Derby's DRDA (Distributed Relational Database Architecture) Network Server 
by default only listens for connections on the loopback address (which is 
a good default) and does not have authentication turned on.

Therefore on a multiuser O/S this level of security seems inadequate as 
any user on the localhost could connect to it using the DB2 Universal 
Connector (specifying any userid and password as it will be ignored by the 
server) and start creating databases/tables etc. 

Q1. Are there any plans on how a default Geronimo configuration would 
secure the embedded Derby Network Server?

Q2. What would be the best way to restrict the remote IP addresses that 
Derby will accept connections from (e.g. particular IP addresses)?  Should 
a policy file be used and passed to the JVM when starting Geronimo (see 
http://incubator.apache.org/derby/manuals/admin/hubprnt30.html ) or is 
there a better way for Geronimo?

Q3. Should we have some simple authentication enabled by shipping a sample 
geronimo\var\derby\derby.properties file that has something like the 
following?

#
#Security settings
#
derby.connection.requireAuthentication=true
derby.authentication.provider=BUILTIN
#
# User and password list for Derby BUILTIN authentication provider
#
derby.user.system=manager
derby.user.myapp=myapppswd

Thanks,

John

Reply via email to