Return-Path: Delivered-To: apmail-db-derby-dev-archive@www.apache.org Received: (qmail 32106 invoked from network); 27 Feb 2007 17:06:19 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 27 Feb 2007 17:06:19 -0000 Received: (qmail 59701 invoked by uid 500); 27 Feb 2007 17:06:26 -0000 Delivered-To: apmail-db-derby-dev-archive@db.apache.org Received: (qmail 59669 invoked by uid 500); 27 Feb 2007 17:06:25 -0000 Mailing-List: contact derby-dev-help@db.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: Delivered-To: mailing list derby-dev@db.apache.org Received: (qmail 59645 invoked by uid 99); 27 Feb 2007 17:06:25 -0000 Received: from herse.apache.org (HELO herse.apache.org) (140.211.11.133) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 27 Feb 2007 09:06:25 -0800 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests=UNPARSEABLE_RELAY X-Spam-Check-By: apache.org Received-SPF: pass (herse.apache.org: local policy) Received: from [192.18.42.249] (HELO nwk-ea-fw-1.sun.com) (192.18.42.249) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 27 Feb 2007 09:06:13 -0800 Received: from d1-sfbay-10.sun.com ([192.18.39.120]) by nwk-ea-fw-1.sun.com (8.13.6+Sun/8.12.9) with ESMTP id l1RH5qY4027814 for ; Tue, 27 Feb 2007 09:05:52 -0800 (PST) Received: from conversion-daemon.d1-sfbay-10.sun.com by d1-sfbay-10.sun.com (Sun Java System Messaging Server 6.2-6.01 (built Apr 3 2006)) id <0JE400L01SQCW000@d1-sfbay-10.sun.com> (original mail from Richard.Hillegas@Sun.COM) for derby-dev@db.apache.org; Tue, 27 Feb 2007 09:05:52 -0800 (PST) Received: from [192.9.61.193] by d1-sfbay-10.sun.com (Sun Java System Messaging Server 6.2-6.01 (built Apr 3 2006)) with ESMTPSA id <0JE400BJWSTSTVI5@d1-sfbay-10.sun.com> for derby-dev@db.apache.org; Tue, 27 Feb 2007 09:05:52 -0800 (PST) Date: Tue, 27 Feb 2007 09:05:35 -0800 From: Rick Hillegas Subject: Re: broken network startup scripts In-reply-to: <54ac72d70702261153n5018a630m8fe0038d5480dec9@mail.gmail.com> Sender: Richard.Hillegas@Sun.COM To: derby-dev@db.apache.org Message-id: <45E464DF.2000803@sun.com> MIME-version: 1.0 Content-type: text/plain; format=flowed; charset=ISO-8859-1 Content-transfer-encoding: 7BIT References: <45E307FC.8090404@sun.com> <54ac72d70702261153n5018a630m8fe0038d5480dec9@mail.gmail.com> User-Agent: Thunderbird 1.5.0.5 (X11/20060828) X-Virus-Checked: Checked by ClamAV on apache.org Andrew McIntyre wrote: > On 2/26/07, Rick Hillegas wrote: >> The network startup scripts are broken now, as a result of the work I am >> doing on DERBY-2196. We decided that, to avoid giving customers a false >> sense of security, the secure-by-default server should fail to come up >> if the customer does not specify how they want to authenticate users. >> Now when you run the network startup script, the script fails fast, >> telling you that you have to specify an authentication scheme. >> >> How should we handle this? >> >> 1) Make the out-of-the-box server come up with Builtin authentication >> and one distinguished user if authentication is otherwise not specified. >> This distinguished system administrator would have a canonical name and >> password. >> >> 2) Revisit our decision to require authentication. Instead, let the >> server come up installing a security manager even though the customer >> has not specified any authentication scheme. >> >> 3) Add the -noSecurityManager option to the server boot command. > > If the goal is backward compaibility, then (3) provides just that: the > behavior of the previous version, but probably deserves at least > printing a warning. Since user authentication and installing a > security manager are not directly related, (2) is certainly doable, > but from the secure-out-of-the box standpoint, it does not provide a > secure environment, since anyone could connect to the server and > manipulate any database resource. (1) seems like it would have some > complicated issues to resolve: for example, to be really secure the > user needs to have a way to remove this default user in such a way > that just running the network server again does not bring it back, > even if the system home is not set to the same location or you've > moved the database and server to a different machine. How do you do > that? > > There's also 4: leave it as-is and force the user to think about the > security of their network server. They can still provide the > -noSecurityManager option as an argument to the script if they just > want to get the server started. I'm leaning in that direction at the > moment. > > andrew Thanks for the quick response, Andrew. If we go with (4), then we have to change our attitude about the startup scripts. Right now they work out-of-the-box. With approach (4), they no longer work out-of-the-box. Instead, they are templates which have to be customized. It would be nice to tell customers how to do this. What do you think: should we document this: a) in comments in the scripts themselves b) in the Admin Guide c) in the Getting Started Guide d) all of the above e) something else Thanks, -Rick