Return-Path: Delivered-To: apmail-tomcat-dev-archive@www.apache.org Received: (qmail 16224 invoked from network); 25 Oct 2005 17:04:54 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur.apache.org with SMTP; 25 Oct 2005 17:04:54 -0000 Received: (qmail 84162 invoked by uid 500); 25 Oct 2005 17:04:39 -0000 Delivered-To: apmail-tomcat-dev-archive@tomcat.apache.org Received: (qmail 84109 invoked by uid 500); 25 Oct 2005 17:04:38 -0000 Mailing-List: contact dev-help@tomcat.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Tomcat Developers List" Delivered-To: mailing list dev@tomcat.apache.org Received: (qmail 84098 invoked by uid 99); 25 Oct 2005 17:04:38 -0000 Received: from asf.osuosl.org (HELO asf.osuosl.org) (140.211.166.49) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 25 Oct 2005 10:04:38 -0700 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests= X-Spam-Check-By: apache.org Received-SPF: neutral (asf.osuosl.org: local policy) Received: from [209.0.86.83] (HELO tango.wilshire.com) (209.0.86.83) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 25 Oct 2005 10:04:36 -0700 Received: from sneezy.wilshire.com (sneezy.wilshire.com [192.168.14.22]) by tango.wilshire.com (8.13.4/8.12.3/Debian-6.6) with ESMTP id j9PH4398008478 for ; Tue, 25 Oct 2005 10:04:04 -0700 Received: from bbarkerxp (foundry.wilshire.com [192.168.1.129]) by sneezy.wilshire.com (8.12.9/8.12.3) with SMTP id j9PGxBn6003972 for ; Tue, 25 Oct 2005 09:59:11 -0700 (PDT) Message-ID: <003a01c5d986$19f9e620$7037a8c0@nt.wilshire.com> From: "Bill Barker" To: "Tomcat Developers List" References: <435D4970.9070601@rowe-clan.net> <00e201c5d8e3$959c6e40$7037a8c0@nt.wilshire.com> <96e4b5230510241511p58422cc5n3d32a8550f741271@mail.gmail.com> <435D822E.3060301@rowe-clan.net> <96e4b5230510241831i5c8d252ek4b5d0f92827da0a2@mail.gmail.com> <6291fc850510242321h3fca5e1am@mail.gmail.com> <96e4b5230510250815g58f0530dh24d63d013335b11@mail.gmail.com> <435E574E.9080502@rowe-clan.net> Subject: Re: Status/Authority of AJP/1.5 Date: Tue, 25 Oct 2005 10:04:02 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2800.1106 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106 X-Zantaz-Archived: tango Content-Disposition: inline X-Scanned-By: MIMEDefang 2.52 on 192.168.1.83 X-Virus-Checked: Checked by ClamAV on apache.org X-Spam-Rating: minotaur.apache.org 1.6.2 0/1000/N ----- Original Message ----- From: "William A. Rowe, Jr." To: "Tomcat Developers List" Cc: Sent: Tuesday, October 25, 2005 9:03 AM Subject: Re: Status/Authority of AJP/1.5 > Costin Manolache wrote: > > > > Security ( i.e. authentication ) might be the only reason to extend > > AJP - but even this can be done on top of the existing protocol, using > > a custom header and connection initiation. > > Only partly true. Let's take the HTTPS state, for example... if tomcat looks > for X-PROTOCOL=HTTPS, for example, passing this from the proxy as a typical > header is simply wrong for security reasons. It's too trivial to fake, and > it's too expensive to guard against. > > The safe way is to have two header-types, one, a client HTTP-type header. The > other, proxy metadata such as the protocol, SSL keys and other server variables. > These wouldn't be relayed as HTTP-style headers, so therefore all sorts of proxy > to backend data can be trusted. > Urm, all of this is already part of the AJP/1.3 protocol, and now that BZ #36883 is fixed, is working well in mod_proxy_ajp. The main limitation with the current protocol here is that AJP/1.3 only sends actual client-cert instead of the entire chain. One idea would be to expose the SSL data via a callback Msg, so that Servlets that aren't going to look at it don't have to waste time asking mod_ssl for the data. But it's probably not that big of a deal. > (FYI - w.r.t. the client/server certs, I don't suggest a full blown mod_ssl > type of decomposition. If they want to tear apart the certificates, it sure > makes sense to introspect them through jsse, no?) > > Bill > > --------------------------------------------------------------------- > To unsubscribe, e-mail: dev-unsubscribe@tomcat.apache.org > For additional commands, e-mail: dev-help@tomcat.apache.org > > This message is intended only for the use of the person(s) listed above as the intended recipient(s), and may contain information that is PRIVILEGED and CONFIDENTIAL. If you are not an intended recipient, you may not read, copy, or distribute this message or any attachment. If you received this communication in error, please notify us immediately by e-mail and then delete all copies of this message and any attachments. In addition you should be aware that ordinary (unencrypted) e-mail sent through the Internet is not secure. Do not send confidential or sensitive information, such as social security numbers, account numbers, personal identification numbers and passwords, to us via ordinary (unencrypted) e-mail. --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscribe@tomcat.apache.org For additional commands, e-mail: dev-help@tomcat.apache.org