Return-Path: Delivered-To: apmail-geronimo-dev-archive@www.apache.org Received: (qmail 73818 invoked from network); 1 Mar 2010 08:26:29 -0000 Received: from unknown (HELO mail.apache.org) (140.211.11.3) by 140.211.11.9 with SMTP; 1 Mar 2010 08:26:29 -0000 Received: (qmail 28872 invoked by uid 500); 1 Mar 2010 08:26:28 -0000 Delivered-To: apmail-geronimo-dev-archive@geronimo.apache.org Received: (qmail 28809 invoked by uid 500); 1 Mar 2010 08:26:28 -0000 Mailing-List: contact dev-help@geronimo.apache.org; run by ezmlm Precedence: bulk list-help: list-unsubscribe: List-Post: Reply-To: dev@geronimo.apache.org List-Id: Delivered-To: mailing list dev@geronimo.apache.org Received: (qmail 28696 invoked by uid 99); 1 Mar 2010 08:26:28 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 01 Mar 2010 08:26:28 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.140] (HELO brutus.apache.org) (140.211.11.140) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 01 Mar 2010 08:26:26 +0000 Received: from brutus.apache.org (localhost [127.0.0.1]) by brutus.apache.org (Postfix) with ESMTP id D38DA234C495 for ; Mon, 1 Mar 2010 08:26:05 +0000 (UTC) Message-ID: <818665253.28811267431965865.JavaMail.jira@brutus.apache.org> Date: Mon, 1 Mar 2010 08:26:05 +0000 (UTC) From: "Ashish Jain (JIRA)" To: dev@geronimo.apache.org Subject: [jira] Commented: (GERONIMO-4896) Commands to a Secure JMX Connector require the SSL keyStorePassword to be specified on command line In-Reply-To: <57155078.1253916077846.JavaMail.jira@brutus> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/GERONIMO-4896?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12839594#action_12839594 ] Ashish Jain commented on GERONIMO-4896: --------------------------------------- Thanks a lot Shawn for your continuous suggestions on code style, api's used and the coding standards. > Commands to a Secure JMX Connector require the SSL keyStorePassword to be specified on command line > --------------------------------------------------------------------------------------------------- > > Key: GERONIMO-4896 > URL: https://issues.apache.org/jira/browse/GERONIMO-4896 > Project: Geronimo > Issue Type: Bug > Security Level: public(Regular issues) > Affects Versions: 2.1.5, 2.2, 3.0 > Reporter: Kevan Miller > Assignee: Shawn Jiang > Fix For: 2.1.5, 2.2.1, 3.0, Wish List > > Attachments: 4896.patch, 4896_21.patch, 4896_updated.patch, 4896_updated_21.patch, JavaAgent.jar, JvmOpts.java > > > To my knowledge, it is not possible to run a Geronimo command (e.g. deploy.sh deploy or gsh geronimo/stop-server) to a server with a secure JMX Connector (running SSL, without specifying the following Java system properties on the command line: > javax.net.ssl.keyStore and javax.net.ssl.keyStorePassword > For example: > {code} > export GERONIMO_HOME=~/target/geronimo-jetty6-javaee5-2.2-SNAPSHOT > export JAVA_OPTS="-Djavax.net.ssl.keyStore=$GERONIMO_HOME/var/security/keystores/geronimo-default -Djavax.net.ssl.keyStorePassword=secret -Djavax.net.ssl.trustStore=$GERONIMO_HOME/var/security/keystores/geronimo-default -Djavax.net.ssl.trustStorePassword=secret" > $GERONIMO_HOME/bin/deploy.sh -u system -p manager --secure list-modules --stopped > {code} > javax.net.ssl.keyStorePassword causes a problem, since this means the keyStorePassword is available, in-the-clear, to someone inspecting executing processes. For example while a deploy command was active, someone could run 'ps auxww | grep deployer.jar' and discover the keyStorePassword for the KeyStore. > Geronimo should provide a mechanism, whereby users can specify the keyStorePassword without making that secret available to anyone inspecting processes running on the current system. Ideally, the password could be encrypted/obfuscated within a file (just as passwords can be encrypted/obfuscated in var/config/config.xml). -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.