> From: Milanez, Marcus [mailto:[EMAIL PROTECTED]
> On the other hand, is it right to stay behind a
> possible security fault (malicious super user performing
> login) in order to say I'll not correct known security issues
> in my application?

There's a lovely discussion on exactly this topic in Howard and LeBlanc, 
"Writing Secure Code".  The conclusion is that you don't need to make this 
bombproof, but you do need to ensure it's not the weakest link in the security 
chain.  A relatively simple approach, such as obfuscating the password, would 
probably defeat the typical script kiddie who grabs a kit to exploit a 
vulnerability on the server and manages to get in as root.  It wouldn't defeat 
a determined cracker.  It probably *would* defeat the disgruntled sysadmin who 
decides to leave the company with some secrets and sell them / break the 
systems - and remember that "inside jobs" like that are a significant fraction 
of all security breaches.

I'd ask broader questions: What is the organisation's security policy?  What 
threat analysis has been done on the application?  Is this the weakest link / 
does it not meet policy?  If so, how much stronger does it need to be in order 
to be "sufficiently good" to meet the organisation's security policy?

                - Peter

---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to