Well, it's the usual thing - you can have a system that's completely open
but gets cratered because some duffer clicked the wrong button. Or you can
have a system that's 100% secure, but nobody can use it because it's 100%
secure. Or you can have something that's "secure enough" to protect from
accidents and any but the most determined black hat, which is really what
I'm aiming for here.

Pete

Pid <p...@pidster.com> wrote on 05/17/2010 11:47:52 AM:

> On 17/05/2010 18:14, peter_f...@blm.gov wrote:
> > Pid <p...@pidster.com> wrote on 05/17/2010 10:55:06 AM:
> >
> >> On 17/05/2010 17:48, peter_f...@blm.gov wrote:
> >>> To clarify what I'm up to here - we have an in-house doc that
suggests
> >>> switching off autoDeploy and deployOnStartup on production systems,
and
> >>
> >> Does it explain why it makes this suggestion?
> >
> > To prevent someone accidentally (or otherwise, of course) deploying an
> > application in a production system simply by dropping in a WAR.
> >
> >>
> >>> I've been testing those recommendations on an experimental setup.
What
> > the
> >>> in-house doc forgets to say is what you've explained here (and which
> >>> answers my original question - thanks!) which is that you have to put
a
> >>> Context element into the server.xml to make it work.
> >>
> >> Which is explicity discouraged in current versions of Tomcat.
> >
> > Yes, but in a fixed production setting it makes sense. At least in that
> > setting you'd have to be able to edit server.xml, which is not
something
> > you're going to do by accident.
>
> With the right settings, you'd still need to restart the server, even if
> someone had managed to accidentally update the war files.
>
> Seems a little paranoid, but hey...
>
>
> p
>


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to