Hello Mark Then how do you manage the webserver certitficate in Tomcat? Where do you store the password? I would like to do it of course always without, but the architecture is like that I have.
Webserver certificate.p12 Webserver certificate.p12.pwd Password_today Password tomorrow Tomcat/conf/server.xml I would like to reference the pwd file in server.xml. You cannot enter the server and get to the directory until you do the sudo to its technical user. How can you do this? When you have an automated certificate approach running, renewing certificates which are in the range to renew. How to avoid setting ; in a password? This also causes or can cause issues. Thank you for your advice. More security is better, but it must be in the position to be handled easy. Every manual change I want to avoid. Thank you Alex -----Ursprüngliche Nachricht----- Von: Mark H. Wood <mw...@iupui.edu> Gesendet: Freitag, 20. Januar 2023 14:43 An: users@tomcat.apache.org Betreff: Re: AW: AW: Password in Tomcat 9.x On Thu, Jan 19, 2023 at 07:33:04PM +0100, a.grub...@bluewin.ch wrote: > I asked Thomas as well, if he knows if this could be solved with placing the > path to the file - in my opinion, this is a easy, safe possiblitiy to > allocate any certs. That would be very helpful to have such tomcat. I think there has been something missing in this discussion. Several people have advised removing the password from the credentials file. This is not just giving up and trading security for practicality. Storing a cleartext password on the same system with the password-protected object is equivalent to having no password, because anyone who can get the protected object can get the password from the same place. The only way that encrypting the container can increase security is to provide the password from outside the system whenever it is needed -- e.g. have an operator type it in. The purpose of encrypting the container seems to be to protect it *in transit from one system to another*, after which a human will decrypt it for use. So: it is unlikely that anyone will do more work on the code for no more benefit. When I think about it, this is just another layer of the reason that these credentials containers *can* be encrypted: such a file contains all of the materials which are needed to evade security, so there must be an external source of control to protect the contents: something which is not part of the materials and can be kept separate from them, carried by different means. -- Mark H. Wood Lead Technology Analyst University Library Indiana University - Purdue University Indianapolis 755 W. Michigan Street Indianapolis, IN 46202 317-274-0749 www.ulib.iupui.edu
openpgp-digital-signature.asc
Description: PGP signature