[ https://issues.apache.org/jira/browse/CXF-3895?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Daniel Kulp resolved CXF-3895. ------------------------------ Resolution: Fixed Fix Version/s: 2.5.1 Assignee: Daniel Kulp > add support for Jetty's password obfuscation methods > ---------------------------------------------------- > > Key: CXF-3895 > URL: https://issues.apache.org/jira/browse/CXF-3895 > Project: CXF > Issue Type: Improvement > Components: Configuration > Affects Versions: 2.4.2 > Environment: Java 6 > Windows XP SP3 > CXF 2.4.2 > Reporter: Michael Heß > Assignee: Daniel Kulp > Priority: Minor > Labels: configuration, cxf, jetty, keys, password, security > Fix For: 2.5.1 > > > For SSL connectors, the Jetty configuration allows definition of keystore and > truststore passwords in a obfuscated fashion. See > http://wiki.eclipse.org/Jetty/Howto/Secure_Passwords for details. Currently > this does not work when using the Spring based configuration for jetty, i.e. > using for example this > <sec:keyStore type="JKS" password="OBF:1sot1v961saj1v9i1v941sar1v9g1sox" > file="conf/keystore" /> > will lead to an exception on startup, which is identical to those that come > up when an invalid keystore password is provided. > My guess is, that the "OBF:" prefix is not detected by the configuration > hook, and therefore the provided password string is used as-is. (But I am > just guessing here...) -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa For more information on JIRA, see: http://www.atlassian.com/software/jira