[GitHub] [tomcat] michael-o commented on a change in pull request #444: Delegate check for preemptive authentication from AuthenticatorBase to affected Authenticators
michael-o commented on a change in pull request #444: URL: https://github.com/apache/tomcat/pull/444#discussion_r686570618 ## File path: java/org/apache/catalina/authenticator/SSLAuthenticator.java ## @@ -104,7 +104,7 @@ protected String getAuthMethod() { } @Override -protected boolean isPreemptiveAuthRequest(Request request) { +protected boolean isPreemptiveAuthPossible(Request request) { Review comment: I wonder whether TLS allows preemptive auth at all. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
Re: openssl-3.0.0 test failures with 9.0.x (I have not checked the other branches)
On 10/08/2021 14:02, jean-frederic clere wrote: Hi, I have the following failure with ant test: [concat] TEST-org.apache.tomcat.util.net.TestSSLHostConfigCompat.APR.txt [concat] TEST-org.apache.tomcat.util.net.TestSSLHostConfigCompat.NIO.txt [concat] TEST-org.apache.tomcat.util.net.TestSSLHostConfigCompat.NIO2.txt [concat] TEST-org.apache.tomcat.util.net.openssl.ciphers.TestCipher.APR.txt [concat] TEST-org.apache.tomcat.util.net.openssl.ciphers.TestCipher.NIO.txt [concat] TEST-org.apache.tomcat.util.net.openssl.ciphers.TestCipher.NIO2.txt [concat] TEST-org.apache.tomcat.util.net.openssl.ciphers.TestOpenSSLCipherConfigurationParser.APR.txt [concat] TEST-org.apache.tomcat.util.net.openssl.ciphers.TestOpenSSLCipherConfigurationParser.NIO.txt [concat] TEST-org.apache.tomcat.util.net.openssl.ciphers.TestOpenSSLCipherConfigurationParser.NIO2.txt The ciphers ones are not new for me on fedora, the TestSSLHostConfigCompat ones look new, is anyone seeing those? I was trying with openssl/"master". For the TestSSLHostConfigCompat it is due to a patch I was planning to commit later. So forget those ones. -- Cheers Jean-Frederic - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[GitHub] [tomcat-jakartaee-migration] abdulmuqsith opened a new issue #23: Vulnerability with Apache Commons Compress v1.20
abdulmuqsith opened a new issue #23: URL: https://github.com/apache/tomcat-jakartaee-migration/issues/23 The Apache Commons Compress v1.20 library included in this library has following CVEs associated: | Identifier | Published | Overall Score -- | -- | -- | -- | NVD CVE-2021-35516 (BDSA-2021-2075) | Jul 13, 2021 | 7.5 High | NVD CVE-2021-35517 (BDSA-2021-2078) | Jul 13, 2021 | 7.5 High | NVD CVE-2021-36090 (BDSA-2021-2073) | Jul 13, 2021 | 7.5 High | NVD CVE-2021-35515 (BDSA-2021-2076) | Jul 13, 2021 | 7.5 High -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
Re: [VOTE] Release Apache Tomcat 8.5.70
пн, 9 авг. 2021 г. в 23:05, Mark Thomas : > > The proposed Apache Tomcat 8.5.70 release is now available for voting. > > Chris was having some difficulties before the weekend getting the > release to build. He hasn't had time to get to the bottom of these > issues and time is ticking on so I took a look. I had different issues > on Windows but was still unable to complete the release. With the > addition of JSign, we have the option to build a full release on Linux > so I tried that and it was successful. If successful, this will be the > first release for a very long time built on Linux. > > Given the above, additional scrutiny on the release artefacts targetted > at Windows would be welcome. > > The notable changes compared to the 8.5.69 release are: > > - Correct a regression in the previous release in the HTTP/2 flow >control window management along with additional improvements to HTTP/2 >flow control > > - Make the CorsFilter simpler to extend > > - To avoid unnecessary cache revalidation, do not add an HTTP Expires >header when setting adding an HTTP header of CacheControl: private > > Along with lots of other bug fixes and improvements. > > For full details, see the changelog: > https://ci.apache.org/projects/tomcat/tomcat-8.5.x/docs/changelog.html > > It can be obtained from: > https://dist.apache.org/repos/dist/dev/tomcat/tomcat-8/v8.5.70/ > > The Maven staging repo is: > https://repository.apache.org/content/repositories/orgapachetomcat-1329/ > > The tag is: > https://github.com/apache/tomcat/tree/8.5.70 > 3d2e8b1964d4dff3c0656618edc0b09d0d5634b8 > > The proposed 8.5.70 release is: > [ ] Broken - do not release > [x] Stable - go ahead and release as 8.5.70 Tested on Windows 10. - Smoke testing OK (with 32-bit Java 7u80 from Oracle) - Unit tests OK (32-bit Java 7u80 from Oracle, 64-bit Java 8u292 from AdoptOpenJDK, Java 11.0.12 from Eclipse Temurin - former AdoptOpenJDK, Java 16.0.2 from OpenJDK). Best regards, Konstantin Kolinko - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[GitHub] [tomcat-jakartaee-migration] ebourg commented on issue #23: Vulnerability with Apache Commons Compress v1.20
ebourg commented on issue #23: URL: https://github.com/apache/tomcat-jakartaee-migration/issues/23#issuecomment-897000783 Only CVE-2021-36090 is relevant here, we only use the zip archive implementation of Commons Compress. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[GitHub] [tomcat] rrodewald commented on a change in pull request #444: Delegate check for preemptive authentication from AuthenticatorBase to affected Authenticators
rrodewald commented on a change in pull request #444: URL: https://github.com/apache/tomcat/pull/444#discussion_r687058556 ## File path: java/org/apache/catalina/authenticator/SSLAuthenticator.java ## @@ -104,7 +104,7 @@ protected String getAuthMethod() { } @Override -protected boolean isPreemptiveAuthRequest(Request request) { +protected boolean isPreemptiveAuthPossible(Request request) { Review comment: I'm not sure either. Browsers definitely want a challenge first. I just tried to mimic the current behaviour as close as possible - the code is unchanged from what was in `AuthenticatorBase` before. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[GitHub] [tomcat-jakartaee-migration] markt-asf commented on issue #23: Vulnerability with Apache Commons Compress v1.20
markt-asf commented on issue #23: URL: https://github.com/apache/tomcat-jakartaee-migration/issues/23#issuecomment-897054343 Relevant how? How does an attacker exploit this? -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[GitHub] [tomcat] michael-o commented on a change in pull request #444: Delegate check for preemptive authentication from AuthenticatorBase to affected Authenticators
michael-o commented on a change in pull request #444: URL: https://github.com/apache/tomcat/pull/444#discussion_r687092579 ## File path: java/org/apache/catalina/authenticator/SSLAuthenticator.java ## @@ -104,7 +104,7 @@ protected String getAuthMethod() { } @Override -protected boolean isPreemptiveAuthRequest(Request request) { +protected boolean isPreemptiveAuthPossible(Request request) { Review comment: I have just read RFC 5246 and RFC 8466 and there is no single definition of a preemptive Client Cert auth. So the server has to send `CertificateRequest` first. Since HTTP authz checks come after TLS, I fail to understand the previous code. Maybe @markt-asf can enlighted us. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[GitHub] [tomcat-jakartaee-migration] ebourg commented on issue #23: Vulnerability with Apache Commons Compress v1.20
ebourg commented on issue #23: URL: https://github.com/apache/tomcat-jakartaee-migration/issues/23#issuecomment-897111748 Very vaguely relevant, the tool would have to be used on an untrusted war, but that's not really the use case intended. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org
[GitHub] [tomcat-jakartaee-migration] abdulmuqsith commented on issue #23: Vulnerability with Apache Commons Compress v1.20
abdulmuqsith commented on issue #23: URL: https://github.com/apache/tomcat-jakartaee-migration/issues/23#issuecomment-897316898 Vulnerability scanning tools are reporting Tomcat as vulnerable even though this CVE is very unlikely to be exploited. Any plans to upgrade Commons Compress? -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org - To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org