Return-Path: Delivered-To: apmail-geronimo-dev-archive@www.apache.org Received: (qmail 3185 invoked from network); 18 Jan 2006 14:43:36 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur.apache.org with SMTP; 18 Jan 2006 14:43:36 -0000 Received: (qmail 19233 invoked by uid 500); 18 Jan 2006 14:43:31 -0000 Delivered-To: apmail-geronimo-dev-archive@geronimo.apache.org Received: (qmail 19187 invoked by uid 500); 18 Jan 2006 14:43:31 -0000 Mailing-List: contact dev-help@geronimo.apache.org; run by ezmlm Precedence: bulk list-help: list-unsubscribe: List-Post: Reply-To: dev@geronimo.apache.org List-Id: Delivered-To: mailing list dev@geronimo.apache.org Received: (qmail 19176 invoked by uid 99); 18 Jan 2006 14:43:30 -0000 Received: from asf.osuosl.org (HELO asf.osuosl.org) (140.211.166.49) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 18 Jan 2006 06:43:30 -0800 X-ASF-Spam-Status: No, hits=1.7 required=10.0 tests=DNS_FROM_RFC_ABUSE,RCVD_IN_SORBS_WEB X-Spam-Check-By: apache.org Received-SPF: pass (asf.osuosl.org: local policy) Received: from [209.86.89.66] (HELO smtpauth06.mail.atl.earthlink.net) (209.86.89.66) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 18 Jan 2006 06:43:30 -0800 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=dk20050327; d=earthlink.net; b=MIYHge2qBLCfkzlGsQrfB0g6O5kX6FdUYUSE14BD6Z92uALgh0G4eygbLjBe6ui2; h=Received:Message-ID:Date:From:User-Agent:X-Accept-Language:MIME-Version:To:Subject:References:In-Reply-To:Content-Type:Content-Transfer-Encoding:X-ELNK-Trace:X-Originating-IP; Received: from [129.33.49.251] (helo=[9.37.214.129]) by smtpauth06.mail.atl.earthlink.net with asmtp (Exim 4.34) id 1EzEWj-00031s-4l for dev@geronimo.apache.org; Wed, 18 Jan 2006 09:43:09 -0500 Message-ID: <43CE53F8.7060903@earthlink.net> Date: Wed, 18 Jan 2006 09:43:04 -0500 From: Joe Bohn User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716) X-Accept-Language: en-us, en MIME-Version: 1.0 To: dev@geronimo.apache.org Subject: Re: Fw: geronimo 1.0 - CSS vulnerabilities References: <20060117012311.20c39726@doubleshadow.eilebrecht.net> <1b5bfeb50601170147y15e4bc08g@mail.gmail.com> <1137504485.7312.3.camel@localhost> <1b5bfeb50601170624r10609a43h@mail.gmail.com> <43CD0113.9080807@earthlink.net> <43CD0F76.5040603@earthlink.net> <21df75940601170759m3eb0f1edw1838e8074dff2455@mail.gmail.com> <43CD68A2.6020100@gmail.com> <43CDA79B.3000302@hogstrom.org> In-Reply-To: <43CDA79B.3000302@hogstrom.org> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-ELNK-Trace: c408501814fc19611aa676d7e74259b7b3291a7d08dfec7920bf4286af9fff5554d9e8242658a8ab350badd9bab72f9c350badd9bab72f9c350badd9bab72f9c X-Originating-IP: 129.33.49.251 X-Virus-Checked: Checked by ClamAV on apache.org X-Spam-Rating: minotaur.apache.org 1.6.2 0/1000/N I had an off-line discussion with Paul McMahan on this topic. Our thoughts were that it is probably best to fix this problem in both places if possible. The container fix seems best for not only the console but also other uses ... but it is outside of our control and may not be accepted by all containers we might support. Hence, Paul is working on a solution for the portlet itself. We will continue to pursue this with the container teams as well but we will ensure the safety for 1.0.1 in our portlet. Joe Matt Hogstrom wrote: > I think the Portlet is the right place to do this. That way the user is > protected from broken containers (of which we currently have 2). > > John Sisson wrote: > >> Paul McMahan wrote: >> >>> Either approach should work but I would prefer to address the >>> vulnerability in the log viewer portlet because it attaches the >>> solution closest to where the specific problem is at. Also, the >>> logger will be called on every request and doing the extra string >>> manipulations could affect the web container's throughput. >>> >>> Best wishes, >>> Paul >>> >> This reflects my sentiments as well. >> >> John >> >>> >>> On 1/17/06, *Joe Bohn* >> > wrote: >>> >>> Yes, this sounds like the best way to go. >>> >>> Regarding the specific problem with the web console displaying >>> the web >>> access log I'd like to get some consensus. Is this something >>> that the >>> containers should modify when storing the URL as part of a >>> message in >>> the appropriate web log? (I have confirmed this is a problem with >>> both >>> Tomcat and Jetty) >>> >>> Or, should we address this within the web access log viewer and/or >>> management objects to modify the content of the log records when >>> they >>> are being displayed. >>> >>> My preference would be to make the modification at the time the log >>> record is created. >>> >>> Joe >>> >>> >> >> >> >> >> > > -- Joe Bohn joe.bohn at earthlink.net "He is no fool who gives what he cannot keep, to gain what he cannot lose." -- Jim Elliot