http://www.cafesoft.com/products/cams/tomcat-security.html

if you are asking how to overcome Man-in-the-middle fraudulent manipulation 
based on basic authentication?
and or Man-in-the middle fraudulent manipulation based on Form-based 
authentication which uses j_username 
                                                                and j_password 
and posts back to j_security_check using cleartext?

i would suggest implementation authentication using either Message-Digest or 
HTTPS
Message-Digest processes passwords with a Digest algorithm such as SHA, MD2, or 
MD5..  the receiving entity must agree on the digested contents for 
authentication to occur

HTTPS or HTTP on a SSL connection usually implemented with a known key stored 
in a keystore where access is controlled by CA (certificate authority) 
presentation of a certificate..
a good explanation of how Tomcat implements SSL details are available at
http://www.mbaworld.com/docs/ssl-howto.html

commercial vendors such as Verisign
have implemented CA servers which validate the requesting entity and the 
requestor to ensure both are indeed who they say they are.. client 
authenticating to CA authority is a new feature but prevents spoofed clients 
from order-execution and/or using spoofed credentials to effect fraudulent 
transactions..I would strongly suggest you enable authentication capability in 
both directions if using SSL
https://www.verisign.com/support/roots.html

security elements defined and configured by Tomcat:

                                                Deployment descriptor 
<security-constraint> elements define 
                                                        the permissions and 
rules for the protected Tomcat resources and 
                                                        include the following 
XML elements:

                                                

                                                web-resource-collection - A set 
                                                                of URL patterns 
and HTTP methods that describe a set of resources 
                                                                to be 
protected. All requests that contain a URL pattern matched 
                                                                in a web 
resource collection are subject to the constraint. auth-constraint - A set of 
security 
                                                                roles (one or 
more) to which a user must belong to be granted 
                                                                access to 
resources matched by the web resource collections (e.g. admin/manager) 
user-data-constraint - Describes 
                                                                integrity and 
confidentiality requirements for the transport layer 
                                                                of the client 
server.
an example of XSD which describes user-data-constraintType  would be
  <xsd:complexType name="user-data-constraintType">
    <xsd:annotation>
      <xsd:documentation>
    The user-data-constraintType is used to indicate how
    data communicated between the client and container should be
    protected.

    Used in: security-constraint

      </xsd:documentation>
    </xsd:annotation>

    <xsd:sequence>
      <xsd:element name="description"
           type="j2ee:descriptionType"
           minOccurs="0"
           maxOccurs="unbounded"/>
      <xsd:element name="transport-guarantee"
           type="j2ee:transport-guaranteeType"/>
    </xsd:sequence>
    <xsd:attribute name="id" type="xsd:ID"/>
  </xsd:complexType>

namespace j2ee is assigned xmlns:j2ee="http://java.sun.com/xml/ns/j2ee";
where transport=guaranteeType can be NONE,INTEGRAL or CONFIDENTIAL
the latter 2 types imply use of SSL

Man in the middle fraud is a concern to all and one which should be dealt with 
the most secure and reliable algorithm
available

anyone else?
Martin Gainty 
______________________________________________ 
Disclaimer and Confidentiality/Verzicht und Vertraulichkeitanmerkung/Note de 
déni et de confidentialité
This message is confidential. If you should not be the intended receiver, then 
we ask politely to report. Each unauthorized forwarding or manufacturing of a 
copy is inadmissible. This message serves only for the exchange of information 
and has no legal binding effect. Due to the easy manipulation of emails we 
cannot take responsibility over the the contents.
Diese Nachricht ist vertraulich. Sollten Sie nicht der vorgesehene Empfaenger 
sein, so bitten wir hoeflich um eine Mitteilung. Jede unbefugte Weiterleitung 
oder Fertigung einer Kopie ist unzulaessig. Diese Nachricht dient lediglich dem 
Austausch von Informationen und entfaltet keine rechtliche Bindungswirkung. 
Aufgrund der leichten Manipulierbarkeit von E-Mails koennen wir keine Haftung 
fuer den Inhalt uebernehmen.
Ce message est confidentiel et peut être privilégié. Si vous n'êtes pas le 
destinataire prévu, nous te demandons avec bonté que pour satisfaire informez 
l'expéditeur. N'importe quelle diffusion non autorisée ou la copie de ceci est 
interdite. Ce message sert à l'information seulement et n'aura pas n'importe 
quel effet légalement obligatoire. Étant donné que les email peuvent facilement 
être sujets à la manipulation, nous ne pouvons accepter aucune responsabilité 
pour le contenu fourni.




> From: chuck.caldar...@unisys.com
> To: users@tomcat.apache.org
> Date: Wed, 13 May 2009 07:16:50 -0500
> Subject: RE: Form Based Authentication creates user session before it is 
> authenticated?
> 
> > From: umeshkavade [mailto:umeshkav...@yahoo.co.in]
> > Subject: Re: Form Based Authentication creates user session before it
> > is authenticated?
> > 
> > P.S: BTW, is Tomcat planning to resolve this vulnerability in near
> > future?
> 
> I'll bite: what "vulnerability" are you referring to?
> 
>  - Chuck
> 
> 
> THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY 
> MATERIAL and is thus for use only by the intended recipient. If you received 
> this in error, please contact the sender and delete the e-mail and its 
> attachments from all computers.
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 

_________________________________________________________________
Hotmail® has ever-growing storage! Don’t worry about storage limits.
http://windowslive.com/Tutorial/Hotmail/Storage?ocid=TXT_TAGLM_WL_HM_Tutorial_Storage1_052009

Reply via email to