https://bz.apache.org/bugzilla/show_bug.cgi?id=65736

--- Comment #3 from Christopher Schultz <ch...@christopherschultz.net> ---
Honestly, any "feature" that significantly reduces security should be difficult
to enable. My initial reaction after reading that piece was "why is forceString
enabled by default?"

I don't know the history of that feature, so I'm not sure how popular it is or
what the use-cases are. My guess is that, mostly, there are simple uses of JNDI
in Tomcat. For more "exotic" use-cases, it shouldn't be too much trouble for an
admin to enable this feature explicitly.

It's also not clear to me how much *more* secure things are /without/
"forceString" available. JNDI lookups are, by definition, fairly sensitive
things: if you allow users to control the lookups, they can kind of ... well,
look-up ANYTHING.

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to