DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=12968>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=12968

[Possible security hole?] package.access security in Catalina/CatalinaService





------- Additional Comments From [EMAIL PROTECTED]  2002-09-26 02:50 -------
Vetting applications for security vulnerabilities is important.
I applaud efforts to do so, the more eyes reviewing _and_ testing
code for vulnerabilities the better.

What I dislike are your methods.  You speculate that there may be a security
hole and post it as a critical bug.  Without doing any testing to verify
that your assumptions are correct.

I then responded to your bug report with example code which disproves
your speculation that a security bug exists.

The reason I took the tone I did is because security _is_ important.
When a security announcement is made regarding Tomcat it ends up
in CERT advisory's and on bugtraq. 

Your second post now speculates on a different possible security bug
related to class loading and package access.  Once again without writing
any code to test whether your assumptions are correct before posting.

Yes, org.apache.catalina.* classes get loaded by the server class loader.
(Except for those dozen or so in bootstrap.jar)  But all ClassLoaders
in the delegation path for a web application implement checkPackageAccess()
and checkPackageDefinition().  So the packages restricted by the
package.access and package.defnition properties will be honored by all
of the possible class loaders which can be delegated to.  Including
the ClassLoader for the class path and the system classloader. Those checks
will fail if _any_ classes on the java stack since the last doPrivileged()
call have not been granted the appropriate permission.

The test I posted proved that org.apache.catalina.* is equivalent to
org.apache.catalina for the purposes of package access restrictions.

Here is a good overview of how the Java SecurityManager works within Tomcat:

http://kinetic.more.net/web/javaserver/security.shtml

Please send any followup discussion about clasloading or the Java
SecurityManager to the tomcat-dev or tomcat-uesr lists.  

This bug report is closed.

--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to