fine. I set allowTrace=true on the connector, and put in a security-constraint to forbid TRACE in ROOT/WEB-INF/web.xml but no login-config. The result is a perfectly good 403 response to 'TRACE / HTTP/1.0', and a perfectly good TRACE response to 'TRACE /jsp

Re: SECURITY BUG: No place to disable HTTP TRACE vulnerability

2004-01-11 Thread Remy Maucherat
Bill Barker wrote: Ok, this isn't right. Tomcat defaults to NonLoginAuthenticator if there is no login-config. This one just approves everybody for everything. Ok. This isn't absolutely critical, but needs to be fixed. Rémy -

Re: SECURITY BUG: No place to disable HTTP TRACE vulnerability

2004-01-11 Thread Bill Barker
- Original Message - From: Remy Maucherat [EMAIL PROTECTED] To: Tomcat Developers List [EMAIL PROTECTED] Sent: Sunday, January 11, 2004 1:18 AM Subject: Re: SECURITY BUG: No place to disable HTTP TRACE vulnerability Bill Barker wrote: Ok, this isn't right. Tomcat defaults

Re: SECURITY BUG: No place to disable HTTP TRACE vulnerability

2004-01-10 Thread Remy Maucherat
Remy Maucherat wrote: Bill Barker wrote: I just tried this with the CVS HEAD of Tomcat 5 (after putting in a security-constraint in the ROOT web.xml) and Tomcat happily returned a 403 response. I don't care about this lame XSS bug. However, what you describe doesn't work for me. There are two

Re: SECURITY BUG: No place to disable HTTP TRACE vulnerability

2004-01-10 Thread Remy Maucherat
Remy Maucherat wrote: Remy Maucherat wrote: Bill Barker wrote: I just tried this with the CVS HEAD of Tomcat 5 (after putting in a security-constraint in the ROOT web.xml) and Tomcat happily returned a 403 response. I don't care about this lame XSS bug. However, what you describe doesn't

Re: SECURITY BUG: No place to disable HTTP TRACE vulnerability

2004-01-10 Thread Bill Barker
- Original Message - From: Remy Maucherat [EMAIL PROTECTED] To: Tomcat Developers List [EMAIL PROTECTED] Sent: Saturday, January 10, 2004 5:24 AM Subject: Re: SECURITY BUG: No place to disable HTTP TRACE vulnerability Remy Maucherat wrote: Bill Barker wrote: I just tried

Re: SECURITY BUG: No place to disable HTTP TRACE vulnerability

2004-01-10 Thread Bill Barker
- Original Message - From: Bill Barker [EMAIL PROTECTED] To: Tomcat Developers List [EMAIL PROTECTED] Sent: Saturday, January 10, 2004 6:28 PM Subject: Re: SECURITY BUG: No place to disable HTTP TRACE vulnerability - Original Message - From: Remy Maucherat [EMAIL PROTECTED

DO NOT REPLY [Bug 25981] New: - jsp security example does not work!

2004-01-08 Thread bugzilla
/show_bug.cgi?id=25981 jsp security example does not work! Summary: jsp security example does not work! Product: Tomcat 5 Version: 5.0.16 Platform: PC OS/Version: Linux Status: NEW Severity: Normal Priority: Other

DO NOT REPLY [Bug 25981] - jsp security example does not work!

2004-01-08 Thread bugzilla
/show_bug.cgi?id=25981 jsp security example does not work! [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED Resolution

DO NOT REPLY [Bug 25981] - jsp security example does not work!

2004-01-08 Thread bugzilla
/show_bug.cgi?id=25981 jsp security example does not work! --- Additional Comments From [EMAIL PROTECTED] 2004-01-08 16:27 --- What in the world is, It works for me now supposed to mean? Does this mean it didn't work for you five minutes ago, it always worked. This is a very default install

DO NOT REPLY [Bug 25981] - jsp security example does not work!

2004-01-08 Thread bugzilla
/show_bug.cgi?id=25981 jsp security example does not work! --- Additional Comments From [EMAIL PROTECTED] 2004-01-08 16:34 --- Answering bug reports is (of course) always based on the current CVS code. Security constraint checking was updated since 5.0.16

cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security SecurityClassLoad.java

2004-01-06 Thread remm
remm2004/01/06 00:39:20 Modified:catalina/src/share/org/apache/catalina/security SecurityClassLoad.java Log: - I didn't test it, but I saw a typo. Revision ChangesPath 1.13 +5 -5 jakarta-tomcat-catalina/catalina/src/share/org/apache

Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security SecurityClassLoad.java

2004-01-06 Thread Jeanfrancois Arcand
[EMAIL PROTECTED] wrote: billbarker2004/01/05 20:27:34 Modified:catalina/src/share/org/apache/catalina/security SecurityClassLoad.java Log: Adding classes for Coyote-Jk. This addresses Bug #25819. Reported By: Dario Bonino [EMAIL PROTECTED] Revision

Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security SecurityClassLoad.java

2004-01-06 Thread Bill Barker
- Original Message - From: Jeanfrancois Arcand [EMAIL PROTECTED] To: Tomcat Developers List [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Sent: Tuesday, January 06, 2004 7:40 AM Subject: Re: cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security

cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security SecurityClassLoad.java

2004-01-06 Thread billbarker
billbarker2004/01/06 20:56:09 Modified:catalina/src/share/org/apache/catalina/security SecurityClassLoad.java Log: reviting patch. Revision ChangesPath 1.14 +4 -13 jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security

cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security SecurityClassLoad.java

2004-01-06 Thread billbarker
billbarker2004/01/06 21:33:28 Modified:catalina/src/share/org/apache/catalina/security SecurityClassLoad.java Log: Preload the new PAs. Revision ChangesPath 1.15 +18 -4 jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina

cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security SecurityClassLoad.java

2004-01-05 Thread billbarker
billbarker2004/01/05 20:27:34 Modified:catalina/src/share/org/apache/catalina/security SecurityClassLoad.java Log: Adding classes for Coyote-Jk. This addresses Bug #25819. Reported By: Dario Bonino [EMAIL PROTECTED] Revision ChangesPath

DO NOT REPLY [Bug 11603] - security fails for http-method != GET when user is forced to login

2004-01-04 Thread bugzilla
/show_bug.cgi?id=11603 security fails for http-method != GET when user is forced to login [EMAIL PROTECTED] changed: What|Removed |Added CC||[EMAIL

DO NOT REPLY [Bug 11603] - security fails for http-method != GET when user is forced to login

2004-01-04 Thread bugzilla
/show_bug.cgi?id=11603 security fails for http-method != GET when user is forced to login [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED

DO NOT REPLY [Bug 25796] New: - Multiple security-contraint entries in web.xml lead to too-restrictive behaviour

2003-12-29 Thread bugzilla
/show_bug.cgi?id=25796 Multiple security-contraint entries in web.xml lead to too-restrictive behaviour Summary: Multiple security-contraint entries in web.xml lead to too-restrictive behaviour Product: Tomcat 5 Version: 5.0.16 Platform: PC

DO NOT REPLY [Bug 25796] - Multiple security-contraint entries in web.xml lead to too-restrictive behaviour

2003-12-29 Thread bugzilla
/show_bug.cgi?id=25796 Multiple security-contraint entries in web.xml lead to too-restrictive behaviour [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW

DO NOT REPLY [Bug 25625] New: - Security Restrictions don't apply to initial page

2003-12-18 Thread bugzilla
/show_bug.cgi?id=25625 Security Restrictions don't apply to initial page Summary: Security Restrictions don't apply to initial page Product: Tomcat 5 Version: 5.0.16 Platform: PC OS/Version: Linux Status: NEW Severity: Normal

DO NOT REPLY [Bug 25625] - Security Restrictions don't apply to initial page

2003-12-18 Thread bugzilla
/show_bug.cgi?id=25625 Security Restrictions don't apply to initial page [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED

DO NOT REPLY [Bug 25625] - Security Restrictions don't apply to initial page

2003-12-18 Thread bugzilla
/show_bug.cgi?id=25625 Security Restrictions don't apply to initial page --- Additional Comments From [EMAIL PROTECTED] 2003-12-18 14:58 --- O.K, I thought it was a bug, because in tomcat 4 it works flawlessly

DO NOT REPLY [Bug 25625] - Security Restrictions don't apply to initial page

2003-12-18 Thread bugzilla
/show_bug.cgi?id=25625 Security Restrictions don't apply to initial page --- Additional Comments From [EMAIL PROTECTED] 2003-12-18 15:07 --- Tomcat 4 issues an external redirect of welcome files so after the redirect is performed, the security constraint may be applied. Tomcat5 does

Security (web.xml) clarification

2003-12-11 Thread Jan-Henrik Haukeland
If a security-constraint is defined protecting a certain uri but no login-config is defined in web.xml then upon accessing the uri, tomcat respond with the following error: HTTP Status 500 - Configuration error: Cannot perform access control without an authenticated principal

DO NOT REPLY [Bug 25367] New: - SECURITY requests for jsp pages bypass apache AuthUserFile directive

2003-12-09 Thread bugzilla
/show_bug.cgi?id=25367 SECURITY requests for jsp pages bypass apache AuthUserFile directive Summary: SECURITY requests for jsp pages bypass apache AuthUserFile directive Product: Tomcat 4 Version: 4.1.18 Platform: PC OS/Version: Linux

DO NOT REPLY [Bug 24270] New: - NoClassDefFoundError when running in security mode

2003-10-30 Thread bugzilla
/show_bug.cgi?id=24270 NoClassDefFoundError when running in security mode Summary: NoClassDefFoundError when running in security mode Product: Tomcat 5 Version: Nightly Build Platform: Sun OS/Version: Solaris Status: NEW Severity

DO NOT REPLY [Bug 24270] - NoClassDefFoundError when running in security mode

2003-10-30 Thread bugzilla
/show_bug.cgi?id=24270 NoClassDefFoundError when running in security mode --- Additional Comments From [EMAIL PROTECTED] 2003-10-30 23:34 --- Created an attachment (id=8840) war file to reproduce - To unsubscribe, e-mail

DO NOT REPLY [Bug 24270] - NoClassDefFoundError when running in security mode

2003-10-30 Thread bugzilla
/show_bug.cgi?id=24270 NoClassDefFoundError when running in security mode --- Additional Comments From [EMAIL PROTECTED] 2003-10-30 23:36 --- http://localhost:8080/jsp_jspwriter_web/JspWriterTest.jsp?testname=jspWriterClearIOExceptionTest is the url that triggered the error with attached war

cvs commit: jakarta-tomcat-jasper/jasper2/src/share/org/apache/jasper/security SecurityClassLoad.java

2003-10-30 Thread jfarcand
jfarcand2003/10/30 17:30:01 Modified:catalina/src/share/org/apache/catalina/security SecurityClassLoad.java http11/src/java/org/apache/coyote/http11 Http11Processor.java InternalOutputBuffer.java jasper2/src

DO NOT REPLY [Bug 24270] - NoClassDefFoundError when running in security mode

2003-10-30 Thread bugzilla
/show_bug.cgi?id=24270 NoClassDefFoundError when running in security mode [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED

DO NOT REPLY [Bug 23759] - allow web.xml security-constraint to restrict by request-origin-host or used-port

2003-10-15 Thread bugzilla
/show_bug.cgi?id=23759 allow web.xml security-constraint to restrict by request-origin-host or used-port [EMAIL PROTECTED] changed: What|Removed |Added Status|REOPENED

DO NOT REPLY [Bug 23759] New: - allow web.xml security-constraint to restrict by request-origin-host or used-port

2003-10-13 Thread bugzilla
/show_bug.cgi?id=23759 allow web.xml security-constraint to restrict by request-origin-host or used-port Summary: allow web.xml security-constraint to restrict by request-origin-host or used-port Product: Tomcat 4 Version: 4.1.28 Platform

DO NOT REPLY [Bug 23759] - allow web.xml security-constraint to restrict by request-origin-host or used-port

2003-10-13 Thread bugzilla
/show_bug.cgi?id=23759 allow web.xml security-constraint to restrict by request-origin-host or used-port [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW

DO NOT REPLY [Bug 23759] - allow web.xml security-constraint to restrict by request-origin-host or used-port

2003-10-13 Thread bugzilla
/show_bug.cgi?id=23759 allow web.xml security-constraint to restrict by request-origin-host or used-port [EMAIL PROTECTED] changed: What|Removed |Added Status|RESOLVED

cvs commit: jakarta-tomcat-jasper/jasper2/src/share/org/apache/jasper/security SecurityClassLoad.java

2003-09-19 Thread jfarcand
jfarcand2003/09/19 14:24:48 Modified:jasper2/src/share/org/apache/jasper/runtime PageContextImpl.java jasper2/src/share/org/apache/jasper/security SecurityClassLoad.java Log: Package protect the class properly

cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security SecurityClassLoad.java

2003-09-19 Thread jfarcand
jfarcand2003/09/19 15:03:35 Modified:catalina/src/share/org/apache/catalina/security SecurityClassLoad.java Log: Add missing doPrivileged block Revision ChangesPath 1.10 +13 -4 jakarta-tomcat-catalina/catalina/src/share/org/apache

cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security SecurityUtil.java

2003-09-10 Thread jfarcand
jfarcand2003/09/10 09:56:45 Modified:catalina/src/share/org/apache/catalina/security SecurityUtil.java Log: Always associate a Subject. If not created, then create a default one. Revision ChangesPath 1.7 +5 -0 jakarta-tomcat-catalina

cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security SecurityUtil.java

2003-09-10 Thread jfarcand
jfarcand2003/09/10 14:28:37 Modified:catalina/src/share/org/apache/catalina/security SecurityUtil.java Log: Do not create session when no one is available. Revision ChangesPath 1.8 +9 -5 jakarta-tomcat-catalina/catalina/src/share/org

does tomcat have a nominated contact for security issues?

2003-09-08 Thread robert burrell donkin
does tomcat have a nominated contact for security issues? (those people who are pmc members will probably already know why i'm asking) - robert - To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail

Re: does tomcat have a nominated contact for security issues?

2003-09-08 Thread Remy Maucherat
robert burrell donkin wrote: does tomcat have a nominated contact for security issues? (those people who are pmc members will probably already know why i'm asking) Security issues should be forwarded to the tomcat-committers list. Remy

Re: does tomcat have a nominated contact for security issues?

2003-09-08 Thread robert burrell donkin
On Monday, September 8, 2003, at 08:43 PM, Remy Maucherat wrote: robert burrell donkin wrote: does tomcat have a nominated contact for security issues? (those people who are pmc members will probably already know why i'm asking) Security issues should be forwarded to the tomcat-committers list

cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security LocalStrings_ja.properties

2003-09-02 Thread remm
remm2003/09/02 07:10:11 Added: catalina/src/share/org/apache/catalina/security LocalStrings_ja.properties Log: - Update Japanese translation, submitted by Kazuhiro Kazama. Revision ChangesPath 1.1 jakarta-tomcat-catalina

DO NOT REPLY [Bug 15291] - Security Manager Does not work

2003-08-28 Thread bugzilla
/show_bug.cgi?id=15291 Security Manager Does not work [EMAIL PROTECTED] changed: What|Removed |Added Status|REOPENED|RESOLVED Resolution

Re: Resend: Tomcat 4.1.24 JVM 1.4.2 security hole?

2003-08-14 Thread Jeff Tulley
I wouldn't be able to try to duplicate this -- I do not use mod_jk2. On my system, with mod_jk it seems the problem is gone with the workaround. Jeff Tulley ([EMAIL PROTECTED]) (801)861-5322 Novell, Inc., The Leading Provider of Net Business Solutions http://www.novell.com [EMAIL PROTECTED]

Re: Tomcat shutdown port and security

2003-08-14 Thread Tim Funk
In a server environment, no. http://jakarta.apache.org/tomcat/faq/security.html#8005 -Tim NAIK,ROSHAN (HP-Cupertino,ex1) wrote: Given that _anybody_ on the local machine could simply telnet to the port and issue a SHUTDOWN command. Isnt the current shutdown mechanism in Tomcat 4 a security

Re: Resend: Tomcat 4.1.24 JVM 1.4.2 security hole?

2003-08-14 Thread Jeff Tulley
lately discussing a possible security hole, but only 1/3 of the people in the thread could see the problem. I finally got to where I could see it using Tomcat 4.1.24 and JVM 1.4.2, but NOT with JVM 1.4.1. The vulnerability is that if you stick a %20 on the end of a .jsp url, you get the source

DO NOT REPLY [Bug 13861] - Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint)

2003-08-14 Thread bugzilla
/show_bug.cgi?id=13861 Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint) [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW

Tomcat 4.1.24 JVM 1.4.2 security hole?

2003-08-14 Thread Jeff Tulley
The user list has been busy lately discussing a possible security hole, but only 1/3 of the people in the thread could see the problem. I finally got to where I could see it using Tomcat 4.1.24 and JVM 1.4.2, but NOT with JVM 1.4.1. The vulnerability is that if you stick a %20 on the end

Resend: Tomcat 4.1.24 JVM 1.4.2 security hole?

2003-08-14 Thread Jeff Tulley
The user list has been busy lately discussing a possible security hole, but only 1/3 of the people in the thread could see the problem. I finally got to where I could see it using Tomcat 4.1.24 and JVM 1.4.2, but NOT with JVM 1.4.1. The vulnerability is that if you stick a %20 on the end

Re: Resend: Tomcat 4.1.24 JVM 1.4.2 security hole?

2003-08-14 Thread Laurent Blume
Jeff Tulley wrote: Verified on Win XP as well. Using that flag fixes the problem. Thanks for making that connection! I've still got the problem when using the mod_jk2 connector. I'm using Tomcat 4.1.27 w/ patch on Windows 2000 SP4, behind an Apache 2.0.47 web server, with the J2SE 1.4.2.

Re: Resend: Tomcat 4.1.24 JVM 1.4.2 security hole?

2003-08-14 Thread Jean-Francois Arcand
don't have a winXX)? -- Jeanfrancois Jeff Tulley wrote: The user list has been busy lately discussing a possible security hole, but only 1/3 of the people in the thread could see the problem. I finally got to where I could see it using Tomcat 4.1.24 and JVM 1.4.2, but NOT with JVM 1.4.1

Re: Resend: Tomcat 4.1.24 JVM 1.4.2 security hole?

2003-08-14 Thread Jeff Tulley
)? -- Jeanfrancois Jeff Tulley wrote: The user list has been busy lately discussing a possible security hole, but only 1/3 of the people in the thread could see the problem. I finally got to where I could see it using Tomcat 4.1.24 and JVM 1.4.2, but NOT with JVM 1.4.1. The vulnerability

Re: Fwd: Re: security hole on windows tomcat?

2003-08-14 Thread Paul Sundling
Yes, adding -Dsun.io.useCanonCaches=false to the tomcat seemed to fix the security hole I discovered on my 4.1.24 tomcat on Windows XP using JDK 1.4.2. Great job finding a solution. It's a testament to open source and cooperation. Fortunately it's JSP source it's showing and people should

Re: Fwd: Re: security hole on windows tomcat?

2003-08-14 Thread Reshat Sabiq
. Paul Sundling wrote: Yes, adding -Dsun.io.useCanonCaches=false to the tomcat seemed to fix the security hole I discovered on my 4.1.24 tomcat on Windows XP using JDK 1.4.2. Great job finding a solution. It's a testament to open source and cooperation. Fortunately it's JSP source it's

Re: Tomcat shutdown port and security

2003-08-05 Thread David Cassidy
: [EMAIL PROTECTED]Subject: Tomcat shutdown port and security om

Tomcat shutdown port and security

2003-08-04 Thread NAIK,ROSHAN (HP-Cupertino,ex1)
Given that _anybody_ on the local machine could simply telnet to the port and issue a SHUTDOWN command. Isnt the current shutdown mechanism in Tomcat 4 a security issue ? -- Roshan - To unsubscribe, e-mail: [EMAIL PROTECTED

DO NOT REPLY [Bug 22032] - missing security-policy in default-configuration

2003-08-01 Thread bugzilla
/show_bug.cgi?id=22032 missing security-policy in default-configuration --- Additional Comments From [EMAIL PROTECTED] 2003-08-01 15:07 --- OK, but the problem occured not only with precompiled JSPs. For me, even the standard tomcat webapps/index.jsp and all of the jsp-examples threw

DO NOT REPLY [Bug 22032] New: - missing security-policy in default-configuration

2003-07-31 Thread bugzilla
/show_bug.cgi?id=22032 missing security-policy in default-configuration Summary: missing security-policy in default-configuration Product: Tomcat 5 Version: 5.0.5 Platform: Other OS/Version: Linux Status: NEW Severity: Normal

DO NOT REPLY [Bug 22032] - missing security-policy in default-configuration

2003-07-31 Thread bugzilla
/show_bug.cgi?id=22032 missing security-policy in default-configuration --- Additional Comments From [EMAIL PROTECTED] 2003-07-31 20:46 --- As a better worksaround, in conf/catalina.properties, remove the jasper package from the list of protected packages. I will investigate why this exception

DO NOT REPLY [Bug 22032] - missing security-policy in default-configuration

2003-07-31 Thread bugzilla
/show_bug.cgi?id=22032 missing security-policy in default-configuration [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED

DO NOT REPLY [Bug 13861] - Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint)

2003-07-17 Thread bugzilla
/show_bug.cgi?id=13861 Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint) [EMAIL PROTECTED] changed: What|Removed |Added Version|4.1.18

DO NOT REPLY [Bug 13861] - Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint)

2003-07-17 Thread bugzilla
/show_bug.cgi?id=13861 Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint) --- Additional Comments From [EMAIL PROTECTED] 2003-07-17 23:04 --- As far as I can tell this is an IE bug. Using the snoop example, Tomcat first redirects to SSL

RE: DO NOT REPLY [Bug 13861] - Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint)

2003-07-17 Thread Mark Thomas
WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE. http://nagoya.apache.org/bugzilla/show_bug.cgi?id=13861 Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint) --- Additional Comments From [EMAIL PROTECTED] 2003-07-17 23:04 --- As far

Re: DO NOT REPLY [Bug 13861] - Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint)

2003-07-17 Thread Bill Barker
- Original Message - From: Mark Thomas [EMAIL PROTECTED] To: 'Tomcat Developers List' [EMAIL PROTECTED] Sent: Thursday, July 17, 2003 4:09 PM Subject: RE: DO NOT REPLY [Bug 13861] - Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint) All

WebdavServlet and security constraints

2003-07-03 Thread Martin Algesten
to update our JSPs which lives in the same webapp as their static content. We see it as a security risk to be able to write arbitrary JSP code that gets executed on our servers. The neatest way of doing this protection was in the web.xml: !-- This constraint makes sure no JSP files are overwritten

Re: Why Redhat 8.0 / 9.0 still use 2.0.40 (+ security fixes)

2003-06-27 Thread William A. Rowe, Jr.
the worst offender to mix security updates with other changes in a new release ;) This is a good example of why Jeff Trawick and I spent many posts arguing the benefits of maintaining binary compatibility from update to update within the remaining releases of Apache 2.0 :-) Unfortunately

Why Redhat 8.0 / 9.0 still use 2.0.40 (+ security fixes)

2003-06-27 Thread Henri Gomez
For those who wonder why Redhat didn't update Apache 2.0 in distro 8.0 and 9.0, just read : http://www.redhat.com/advice/speaks_backport.html - To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL

Re: Why Redhat 8.0 / 9.0 still use 2.0.40 (+ security fixes)

2003-06-27 Thread Mark J Cox
For those who wonder why Redhat didn't update Apache 2.0 in distro 8.0 and 9.0, just read : http://www.redhat.com/advice/speaks_backport.html Apache httpd was an example that I happened to remember when writing that explanation - Apache is far from the worst offender to mix security updates

cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security SecurityClassLoad.java

2003-06-23 Thread jfarcand
jfarcand2003/06/23 12:22:26 Modified:catalina/src/share/org/apache/catalina/security SecurityClassLoad.java Log: Put the method call under the proper method :-) Revision ChangesPath 1.9 +7 -7 jakarta-tomcat-catalina/catalina/src/share

cvs commit: jakarta-tomcat-jasper/jasper2/src/share/org/apache/jasper/security - New directory

2003-06-23 Thread jfarcand
jfarcand2003/06/23 12:33:09 jakarta-tomcat-jasper/jasper2/src/share/org/apache/jasper/security - New directory - To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]

cvs commit: jakarta-tomcat-jasper/jasper2/src/share/org/apache/jasper/security SecurityClassLoad.java

2003-06-23 Thread jfarcand
jfarcand2003/06/23 12:35:59 Modified:jasper2 build.xml jasper2/src/share/org/apache/jasper/compiler JspRuntimeContext.java Added: jasper2/src/share/org/apache/jasper/security SecurityClassLoad.java Log

problems with web.xml and security

2003-06-17 Thread Rosaria Silipo
/secure/*. Have you have ever seen this problem before? Thanks for any help -- Rosaria !DOCTYPE web-app PUBLIC -//Sun Microsystems, Inc.//DTD Web Application 2.3//EN http://java.sun.com/dtd/web-app_2_3.dtd; web-app ... !-- SECURITY CONSTRAINT -- security-constraint web-resource

Re: problems with web.xml and security

2003-06-17 Thread Bill Barker
Your web.xml file is invalid. If you re-post the question to tomcat-user, I'll be more than happy to explain why. - Original Message - From: Rosaria Silipo [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, June 16, 2003 7:20 PM Subject: problems with web.xml and security Hi, I

cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security SecurityClassLoad.java

2003-06-16 Thread remm
remm2003/06/16 14:42:40 Modified:catalina/src/share/org/apache/catalina/security SecurityClassLoad.java Log: - AFAIK, CookieTools is no longer used. - For compat, it is placed in catalina-optional, but I don't see a need to preload it. Revision

RE: security of server.xml in tomcat

2003-06-10 Thread Sri Thuraisamy
-6271 -Original Message- From: Mohamed Tagari [mailto:[EMAIL PROTECTED] Sent: Monday, June 09, 2003 9:32 AM To: [EMAIL PROTECTED] Subject: security of server.xml in tomcat Hi, Is there any way of instantiating the password and username parameters for connecting

security of server.xml in tomcat

2003-06-09 Thread Mohamed Tagari
Hi, Is there any way of instantiating the password and username parameters for connecting to a database in the application code rather than having it as plain text in the server.xml. As having the username and password as plain text is not very secure.. Any help/information will be

RE: security of server.xml in tomcat

2003-06-09 Thread Chad Johnson
PROTECTED] Sent: Monday, June 09, 2003 9:32 AM To: [EMAIL PROTECTED] Subject: security of server.xml in tomcat Hi, Is there any way of instantiating the password and username parameters for connecting to a database in the application code rather than having it as plain text in the server.xml

Re: security of server.xml in tomcat

2003-06-09 Thread kev
On Monday, June 9, 2003, at 03:31 PM, Mohamed Tagari wrote: Hi, Is there any way of instantiating the password and username parameters for connecting to a database in the application code rather than having it as plain text in the server.xml. As having the username and password as plain text is

cvs commit: jakarta-tomcat-catalina/catalina/src/share/org/apache/catalina/security SecurityUtil.java

2003-06-05 Thread jfarcand
jfarcand2003/06/04 14:15:39 Modified:catalina/src/share/org/apache/catalina/security SecurityUtil.java Log: Add caching mechanism to improve performance. Instead of creating a Method object each time the filter/servlet is invoked, use the cached object

DO NOT REPLY [Bug 19158] - Security hole in FormAuthenticator regarding session ID.

2003-06-03 Thread bugzilla
/show_bug.cgi?id=19158 Security hole in FormAuthenticator regarding session ID. [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED

Tomcat security handling spec non-compliance

2003-03-27 Thread Jeff Tulley
I think I've found a fairly important place where Tomcat is not spec compliant. I think there is code in there to make this work, but the code must have a bug. The spec part is: SRV 12.5.3, actually in J2EE.12.5.3.1 Login Form Notes: ... If the form based login is invoked because of an HTTP

Re: Tomcat security handling spec non-compliance

2003-03-27 Thread Jeff Tulley
More info: Pre-existing bug in bugzilla, 10229. It seems to be a connector issue. As the bug states, I can use the old org.apache.catalina.connector.http.HttpConnector and get the desired correct behavior. Since the Coyote Connector is used widely and is the default, any chance of getting this

DO NOT REPLY [Bug 14066] - AJP13 connection security info not passed through

2003-02-04 Thread bugzilla
/show_bug.cgi?id=14066 AJP13 connection security info not passed through [EMAIL PROTECTED] changed: What|Removed |Added CC||[EMAIL PROTECTED

Re: [ANN] Security update: Apache Tomcat 3.3.1a released

2003-01-26 Thread Bill Barker
Isaacs [EMAIL PROTECTED] To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Saturday, January 25, 2003 8:30 PM Subject: [ANN] Security update: Apache Tomcat 3.3.1a released Tomcat 3.3.1a has been released to address the following two vulnerabilities found in Tomcat 3.3.1 and earlier

RE: [ANN] Security update: Apache Tomcat 3.3.1a released

2003-01-26 Thread Larry Isaacs
This was the quickest way to deal with a security vulnerability that was discussed on tomcat-committers. At the time Tomcat 3.3.x wasn't building and the last good build doesn't pass one of the internal tests. Also, I haven't had time to clean out the old mod_jk content and to other clean up

[ANN] Security update: Apache Tomcat 3.3.1a released

2003-01-25 Thread Larry Isaacs
application via its web.xml file in spite of the presence of a security manager. The content of files that can be read as part of an XML document would be accessible. If you are running Tomcat 3.3.1 or earlier with a security manager, and are serving web applications whose web.xml content is not known

RE: Jk connector and security roles (was: DO NOT REPLY [Bug 16253] - Security roles in web.xml do not work with IIS)

2003-01-22 Thread Ignacio J. Ortega
Ari, ( many time without posting, readed most of everyone every day, but paycheck commanded me :() Btw, I guess that it is impossible to use roles when one has apache as front end also. Yes, AFAIK this is the case for Apache too.. and in addition i dont think there is nothing

Jk connector and security roles (was: DO NOT REPLY [Bug 16253] - Security roles in web.xml do not work with IIS)

2003-01-21 Thread Ari Suutari
Hi, Security roles in web.xml do not work with IIS Btw, I guess that it is impossible to use roles when one has apache as front end also. --- Additional Comments From [EMAIL PROTECTED] 2003-01-20 15:18 --- The idea was to use NT UserGroups as Roles, but never

DO NOT REPLY [Bug 16253] New: - Security roles in web.xml do not work with IIS

2003-01-20 Thread bugzilla
/show_bug.cgi?id=16253 Security roles in web.xml do not work with IIS Summary: Security roles in web.xml do not work with IIS Product: Tomcat 4 Version: 4.1.18 Platform: PC OS/Version: Windows NT/2K Status: NEW Severity: Normal

DO NOT REPLY [Bug 16253] - Security roles in web.xml do not work with IIS

2003-01-20 Thread bugzilla
/show_bug.cgi?id=16253 Security roles in web.xml do not work with IIS [EMAIL PROTECTED] changed: What|Removed |Added Status|NEW |RESOLVED Resolution

DO NOT REPLY [Bug 13861] - Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint)

2002-12-28 Thread bugzilla
/show_bug.cgi?id=13861 Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint) --- Additional Comments From [EMAIL PROTECTED] 2002-12-28 16:55 --- Created an attachment (id=4278) workaround: web.xml -- To unsubscribe, e-mail: mailto:[EMAIL PROTECTED

DO NOT REPLY [Bug 13861] - Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint)

2002-12-28 Thread bugzilla
/show_bug.cgi?id=13861 Authentication / SSL conflict (web.xml security-constraint auth-constraint user-data-constraint) --- Additional Comments From [EMAIL PROTECTED] 2002-12-28 16:55 --- Created an attachment (id=4279) workaround: loginforward.jsp -- To unsubscribe, e-mail: mailto:[EMAIL

<    1   2   3   4   5   6   >