-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Dave,

On 3/4/20 05:45, Dave Ford wrote:
> On Wed, 2020-03-04 at 10:24 +0100, Jürgen Göres wrote:
>>
>> If it is, what is the recommended mitigation? We consider using
>> the "secret" feature (the filtering by request attributes is
>> infeasible for us), but that would be a bit of effort and we are
>> in a hurry.
>>
>
> We're in the same position as you.  External web servers talking
> to Tomcat servers on other boxes via AJP.

Are those connections properly secured?

> We've looked at a few options, none of which seemed great:
>
> * The current stable version of Apache doesn't support the
> 'secret' attribute for AJP connectors in mod_proxy.
>
> * Valves can be used to secure Tomcat from listening to certain
> IPs Hostnames or subnets/vlans.  But....
>
> * The RemoteCIDRValve affects every protocol/port. * The
> RemoteHostValve and RemoteAddrValve only allow a single allow or
> deny rule, which needs a regexp to match every required
> combinations of port and address/names for the whole of the desired
> context.
>
> In ours case, we'd want to permit a different set of hosts on AJP
> to those who can read the manager app, for instance.  As this is
> being managed by puppet at our end, we decided the required regexp
> would be too complex and breakable and are probably going to
> isolate the AJP traffic using a firewall rule via iptables instead
> of relying on any intrinsic Tomcat feature.

If your connections are properly-secured, simply set
secretRequired="false" and move on. If they aren't properly-secured,
then you need to fix that (and you had to fix that before this recent
announcement).

- -chris
-----BEGIN PGP SIGNATURE-----
Comment: Using GnuPG with Thunderbird - https://www.enigmail.net/
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=fNQ0
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to