tomcat-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Christopher Schultz <>
Subject Re: [OT] clear text keystore password in server.xml
Date Thu, 02 Sep 2010 16:31:00 GMT
Hash: SHA1


On 9/2/2010 11:51 AM, Pid wrote:
>> On 9/2/2010 11:28 AM, Christopher Schultz wrote:
>>> 1. Use a password entered on the console during start-up (the "Apache
>>>     httpd strategy")
> makes this easy in Java 6, but...

Right: before Java 6, you'd have to enter the password clear-text on the
console. :(

>>> All other strategies simply move the problem to some other component.
>>> Protecting one password requires another password which requires
>>> protecting which ... you get the idea.
> ..lots of info is available by JMX, once the server is up.  In Java 6
> you can attach to the process locally, without having to configure the
> JMX ports because it injects the management agent into the virtual machine.

I hadn't considered that, never having used JMX. Are you saying that
anyone with local access can snoop a JVM? What are the strategies
available to prohibit that? Can you disable local JMX altogether? How
about some kind of authentication?

> Worse, if they're already on your server they've probably got a much
> bigger surface area to attack, than just Tomcat.  And if they get root,
> it's all over.


- -chris
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla -


To unsubscribe, e-mail:
For additional commands, e-mail:

View raw message