[jboss-as7-dev] How hard would it be to support key based auth by default to make life simpler and more secure ?
Dimitris Andreadis
dandread at redhat.com
Tue Nov 15 07:26:53 EST 2011
Could there be a default setting that has local access unsecured and remote access password
protected?
On 14/11/2011 17:00, Bill Burke wrote:
> Geez guys, we're not trying to have CIA/NSA level security out of the
> box. We're just trying to prevent the case where a really stupid user
> (aka The Server Side) deploys their application on the internet without
> thinking one bit about security.
>
> On 11/14/11 9:56 AM, Andrig Miller wrote:
>> It's also a problem with servers with SSD's. I ran into this myself.
>>
>> Andy
>>
>> ------------------------------------------------------------------------
>>
>> *From: *"Jason T. Greene"<jason.greene at redhat.com>
>> *To: *"Darran Lofthouse"<darran.lofthouse at jboss.com>
>> *Cc: *jboss-as7-dev at lists.jboss.org
>> *Sent: *Monday, November 14, 2011 7:53:38 AM
>> *Subject: *Re: [jboss-as7-dev] How hard would it be to support key
>> based auth by default to make life simpler and more secure ?
>>
>> It's something I thought about, we would have to make up a bunch of
>> stuff in the CERT (not a big deal I guess). Although the thing I worry
>> about is that cert generation requires gathering a major amount of
>> entropy from /dev/random. It would seriously affect boot time, and it
>> would potentially pause for a long period to gather more entropy. This
>> is a problem for headless devices for example, that don't have a
>> keyboard and mouse connected to them.
>>
>> On 11/14/11 7:57 AM, Darran Lofthouse wrote:
>> > It would need to be SSL not SSH as we need to support the
>> mechanism for
>> > both the Native interface and the HTTP interface but I am starting to
>> > like this as an out of the box scenario.
>> >
>> > The advantage we have for the browser is we can always display a nice
>> > HTML page when they connect with full instructions, it is the other
>> > mechanisms where we have less opportunity to dynamically provide
>> guidance.
>> >
>> > On 11/14/2011 01:42 PM, Bill Burke wrote:
>> >> You could just have the app-server automatically generate the
>> keys for
>> >> you the first time it ever boots (or even every boot cycle).
>> Just have
>> >> the CLI look at a pre-defined directory for the generated
>> key-pair. THe
>> >> idea here is that CLI works perfectly out-of-the-box with no
>> config on
>> >> the same machine as the CLI runs on. What is still protected is a
>> >> remote machine accessing the app-server. This is fine, IMO.
>> >>
>> >> Usability problems still exist though as you would need to
>> import the
>> >> client-auth key into your browser. But, maybe this is a good
>> thing as
>> >> it will require the user to think about how they want to secure the
>> >> app-server.
>> >>
>> >> On 11/14/11 6:40 AM, Max Rydahl Andersen wrote:
>> >>>>>>
>> >>>>>> These will make all examples that uses maven deploy plugin,
>> cli scripts, arquillian, jboss tools etc. to somehow
>> >>>>>> either tell users to type in their username and full
>> password in clear text in pom.xml and other files.
>> >>>>>>
>> >>>>>> Which sounds worse to me than a default locked down to only
>> localhost…but I'm not a security expert :)
>> >>>>>>
>> >>>>>> I was wondering how hard it would be to make the
>> authentication support key based auth by default and we make
>> >>>>>> the tools use ${user.name} and
>> ${user.home}/.jboss/default.pub and .priv (or some other name) for
>> the public/private keys ?
>> >>>>>
>> >>>>> You would need a key-based SASL authentication mechanism.
>> There are no
>> >>>>> standard ones as of right now. If you know of a key-based SASL
>> >>>>> mechanism that you think we should support, let me know and we'll
>> >>>>> evaluate it.
>> >>>>
>> >>>> We would have to do noauth + SSL + trust. I think it's an
>> option worth considering. The big problem though is that we have to
>> have a setup process to generate the certs, which is greater
>> complexity than the user/pass option. We would have to generate a
>> host key pair and a client key pair.
>> >>>
>> >>>
>> >>> I'm not an expert on these things at all but eclipse uses
>> http://www.jcraft.com/jsch/ to manage and create ssh keys and uses
>> the standard .ssh location's etc.
>> >>>
>> >>> Is something additional needed ?
>> >>>
>> >>> /max
>> >>> http://about.me/maxandersen
>> >>>
>> >>>
>> >>>
>> >>>
>> >>> _______________________________________________
>> >>> jboss-as7-dev mailing list
>> >>> jboss-as7-dev at lists.jboss.org
>> >>> https://lists.jboss.org/mailman/listinfo/jboss-as7-dev
>> >>
>> > _______________________________________________
>> > jboss-as7-dev mailing list
>> > jboss-as7-dev at lists.jboss.org
>> > https://lists.jboss.org/mailman/listinfo/jboss-as7-dev
>>
>>
>> --
>> Jason T. Greene
>> JBoss AS Lead / EAP Platform Architect
>> JBoss, a division of Red Hat
>> _______________________________________________
>> jboss-as7-dev mailing list
>> jboss-as7-dev at lists.jboss.org
>> https://lists.jboss.org/mailman/listinfo/jboss-as7-dev
>>
>>
>>
>>
>> _______________________________________________
>> jboss-as7-dev mailing list
>> jboss-as7-dev at lists.jboss.org
>> https://lists.jboss.org/mailman/listinfo/jboss-as7-dev
>
--
xxxxxxxxxxxxxxxxxxxxxxxxxxxx
Dimitris Andreadis
Software Engineering Manager
JBoss Application Server
by Red Hat
xxxxxxxxxxxxxxxxxxxxxxxxxxxx
http://dandreadis.blogspot.com/
More information about the jboss-as7-dev
mailing list