Problem getting logging from TldScanner

2024-08-05 Thread ESI
Moin,
I wanted to check the TLD scanner and placed*

org.apache.jasper.servlet.TldScanner.level = FINE

in logging.properties, but under Tomcat 10.1.25 and Tomcat 9.0.91 I get only

05-Aug-2024 10:43:29.958 INFO [main] 
org.apache.jasper.servlet.TldScanner.scanJars At least one JAR was scanned for 
TLDs yet contained no TLDs. Enable debug logging for this logger for a complete 
list of JARs that were scanned but no TLDs were found in them. Skipping 
unneeded JARs during scanning can improve startup time and JSP compilation time.

Uncommenting the line

org.apache.catalina.util.LifecycleBase.level = FINE

in logging.properties works as expected (to check, if I really looked at the 
correct files).

On Tomcat 9.0.83 I got

Aug 05, 2024 11:44:43 AM org.apache.jasper.servlet.TldScanner scanResourcePaths
FINE: No TLD files were found in resource path [/WEB-INF/].

as expected.

I could not find any open bugs for TldScanner or logging that would explain 
this behavior. Did I miss something? Could someone verify this?

Java versions:
11.0.21 for Tomcat 9
17..0.11 for Tomcat 10

Thanks,
   Andreas

* Yes, I tried FINE, FINEST and ALL...


This message and any attachments are intended only for the use of the addressee 
and may contain information that is privileged and confidential. If the reader 
of the message is not the intended recipient or an authorized representative of 
the intended recipient, you are hereby notified that any dissemination of this 
communication is strictly prohibited. If you have received this communication 
in error, notify the sender immediately by return email and delete the message 
and any attachments from your system.

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Apache Tomcat Plain Password

2024-08-05 Thread Christopher Schultz

Chuck,

On 8/3/24 12:17, Chuck Caldarale wrote:



On Aug 3, 2024, at 06:28, MOHAMMED Bahauddin N
 wrote:

I have a request related to the Keystore password in Apache
Tomcat's 'server.xml' file. Currently, the password under the
Connector port is displayed in plain text,



Displayed to whom?



which is a security concern.



No, it’s not - as long as you have properly secured the Tomcat
configuration files. They should be accessible only by the userid
Tomcat runs with and the Tomcat administrator (if using a different
userid). No other users should have any access.



I am looking to encrypt it through configuration (not through any
code).I have reviewed the information provided in the link below,
which mentions configuration tips, but I don't understand some of
these (apart from the XML encoding).

https://cwiki.apache.org/confluence/display/TOMCAT/Password



The point of the article is that attempting to encrypt the Tomcat
configuration entries is … pointless. There will have to be a
decryption key saved somewhere that Tomcat has access to; if any
other users have access to that key, you’ve just wasted a lot of time
and effort for no gain. Much more efficient to expend that effort in
securing the Tomcat files.


I had this conversation with someone a long time ago and their argument
at the time was basically against shoulder-surfing. "If the password is 
'hummingbird'" then someone can just read it and go write it down 
elsewhere."


Okay, sure. So just make your password random junk and that will solve 
the shoulder-surfing issue. All other use-cases are just making more 
work for everybody who already really has access to the password.


I make it a habit of generating secrets basically like this:

$ dd if=/dev/urandom bs=1024 count=10 | sha1sum

10k of random garbage into sha1sum gives me a nice big random blob every 
time. Copy, paste, done. Unless someone is able to take a photro over 
your shoulder, you are fine. If that happens, why are you letting them 
take pictures? Why are you letting them log into your application server 
to impersonate your application? So many "whys".


Choosing a non-trivial password and file-level permissions should be 
sufficient. Everything else is hand-waving.


I have become more interested in the ServiceBindingPropertySource class 
recently, but that has MUCH more to do with deployment flexibility than 
security. But the passwords aren't in server.xml anymore!


-chris

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



[ANN] Apache Tomcat 9.0.93 available

2024-08-05 Thread Rémy Maucherat
The Apache Tomcat team announces the immediate availability of Apache
Tomcat 9.0.93.

Apache Tomcat 9 is an open source software implementation of the Java
Servlet, JavaServer Pages, Java Unified Expression Language, Java
WebSocket and JASPIC technologies.

Apache Tomcat 9.0.93 is a bugfix and feature release. The notable
changes compared to 9.0.91 include:

- Align HTTP/2 with HTTP/1.1 and recycle the container internal request
   and response processing objects by default. This behaviour can be
   controlled via the new discardRequestsAndResponses attribute on the
   HTTP/2 upgrade protocol.

- Add OpenSSL support for FFM. Using this feature requires Java 22
   or newer.

- Add support for RFC 8297 (Early Hints). Applications can use this
   feature by casting the HttpServletResponse to
   org.apache.catalina.connector.Reponse and then calling the method
   void sendEarlyHints().

Along with lots of other bug fixes and improvements.

Please refer to the change log for the complete list of changes:
https://tomcat.apache.org/tomcat-9.0-doc/changelog.html

Downloads:
https://tomcat.apache.org/download-90.cgi

Migration guides from Apache Tomcat 7.x and 8.x:
https://tomcat.apache.org/migration.html

Enjoy!

- The Apache Tomcat team

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org