On 13/08/2009 12:18, acastanheira2001 wrote:

Hi,

Can you tell me what response headers do I need to suppress in order to
improve security?

I'm sure it'll start a vigorous discussion if I say it, but IMHO there's not much of an improvement to security to be gained from hiding these headers.

Response headers example:

Server:      Apache-Coyote
x-powered-by:<My server information>

I think the above headers inform too much, so I will remove them.

See attribute "xpoweredBy"

 http://tomcat.apache.org/tomcat-6.0-doc/config/http.html

to turn it off.

Am I paranoid, or is it a good practice?

Paranoid. What level of security you really need and who has access to the website?

Depending on what your URLs look like (e.g. ".jsp"), it might be easy to eliminate a few types of server - and obfuscation doesn't tend to improve security more than it hides real security problems.

Tools like nmap can make guessing system info fairly trivial.

You're probably better off expending time on real security issues, like ensuring that form content (e.g. search fields) are properly sanitised before being redisplayed.


p

Thanks,
André



---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to