This helps a lot.  I am not worried about hackers getting into our system so
much as programmers reading the XML file and getting a privileged password.
Not a big deal, we can just captivate the account and keep "immoral"
programmers out.

Thanks!


On 4/17/06, Mark Thomas <[EMAIL PROTECTED]> wrote:
>
> Marc Farrow wrote:
> > I learned how to do this last week and I am enjoying the ease of setup
> in
> > order to accomplish this.  However, I would like to expand on this a bit
> > further and use the SHA encrypting with my database password (the one
> used
> > in Tomcat's connection pooling).  Is this possible?  If so, can someone
> lead
> > me in the right direction?
>
> It isn't possible. This comes up a lot so I will try and explain why.
>
> Starting with the Tomcat users example where you can use hashed passwords:
> - Tomcat stores the hashed password
> - User enters protected area of website
> - Tomcat prompts for password
> - User enters it
> - Tomcat hashes entered password and compares to stored hash
>
> In this scenario, if someone obtains the hashed password it is
> relatively little use on its own since it is difficult to go from
> hashed password to plain text password.
>
> Moving on to the database password case:
> - Tomcat connects to database
> - Database prompts for password
> - Tomcat reads password from config
> - Tomcat provides password to database
> - Database allows Tomcat access
>
> In this second case Tomcat is the client rather than the server and
> therefore needs the plain-text password in order to pass it to the
> database.
>
> Hashing the password doesn't help since Tomcat must use the actual
> password to access the database.
>
> Encrypting doesn't help either, since Tomcat would have to decrypt it
> to use it, which means the decryption key must be accessible to
> Tomcat. If the decryption key is accessible to Tomcat then it will be
> accessible to whoever has access to the encrypted password too.
> Therefore the encryption would be pointless.
>
> Which brings me on to a much more important point. *If someone has got
> enough access to your server to read server.xml and/or
> tomcat-users.xml you have much bigger problems*. Your server is
> totally compromised at this point. An attacker could do pretty much
> whatever they wanted. With this level of control over a server there
> are more options for an attacker than I have time to list here.
> Suffice to say, encrypting the users passwords isn't going to help at all.
>
> Hope this helps,
>
> Mark
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>


--
Marc Farrow

Reply via email to