[JBoss JIRA] (WFCORE-1145) Review of HostController / Application Server Remoting connections
by Brian Stansberry (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1145?page=com.atlassian.jira.plugi... ]
Brian Stansberry updated WFCORE-1145:
-------------------------------------
Fix Version/s: 3.0.0.Alpha23
(was: 3.0.0.Alpha21)
> Review of HostController / Application Server Remoting connections
> ------------------------------------------------------------------
>
> Key: WFCORE-1145
> URL: https://issues.jboss.org/browse/WFCORE-1145
> Project: WildFly Core
> Issue Type: Task
> Components: Domain Management
> Reporter: Darran Lofthouse
> Assignee: Darran Lofthouse
> Labels: affects_elytron
> Fix For: 3.0.0.Alpha23
>
>
> Where an application server connects back to it's host controller in domain mode it used the same Remoting connector exposed possibly for native domain management access.
> The problem with this is that as soon as any security restrictions are placed on the connector exposed by the host controller then the application servers require something to work with this - this is even though we are only ever talking about loopback communication between two process on the same machine.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 3 months
[JBoss JIRA] (WFCORE-1891) Split WildFly Elytron into two modules with a public / private split.
by Brian Stansberry (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1891?page=com.atlassian.jira.plugi... ]
Brian Stansberry updated WFCORE-1891:
-------------------------------------
Fix Version/s: 3.0.0.Alpha23
(was: 3.0.0.Alpha21)
> Split WildFly Elytron into two modules with a public / private split.
> ---------------------------------------------------------------------
>
> Key: WFCORE-1891
> URL: https://issues.jboss.org/browse/WFCORE-1891
> Project: WildFly Core
> Issue Type: Task
> Components: Security
> Reporter: Darran Lofthouse
> Assignee: Darran Lofthouse
> Priority: Critical
> Fix For: 3.0.0.Alpha23
>
>
> The Elytron jar will be contained within a private module, possibly 'elytron-private' then a module 'elytron' will depend on this and make the public packages visible.
> The following packages have been identified as being private: -
> org.wildfly.security._private
> org.wildfly.security.asn1
> org.wildfly.security.auth.realm
> org.wildfly.security.auth.realm.*
> org.wildfly.security.authz.jacc
> org.wildfly.security.credential.store.impl
> org.wildfly.security.security.digest
> org.wildfly.security.http.impl
> org.wildfly.security.security.keystore
> org.wildfly.security.mechanism.oauth2
> org.wildfly.security.mechanism.scram
> org.wildfly.security.password.impl
> org.wildfly.security.password.util
> org.wildfly.security.pem
> org.wildfly.security.sasl
> org.wildfly.security.sasl.* (Except util)
> org.wildfly.security.util
> org.wildfly.security.util_private
> org.wildfly.security.x500
> org.wildfly.security.x500.cert
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 3 months
[JBoss JIRA] (WFCORE-1802) Integrate OpenSSL Provider registration with Elytron
by Brian Stansberry (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1802?page=com.atlassian.jira.plugi... ]
Brian Stansberry updated WFCORE-1802:
-------------------------------------
Fix Version/s: 3.0.0.Alpha23
(was: 3.0.0.Alpha21)
> Integrate OpenSSL Provider registration with Elytron
> ----------------------------------------------------
>
> Key: WFCORE-1802
> URL: https://issues.jboss.org/browse/WFCORE-1802
> Project: WildFly Core
> Issue Type: Task
> Components: Security
> Reporter: Stuart Douglas
> Assignee: Darran Lofthouse
> Priority: Blocker
> Fix For: 3.0.0.Alpha23
>
>
> We need to remove the following block from SecurityRealmResourceDefinition: -
> {code}
> static {
> //register the Openssl Provider, if possible
> //not really sure if this is the best place for it
> try {
> OpenSSLProvider.register();
> DomainManagementLogger.ROOT_LOGGER.registeredOpenSSLProvider();
> } catch (Throwable t){
> DomainManagementLogger.ROOT_LOGGER.debugf(t, "Failed to register OpenSSL provider");
> }
> }
> {code}
> Registration will then be possible within the Elytron subsystem configuration.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 3 months
[JBoss JIRA] (WFCORE-1958) Clean up testsuite Elytron registration
by Brian Stansberry (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1958?page=com.atlassian.jira.plugi... ]
Brian Stansberry updated WFCORE-1958:
-------------------------------------
Fix Version/s: 3.0.0.Alpha23
(was: 3.0.0.Alpha21)
> Clean up testsuite Elytron registration
> ---------------------------------------
>
> Key: WFCORE-1958
> URL: https://issues.jboss.org/browse/WFCORE-1958
> Project: WildFly Core
> Issue Type: Task
> Components: Test Suite
> Reporter: Darran Lofthouse
> Assignee: Darran Lofthouse
> Priority: Blocker
> Fix For: 3.0.0.Alpha23
>
>
> In a couple of places we have artificially registered the WildFly Elytron Security provider, we need to address this so tests can automatically have it available to them..
> Also re-enable the following test case: -
> * org.jboss.as.test.integration.domain.suites.FullRbacProviderRunAsTestSuite
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 3 months
[JBoss JIRA] (WFCORE-1964) Internal ModelControllerClient should bypass access control by default
by Brian Stansberry (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1964?page=com.atlassian.jira.plugi... ]
Brian Stansberry updated WFCORE-1964:
-------------------------------------
Fix Version/s: 3.0.0.Alpha23
(was: 3.0.0.Alpha21)
> Internal ModelControllerClient should bypass access control by default
> ----------------------------------------------------------------------
>
> Key: WFCORE-1964
> URL: https://issues.jboss.org/browse/WFCORE-1964
> Project: WildFly Core
> Issue Type: Task
> Components: Domain Management, Security
> Reporter: Darran Lofthouse
> Assignee: Darran Lofthouse
> Priority: Blocker
> Fix For: 3.0.0.Alpha23
>
>
> This is continuing compatibility where in-vm clients can perform actions without triggering management access control.
> It would be nice also if we could find a way to make it possible to selectively disable this for cases where we want identity propagation between applications and the management tier.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 3 months
[JBoss JIRA] (WFCORE-1963) Clean up the 'TODO Elytron' issues.
by Brian Stansberry (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1963?page=com.atlassian.jira.plugi... ]
Brian Stansberry updated WFCORE-1963:
-------------------------------------
Fix Version/s: 3.0.0.Alpha23
(was: 3.0.0.Alpha21)
> Clean up the 'TODO Elytron' issues.
> -----------------------------------
>
> Key: WFCORE-1963
> URL: https://issues.jboss.org/browse/WFCORE-1963
> Project: WildFly Core
> Issue Type: Task
> Reporter: Darran Lofthouse
> Assignee: Darran Lofthouse
> Priority: Blocker
> Fix For: 3.0.0.Alpha23
>
>
> A few classes have 'TODO Elytron' comments that need addressing.
> Current List: -
> {noformat}
> ./core-model-test/tests/src/test/java/org/jboss/as/core/model/test/access/RoleMappingTestCase.java
> ./jmx/src/test/java/org/jboss/as/jmx/rbac/JmxRbacTestCase.java
> ./remoting/subsystem/src/main/java/org/jboss/as/remoting/RemotingHttpUpgradeService.java
> ./remoting/subsystem/src/main/java/org/jboss/as/remoting/AbstractStreamServerService.java
> ./testsuite/standalone/src/test/java/org/wildfly/core/test/standalone/mgmt/api/core/ConfigurationChangesHistoryTestCase.java
> ./host-controller/src/main/java/org/jboss/as/domain/controller/plan/AbstractServerGroupRolloutTask.java
> ./controller/src/main/java/org/jboss/as/controller/remote/TransactionalProtocolOperationHandler.java
> ./controller/src/main/java/org/jboss/as/controller/ParallelBootOperationStepHandler.java
> ./controller/src/main/java/org/jboss/as/controller/access/management/ManagementSecurityIdentitySupplier.java
> ./server/src/main/java/org/jboss/as/server/mgmt/domain/HostControllerConnectionService.java
> ./domain-management/src/main/java/org/jboss/as/domain/management/security/UserDomainCallbackHandler.java
> ./domain-management/src/main/java/org/jboss/as/domain/management/security/WhoAmIOperation.java
> ./domain-management/src/main/java/org/jboss/as/domain/management/security/PlugInAuthenticationCallbackHandler.java
> ./domain-management/src/main/java/org/jboss/as/domain/management/security/JaasCallbackHandler.java
> ./domain-management/src/main/java/org/jboss/as/domain/management/security/KerberosCallbackHandler.java
> ./domain-management/src/main/java/org/jboss/as/domain/management/security/ClientCertCallbackHandler.java
> {noformat}
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 3 months
[JBoss JIRA] (WFCORE-2046) KeyManager synchronization issue when using IBM JDK
by Brian Stansberry (JIRA)
[ https://issues.jboss.org/browse/WFCORE-2046?page=com.atlassian.jira.plugi... ]
Brian Stansberry updated WFCORE-2046:
-------------------------------------
Fix Version/s: 3.0.0.Alpha23
(was: 3.0.0.Alpha21)
> KeyManager synchronization issue when using IBM JDK
> ---------------------------------------------------
>
> Key: WFCORE-2046
> URL: https://issues.jboss.org/browse/WFCORE-2046
> Project: WildFly Core
> Issue Type: Bug
> Components: Security
> Reporter: Josef Cacek
> Assignee: Darran Lofthouse
> Priority: Blocker
> Fix For: 3.0.0.Alpha23
>
> Attachments: test-app-ibm-jdk-keymanager-sync.zip
>
>
> We hit a {{KeyManagerFactory}} related synchronization issue in {{org.jboss.as.domain.management.security.AbstractKeyManagerService.createKeyManagers(boolean)}} method on IBM JDK. The issue occurs if there are more security realms with SSL identities in EAP and they have keystores with different passwords.
> As the ApplicationRealm (in EAP 7.1) has preconfigured ssl identity configuration, the risk customers will hit this when they add their own security realm with a ssl identity is big. The frequency we hit this issue is more than 10% cases on our machines.
> Our debugging suggests the problem is located in IBM JDK implementation of {{javax.net.ssl.KeyManagerFactorySpi}} (class {{com.ibm.jsse2.ae$a}}).
> The workflow:
> # user calls {{keyManagerFactory.init(keyStore, keystorePassword)}} which invokes {{com.ibm.jsse2.ae$a.engineInit(Keystore keyStore, char[] password)}}
> # the password (from the second method parameter) is stored into static field {{com.ibm.jsse2.ae.d}} and in the next step the field is used as parameter for creating new object {{new com.ibm.jsse2.aw(keyStore, d)}}
> # the previous step is not synchronized and when more threads call {{keyManagerFactory.init()}} with different passwords, wrong password may be used for retrieving a key from keystore.
> *Possible workaround*
> We could workaround this issue on EAP side (until it's fixed in the JDK) by synchronizing {{keyManagerFactory.init()}} call in {{AbstractKeyManagerService.createKeyManagers(boolean)}} when IBM JDK is used.
--
This message was sent by Atlassian JIRA
(v7.2.3#72005)
9 years, 3 months