[JBoss JIRA] (WFLY-431) Revisit enforcement of required file system permissions.
by Darran Lofthouse (JIRA)
[ https://issues.jboss.org/browse/WFLY-431?page=com.atlassian.jira.plugin.s... ]
Darran Lofthouse updated WFLY-431:
----------------------------------
Fix Version/s: (was: 11.0.0.Alpha1)
> Revisit enforcement of required file system permissions.
> --------------------------------------------------------
>
> Key: WFLY-431
> URL: https://issues.jboss.org/browse/WFLY-431
> Project: WildFly
> Issue Type: Task
> Components: Domain Management
> Reporter: Darran Lofthouse
> Assignee: Darran Lofthouse
> Labels: management_security,
>
> Now that AS8 has moved to Java 7 we can re-visit the level of control we have over file system permissions, this can be from taking more control of the local authentication mechanism to ensure incorrect permissions are not inherited to verifying sensitive configuration files are not world readable.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 3 months
[JBoss JIRA] (WFLY-483) Allow more control over authentication for server to server communication through remote-outbound-connection
by Darran Lofthouse (JIRA)
[ https://issues.jboss.org/browse/WFLY-483?page=com.atlassian.jira.plugin.s... ]
Darran Lofthouse resolved WFLY-483.
-----------------------------------
Resolution: Out of Date
Server to server authentication is being handled by the changes introduced for WildFly Elytron.
> Allow more control over authentication for server to server communication through remote-outbound-connection
> ------------------------------------------------------------------------------------------------------------
>
> Key: WFLY-483
> URL: https://issues.jboss.org/browse/WFLY-483
> Project: WildFly
> Issue Type: Sub-task
> Components: Remoting, Security
> Reporter: jaikiran pai
> Assignee: Darran Lofthouse
> Labels: authentication_service
> Fix For: 11.0.0.Alpha1
>
>
> Right now for server to server communication via a remote-outbound-connection, we expect a static username to be specified (along with the security realm). User applications which use this remote-outbound-connection, for example an EJB application, do not have much control over the user/pass information, since the username is static. This further acts a drawback since the username that's used to connect to the remote server will be used as the (application) user who invoked the EJB.
> It would be good to allow more control over the authentication for the remote-outbound-connection.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 3 months
[JBoss JIRA] (WFLY-2440) Thread pool AccessControlContext Propagation
by Darran Lofthouse (JIRA)
[ https://issues.jboss.org/browse/WFLY-2440?page=com.atlassian.jira.plugin.... ]
Darran Lofthouse updated WFLY-2440:
-----------------------------------
Fix Version/s: (was: 11.0.0.Alpha1)
> Thread pool AccessControlContext Propagation
> --------------------------------------------
>
> Key: WFLY-2440
> URL: https://issues.jboss.org/browse/WFLY-2440
> Project: WildFly
> Issue Type: Task
> Reporter: Darran Lofthouse
> Assignee: Darran Lofthouse
>
> A decision was made within Java that newly created threads should inherit the access control context of their creator.
> In general this was justified on the basis that if you are creating a thread you want it to inherit the permissions you already have.
> Once we introduce thread pooling that logic no longer makes as much sense and there is not the same relationship between the thread that triggers it's creation and the long term life of that thread.
> This may affect components outside of WildFly but I am raising it here as a top level task.
> Should also note that JBoss Threads does already have some protection built in if a security manager is in use but there are times the AccessControlContext will be used without a security manager so more control is required.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 3 months
[JBoss JIRA] (WFLY-3342) undertow subsystem authentication configuration
by Darran Lofthouse (JIRA)
[ https://issues.jboss.org/browse/WFLY-3342?page=com.atlassian.jira.plugin.... ]
Darran Lofthouse resolved WFLY-3342.
------------------------------------
Resolution: Out of Date
> undertow subsystem authentication configuration
> -----------------------------------------------
>
> Key: WFLY-3342
> URL: https://issues.jboss.org/browse/WFLY-3342
> Project: WildFly
> Issue Type: Bug
> Components: Web (Undertow)
> Affects Versions: 8.0.0.Final
> Reporter: Travis De Silva
> Assignee: Darran Lofthouse
> Fix For: 11.0.0.Alpha1
>
>
> I have a use case where I have static content that I want only authorised web users to be able to access. In the standalone.xml file, I added the following config.
> <filter-ref name="my-auth"/> under <location> and
> <basic-auth name="my-auth" security-domain="other"/> under <handlers>
> But I am getting following error
> Caused by: java.lang.RuntimeException: JBAS017346: Could not construct handler for class: class io.undertow.security.handlers.AuthenticationCallHandler. with parameters {"security-domain" => "other"}
> [~ctomc] Mentioned in the forum post that how undertow does authentication has changed significantly and subsystem configuration did not catch up with it properly and request a jira ticket be opened.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 3 months
[JBoss JIRA] (WFLY-5740) ContextPolicy checks purely based on names, ignores Principal types
by Darran Lofthouse (JIRA)
[ https://issues.jboss.org/browse/WFLY-5740?page=com.atlassian.jira.plugin.... ]
Darran Lofthouse reassigned WFLY-5740:
--------------------------------------
Assignee: Pedro Igor (was: Darran Lofthouse)
> ContextPolicy checks purely based on names, ignores Principal types
> -------------------------------------------------------------------
>
> Key: WFLY-5740
> URL: https://issues.jboss.org/browse/WFLY-5740
> Project: WildFly
> Issue Type: Bug
> Components: Security
> Affects Versions: 10.0.0.CR4
> Reporter: Arjan t
> Assignee: Pedro Igor
>
> In {{org.jboss.security.jacc.ContextPolicy}} the {{implies}} method only looks at the names of each {{Principal}} from the passed in {{ProtectionDomain}}, without checking if they're actually a role.
> The collection of these names is then used to check against role based permissions.
> If a user now has a name "expert" and there's also a role called "expert", access will be granted purely based on the user (caller) name. This is of course not correct.
> See the following code:
> {code:java}
> // Check principal to role permissions
> Principal[] principals = domain.getPrincipals();
> int length = principals != null ? principals.length : 0;
> ArrayList<String> principalNames = new ArrayList<String>();
> for (int n = 0; n < length; n ++) {
> Principal p = principals[n];
> if( p instanceof Group ) {
> Group g = (Group) p;
> Enumeration<? extends Principal> iter = g.members();
> while(iter.hasMoreElements()) {
> p = iter.nextElement();
> // *** ONLY NAME IS USED. TYPE IS IGNORED
> String name = p.getName();
> principalNames.add(name);
> }
> }
> else {
> String name = p.getName();
> // *** ONLY NAME IS USED. TYPE IS IGNORED
> principalNames.add(name);
> }
> }
> principalNames.add(ANY_AUTHENTICATED_USER_ROLE);
> for (int n = 0; implied == false && n < principalNames.size(); n ++) {
> String name = principalNames.get(n);
> // *** "name", WHICH CAN BE ANYTHING, USED FOR ROLE NAME HERE
> Permissions perms = rolePermissions.get(name);
> if( perms == null )
> continue;
> implied = perms.implies(permission);
> }
> {code}
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 3 months