On Mon, Feb 25, 2013 at 2:42 PM, Caldarale, Charles R <
chuck.caldar...@unisys.com> wrote:

> > From: Leo Donahue - RDSA IT [mailto:leodona...@mail.maricopa.gov]
> > Subject: RE: JAVA_OPTS catalina.bat vs tomcat7w.exe
>
> > -Dcom.sun.management.jmxremote=true
> > -Dcom.sun.management.jmxremote.port=9090
> > -Dcom.sun.management.jmxremote.ssl=false
> > -Dcom.sun.management.jmxremote.authenticate=false
>
> Since you have JMX enabled without authentication, the server is open to
> abuse from pretty much anyone who can reach it.
>
>
Chuck, I have similar settings, and so far, so good (no abuse/attack), and
I recently re-added jmx settings in tomcat7w.exe for my app...just to
routinely check performance and/or memory-used by the app, while running on
production server.

can you please clarify 'the server is open to abuse from pretty much anyone
who can reach it'? can you refer to me a blog or an article that discusses
app abuse via jmx? i have hardware firewall in place and the jmx port is
not open/available at the hardware firewall level. I usually login remotely
to production server, and open Java visual VM to check status of the app
(via JMX).


 - Chuck
>
>
> THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY
> MATERIAL and is thus for use only by the intended recipient. If you
> received this in error, please contact the sender and delete the e-mail and
> its attachments from all computers.
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

Reply via email to