Return-Path: Delivered-To: apmail-db-derby-dev-archive@www.apache.org Received: (qmail 86142 invoked from network); 21 Nov 2007 09:39:08 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 21 Nov 2007 09:39:08 -0000 Received: (qmail 66543 invoked by uid 500); 21 Nov 2007 09:38:55 -0000 Delivered-To: apmail-db-derby-dev-archive@db.apache.org Received: (qmail 66503 invoked by uid 500); 21 Nov 2007 09:38:55 -0000 Mailing-List: contact derby-dev-help@db.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: Delivered-To: mailing list derby-dev@db.apache.org Received: (qmail 66494 invoked by uid 99); 21 Nov 2007 09:38:55 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 21 Nov 2007 01:38:55 -0800 X-ASF-Spam-Status: No, hits=-100.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.4] (HELO brutus.apache.org) (140.211.11.4) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 21 Nov 2007 09:39:04 +0000 Received: from brutus (localhost [127.0.0.1]) by brutus.apache.org (Postfix) with ESMTP id 202247141F1 for ; Wed, 21 Nov 2007 01:38:43 -0800 (PST) Message-ID: <25079627.1195637923061.JavaMail.jira@brutus> Date: Wed, 21 Nov 2007 01:38:43 -0800 (PST) From: "Aaron Digulla (JIRA)" To: derby-dev@db.apache.org Subject: [jira] Commented: (DERBY-3083) Network server demands a file called "derbynet.jar" in classpath In-Reply-To: <17082838.1190192623682.JavaMail.jira@brutus> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/DERBY-3083?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12544392 ] Aaron Digulla commented on DERBY-3083: -------------------------------------- > No, my argument is that there is a vulnerability, thus it is subject to be being exploited. Okay, let me see if we're on the same track here: A Security Manager will do this: It will enforce allowed operations on specific JARs on the classpath. The JARs are not signed and not protected in any way other than their name and path. So Daniel's arguments boils down to this: "I enhance security by enforcing the JAR to have a certain name/path". I do not believe this is true. As long as I can add malicious code to the JAR without the SM noticing, enforcing the name will not give additional protection. Therefore, enforcing a specific name will only add a false sense of security which isn't really there. This is even more dangerous than having an unknown vulnerability since people will believe they are safe when they are not. To be as safe as we can possibly be, I suggest that you use Class.getResource() on specific classes which should be on the classpath and strip the package and class from the resulting URL. This will be as safe as the static JAR names (as to my argument above) and it will work for both the case that the JARs have been renamed and that they have been collected in an ueberjar. For the same reasons, storing these URLs in the system properties (or any global variable) is okay too, because this cannot be exploited from a remote attacker and the SM doesn't give any protection against a local attacker anyway. As long as users use the supplied code, they will be perfectly safe as long as no one can modify the classpath when the server is started. If they embed the code in a larger app, they have to think about security themselves; we aren't able to forsee what they might do and therefore, we can't make their code secure for them at this time. > Network server demands a file called "derbynet.jar" in classpath > ---------------------------------------------------------------- > > Key: DERBY-3083 > URL: https://issues.apache.org/jira/browse/DERBY-3083 > Project: Derby > Issue Type: Bug > Components: Tools > Affects Versions: 10.3.1.4 > Reporter: Aaron Digulla > Attachments: derby-3083-01-requireDerbynet-aa.diff, derby-3083-01-requireDerbynet-ab.diff, derby-716-10-datatypesCollation-aa.diff > > > The network server will not start if the derbynet jar is added under a different name than "derbynet.jar" to the classpath. This makes it impossible to use it in maven projects where the jar is renamed to "derbynet-10.3.1.4.jar". > This did work with 10.2.2.0 -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.