Hello,

In my playing around with security, I've been attempting to break-out
the AllPermission for the $(catalina.home}/server classes into 
something more granular to allow more refined tweaking.  Here's what I 
have so far:

grant codeBase "file:${catalina.home}/server/-" {
    permission java.lang.RuntimePermission "*";
    permission java.io.FilePermission "<<ALL FILES>>",
"read,write,delete";
    permission java.util.PropertyPermission "*", "read,write";
    permission java.security.SecurityPermission "*";
    permission java.net.SocketPermission "*:0-",
"accept,connect,listen,resolve";
    permission java.net.NetPermission "*";
    permission java.io.SerializablePermission "*";
    permission org.apache.naming.JndiPermission "*";
};

I've already removed the execute from the FilePermission and I've
left out the reflection permission since that's a really really ugly
one.  Some of the above are probably way too broad... but certainly
no broader than AllPermission.  I decided to start from the other
end of the spectrum and work backwards.  With the above, I can still
run my own stuff and the tester stuff.

Incidentally, the tester webapp fails to initialize when the security
manager is enabled.  Since it uses PropertyEditorManager in one of
its files, it requires PropertyPermission "*", "read,write" in order
to run.  I'm still trying to figure out how to enabled this just for
the tester app (I have it working if I stick it in the general grant
section).  The docs in catalina.policy don't seem to be helping much.
The other curious thing about this particular error is that it doesn't
show up as an access failure when using the debugging built into the
security manager.

-Paul

--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to