http://www.cafesoft.com/products/cams/tomcat-security.html
if you are asking how to overcome Man-in-the-middle fraudulent manipulation
based on basic authentication?
and or Man-in-the middle fraudulent manipulation based on Form-based
authentication which uses j_username
and j_password
and posts back to j_security_check using cleartext?
i would suggest implementation authentication using either Message-Digest or
HTTPS
Message-Digest processes passwords with a Digest algorithm such as SHA, MD2, or
MD5.. the receiving entity must agree on the digested contents for
authentication to occur
HTTPS or HTTP on a SSL connection usually implemented with a known key stored
in a keystore where access is controlled by CA (certificate authority)
presentation of a certificate..
a good explanation of how Tomcat implements SSL details are available at
http://www.mbaworld.com/docs/ssl-howto.html
commercial vendors such as Verisign
have implemented CA servers which validate the requesting entity and the
requestor to ensure both are indeed who they say they are.. client
authenticating to CA authority is a new feature but prevents spoofed clients
from order-execution and/or using spoofed credentials to effect fraudulent
transactions..I would strongly suggest you enable authentication capability in
both directions if using SSL
https://www.verisign.com/support/roots.html
security elements defined and configured by Tomcat:
Deployment descriptor
<security-constraint> elements define
the permissions and
rules for the protected Tomcat resources and
include the following
XML elements:
web-resource-collection - A set
of URL patterns
and HTTP methods that describe a set of resources
to be
protected. All requests that contain a URL pattern matched
in a web
resource collection are subject to the constraint. auth-constraint - A set of
security
roles (one or
more) to which a user must belong to be granted
access to
resources matched by the web resource collections (e.g. admin/manager)
user-data-constraint - Describes
integrity and
confidentiality requirements for the transport layer
of the client
server.
an example of XSD which describes user-data-constraintType would be
<xsd:complexType name="user-data-constraintType">
<xsd:annotation>
<xsd:documentation>
The user-data-constraintType is used to indicate how
data communicated between the client and container should be
protected.
Used in: security-constraint
</xsd:documentation>
</xsd:annotation>
<xsd:sequence>
<xsd:element name="description"
type="j2ee:descriptionType"
minOccurs="0"
maxOccurs="unbounded"/>
<xsd:element name="transport-guarantee"
type="j2ee:transport-guaranteeType"/>
</xsd:sequence>
<xsd:attribute name="id" type="xsd:ID"/>
</xsd:complexType>
namespace j2ee is assigned xmlns:j2ee="http://java.sun.com/xml/ns/j2ee"
where transport=guaranteeType can be NONE,INTEGRAL or CONFIDENTIAL
the latter 2 types imply use of SSL
Man in the middle fraud is a concern to all and one which should be dealt with
the most secure and reliable algorithm
available
anyone else?
Martin Gainty
______________________________________________
Disclaimer and Confidentiality/Verzicht und Vertraulichkeitanmerkung/Note de
déni et de confidentialité
This message is confidential. If you should not be the intended receiver, then
we ask politely to report. Each unauthorized forwarding or manufacturing of a
copy is inadmissible. This message serves only for the exchange of information
and has no legal binding effect. Due to the easy manipulation of emails we
cannot take responsibility over the the contents.
Diese Nachricht ist vertraulich. Sollten Sie nicht der vorgesehene Empfaenger
sein, so bitten wir hoeflich um eine Mitteilung. Jede unbefugte Weiterleitung
oder Fertigung einer Kopie ist unzulaessig. Diese Nachricht dient lediglich dem
Austausch von Informationen und entfaltet keine rechtliche Bindungswirkung.
Aufgrund der leichten Manipulierbarkeit von E-Mails koennen wir keine Haftung
fuer den Inhalt uebernehmen.
Ce message est confidentiel et peut être privilégié. Si vous n'êtes pas le
destinataire prévu, nous te demandons avec bonté que pour satisfaire informez
l'expéditeur. N'importe quelle diffusion non autorisée ou la copie de ceci est
interdite. Ce message sert à l'information seulement et n'aura pas n'importe
quel effet légalement obligatoire. Étant donné que les email peuvent facilement
être sujets à la manipulation, nous ne pouvons accepter aucune responsabilité
pour le contenu fourni.
> From: [email protected]
> To: [email protected]
> Date: Wed, 13 May 2009 07:16:50 -0500
> Subject: RE: Form Based Authentication creates user session before it is
> authenticated?
>
> > From: umeshkavade [mailto:[email protected]]
> > Subject: Re: Form Based Authentication creates user session before it
> > is authenticated?
> >
> > P.S: BTW, is Tomcat planning to resolve this vulnerability in near
> > future?
>
> I'll bite: what "vulnerability" are you referring to?
>
> - Chuck
>
>
> THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY
> MATERIAL and is thus for use only by the intended recipient. If you received
> this in error, please contact the sender and delete the e-mail and its
> attachments from all computers.
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [email protected]
> For additional commands, e-mail: [email protected]
>
_________________________________________________________________
Hotmail® has ever-growing storage! Don’t worry about storage limits.
http://windowslive.com/Tutorial/Hotmail/Storage?ocid=TXT_TAGLM_WL_HM_Tutorial_Storage1_052009