-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Esmond,

On 4/10/13 8:21 PM, Esmond Pitt wrote:
> We had lots of these and finally an attack last year on a Tomcat
> where the manager password somehow hadn't been changed.

Note that the manager webapp has no default passwords, so I wonder
what you mean when you say it "hadn't been changed". There are
examples in conf/tomcat-users.xml but they are all commented-out.

You would have had to intentionally enable the "default" password.

> The attacker installed a viral servlet application that killed the
> server completely, we had to rebuild it.

I -- like most people I would guess -- don't run under a
SecurityManager, but doing so can significantly limit the damage that
a rogue webapp can do.

> We:
> 
> - Hid the Tomcat behind an Apache HTTPD on port 80.

Did you also remove manager webapp access through httpd? Otherwise,
this doesn't actually do anything to help.

> - Closed port 8080, indeed removed all the HTTP Connectors from
> Tomcat and just used AJP connectors running on 127.0.0.1/2/3/4/...,
> all on the same port for simplicity, so there is no zero direct
> access to Tomcat from the outside

+1, though I would run Apache httpd and Tomcat on different hosts, so
localhost-binding is not possible unless you are doing something like
stunnel (which also might be a good idea if you are traversing an
untrusted network).

> - Configured Apache HTTPD for LDAP authentication via an OpenLDAP
> server that in turn is configured via the Password Policy overlay
> for finite (5 I think) password retries before locking out the
> account

+2 -- both good ideas: central access control (LDAP) and enabling
lockout mechanism. Note that Tomcat's lockout mechanism is fairly
primitive and easy to game.

> - required a very restricted LDAP group membership for access to
> /manager (and the other Tomcat builtins).

+1 hooray for role-based permissions!

> No recurrence, not even an attempt. I think actually closing port
> 8080 may have played the biggest part in all this.

Would you be willing to review the Tomcat documentation on "securing
Tomcat" and make a few comments? It could always use some additional tips:

http://tomcat.apache.org/tomcat-7.0-doc/security-howto.html
http://wiki.apache.org/tomcat/FAQ/Security

You can sign-up for the wiki yourself and make any changes you want.
If you want to modify the "official" documentation, create a Bugzilla
enhancement request and (please!) include a patch. I'm sure it will go
right in.

Thanks,
- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=3s6Q
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to