-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Te,

On 10/5/12 1:51 PM, Te Li wrote:
> I am not familiar with JIoEndpoint discussed in 
> https://issues.apache.org/bugzilla/show_bug.cgi?id=53139.
> 
> The issue I'm facing is something different. Apparently, some
> effort was made to hide the DB password, but the DB password is
> still exposed via another getter (getDbProperties()). This seems to
> be a bug to me.
> 
> DB passwords are highly sensitive information. JMX admins shouldn't
> see those either. It's not a reasonable assumption that it's okay
> for JMX admins to see exposed DB passwords (which should never be
> exposed in plaintext or encrypted form). Those who work in a
> company would probably concur with this point.

I think most of us work at companies, and I happen to disagree with you.

Tomcat passwords -- at least those in server.xml -- are in plain-text
form. All requests to obfuscate them have been denied because it is
simply not possible to properly secure them: the key always must be
available to the administrator in order to read the obfuscated
password and therefore any steps to "secure" the password are a charade.

There is a wealth of knowledge available via JMX, and it should only
be exposed to administrators. Any JMX-enabled administrator will be
able to deploy an arbitrary webapp to go and fetch the data you are
trying to hide. You are wasting your time.

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/

iEYEARECAAYFAlBvTR0ACgkQ9CaO5/Lv0PC+PACgrXslv6H5QX1f8aMmMjN+0iJn
hTAAnidDEXQWEk8HyPtWbTF36OVTQHoL
=8RVk
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to