The Artima Developer Community
Sponsored Link

Java Buzz Forum
Securing Pebble #3 : Use the Java 2 security model

0 replies on 1 page.

Welcome Guest
  Sign In

Go back to the topic listing  Back to Topic List Click to reply to this topic  Reply to this Topic Click to search messages in this forum  Search Forum Click for a threaded view of the topic  Threaded View   
Previous Topic   Next Topic
Flat View: This topic has 0 replies on 1 page
Simon Brown

Posts: 636
Nickname: simonbrown
Registered: Jun, 2003

Simon Brown is a Java developer, architect and author.
Securing Pebble #3 : Use the Java 2 security model Posted: Sep 2, 2004 5:14 AM
Reply to this message Reply

This post originated from an RSS feed registered with Java Buzz by Simon Brown.
Original Post: Securing Pebble #3 : Use the Java 2 security model
Feed Title: Simon Brown's weblog
Feed URL: http://www.simongbrown.com/blog/feed.xml?flavor=rss20&category=java
Feed Description: My thoughts on Java, software development and technology.
Latest Java Buzz Posts
Latest Java Buzz Posts by Simon Brown
Latest Posts From Simon Brown's weblog

Advertisement

So, while disabling JSP compilation and not running as root won't ensure that you have a secure webapp, using the Java 2 security model will help to secure it up from many types of attacks. By default, servers like Tomcat are started up in an insecure mode with a default security manager that allows pretty much anything. Ever tried running a System.exit(0) from a JSP? Try it! Of course this isn't the only problem - you could be able to read/write files, execute shell commands and install untrusted code.

To solve these problems, you can start up your web/app server with a security policy that explicitly states what can be done. With Tomcat, starting it up with the -security flag with install the security manager based upon the permissions granted in the $TOMCAT_HOME/conf/catalina.policy file. Speaking of Tomcat, there's a really useful security guide that describes this in more detail. I can pull apart the policy file I have and post exactly what is needed for Pebble (I have other apps in there too) if that's useful.

Read: Securing Pebble #3 : Use the Java 2 security model

Topic: Top Reasons Why People Think Java Un-Cool - Debunked Previous Topic   Next Topic Topic: Some PATROL Express News

Sponsored Links



Google
  Web Artima.com   

Copyright © 1996-2019 Artima, Inc. All Rights Reserved. - Privacy Policy - Terms of Use