"James Ellis" <[EMAIL PROTECTED]> wrote in message 
news:[EMAIL PROTECTED]

>Inline:
>
>> Date: Sun, 2 Mar 2008 18:16:24 +0100
>> From: [EMAIL PROTECTED]
>> To: users@tomcat.apache.org
>> Subject: Re: mod_jk or mod_proxy_ajp - encryption benefits?
>>
>> James Ellis schrieb:
>> > I know that mod_jk is the battle tested connector between Apache and
>> > Tomcat, but as I understand it the SSL connection generally
>> > terminates at the Apache web server and the traffic between Apache
>> > and Tomcat (to the AJP connector) is unencrypted.  Two questions:
>> >
>> > 1) Does mod_proxy_ajp provide for any encryption between the web
>> > server and the app server (Tomcat) that mod_jk does not?
>>
>> No, the AJP13 protocol does not support encryption. Both connectors use
>> the same protocol. If you need to use encrypted traffic with AJP13, you
>> could tunnel through an encrypted channel.
>
>
>Is this the common practice then when communicating from the web server to 
>the application server?

It is relatively uncommon (hence why encryption has taken so long to be 
added to AJP/1.3).  However, sites that have to communicate over a WAN do 
often use SSH tunneling or similar.

>
>If not, it seems like an awfully big security hole, since the DMZ is 
>supposed be only "partly" safe.  If someone were to >crack into the DMZ and 
>could sniff network traffic, then they could in theory listen in to traffic 
>and grab all of it in an >unencrypted state (which may include credit card 
>information, usernames, passwords etc).
>

For most sites, if someone were to crack into the DMZ, they would probably 
be more interested in querying your DB server for the credit card 
information, usernames, passwords, etc :).  In other words, you would have 
many much bigger problems to worry about than someone sniffing AJP/1.3 
traffic.  And this is why it is relatively rare to use tunneling with 
AJP/1.3.  Your resources are usually better spent securing your DMZ.

>
>
>
>>
>>  > 2) If the
>> > answer to number 1 above is "NO".  Is it possible to keep the server
>> > certificates on the app servers and so that the connection from the
>> > client to the app server is encrypted all the way through?  In this
>> > case the apache web server would simply function as a load
>> > balancer/failover solution.
>>
>> Again no. We are talking about a reverse proxy situation and as far as I
>> know, you can't reverse proxy https without having an ssl endpoint on
>> the apache httpd.
>>
>> For a normal (forward) proxy, httpd supports connect, but I don't know
>> how well this works in the real world.
>>
>> You could also ask on the httpd users list, maybe they know better.
>>
>> > Thanks, Jim
>>
>> Regards,
>>
>> Rainer
>>
>>
>> ---------------------------------------------------------------------
> To start a new topic, e-mail: users@tomcat.apache.org
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>




---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to