[ 
https://issues.apache.org/jira/browse/CXF-3895?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Daniel Kulp resolved CXF-3895.
------------------------------

       Resolution: Fixed
    Fix Version/s: 2.5.1
         Assignee: Daniel Kulp
    
> add support for Jetty's password obfuscation methods
> ----------------------------------------------------
>
>                 Key: CXF-3895
>                 URL: https://issues.apache.org/jira/browse/CXF-3895
>             Project: CXF
>          Issue Type: Improvement
>          Components: Configuration
>    Affects Versions: 2.4.2
>         Environment: Java 6
> Windows XP SP3
> CXF 2.4.2
>            Reporter: Michael Heß
>            Assignee: Daniel Kulp
>            Priority: Minor
>              Labels: configuration, cxf, jetty, keys, password, security
>             Fix For: 2.5.1
>
>
> For SSL connectors, the Jetty configuration allows definition of keystore and 
> truststore passwords in a obfuscated fashion. See 
> http://wiki.eclipse.org/Jetty/Howto/Secure_Passwords for details. Currently 
> this does not work when using the Spring based configuration for jetty, i.e. 
> using for example this
> <sec:keyStore type="JKS" password="OBF:1sot1v961saj1v9i1v941sar1v9g1sox" 
> file="conf/keystore" />
> will lead to an exception on startup, which is identical to those that come 
> up when an invalid keystore password is provided.
> My guess is, that the "OBF:" prefix is not detected by the configuration 
> hook, and therefore the provided password string is used as-is. (But I am 
> just guessing here...)

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira


Reply via email to