Well, I should say it was a weird way to fix it.

For example, if you don't have a DoS attack and you upgrade your Tomcat,
that would be a big surprise as it was to me.
Lucky me I have nice users that contacted me and told me some features of
my web app stopped working.
Moving to next minor release shoulnd't be a surprise even if it is bug fix
such you mentioned.
Default value should be higher and it should be clearly noted that you have
to lower it down to go to safe side regarding DoS attacks.

But then again, if you have an actual attack, you're forced to fix
something anyway, so setting the parameter to lower value (as default
should be set to higher values) would be the better fix than upgrading the
whole Tomcat, especially if you can expect major changes that could
surprise you as they did me few days ago.
Installing a new version is maybe not the best way to go while fixing
vulnerabilites under attack if easier option is available (lowering value
to be lower than default).
Default value of 10 would be appropriate for major release when you expect
major changes and you're prepared to additional work regarding upgrade.
But switching from one minor release to another shouldn't break existing
setup, it should only fix bugs.

BR,
Hrvoje Lončar

On Fri, Jun 20, 2025 at 1:02 PM Mark Thomas <ma...@apache.org> wrote:

> On 20/06/2025 11:54, Hrvoje Lončar wrote:
> > Thank you very much
> > Mark ThomasThat was the case :(
> > Absolutely weird to make such a major change in a minor release from
> > NN.MM.39 to NN.MM.42
>
> It was a response to a DoS security vulnerability.
>
> Feel free to add your views on what the defaults should be to the BZ
> discussion.
>
> Mark
>
>
> >
> >
> >
> > On Fri, Jun 20, 2025 at 10:01 AM Mark Thomas <ma...@apache.org> wrote:
> >
> >> On 20/06/2025 02:07, Hrvoje Lončar wrote:
> >>> Hi!
> >>>
> >>> Hope it's the right place to ask for help or/and advice.
> >>> Few days ago I switched to latest Tomcat 10.1.42.
> >>> After deyploy POST is not working due to missing CSRF token.
> >>> When I inspect HTTP request, CSRF token is in a payload as "_csrf" and
> >> the
> >>> value is correct.
> >>> But at the backend side I get
> >>>
> >>> * AccessDeniedException = Invalid CSRF Token 'null' was found on the
> >>> request parameter '_csrf' or header 'X-XSRF-TOKEN'.*
> >>>
> >>> Everything works fine with 10.1.39.
> >>> To be sure tried on 2 different Ubuntu servers - test and production
> >>> instance.
> >>>
> >>> Anyone else having the same problem?
> >>
> >> Maybe related to:
> >>
> >> https://bz.apache.org/bugzilla/show_bug.cgi?id=69710
> >>
> >> Try setting maxPartCount on the connector but be aware of DoS risks as
> >> the value gets higher.
> >>
> >> Mark
> >>
> >>
> >>>
> >>> Some technical info:
> >>> - Ubuntu 24.04.2 LTS
> >>> - nginx/1.27.5 to handle SSL certificate
> >>> - Apache Tomcat 10.1.39 and 10.1.42
> >>> - Java 21
> >>> - Spring Boot 3.5.0
> >>>
> >>> Thanks!
> >>>
> >>> BR,
> >>> Hrvoje
> >>
> >>
> >> ---------------------------------------------------------------------
> >> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> >> For additional commands, e-mail: users-h...@tomcat.apache.org
> >>
> >>
> >
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

-- 
*TheVegCat.com <https://thevegcat.com/>*
*VegCook.net <https://vegcook.net/>*
*horvoje.net <https://horvoje.net/>*

Reply via email to