You can subscribe to this list here.
| 2004 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(6) |
Oct
(6) |
Nov
(8) |
Dec
(2) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2005 |
Jan
(19) |
Feb
(15) |
Mar
(10) |
Apr
(8) |
May
(7) |
Jun
(9) |
Jul
(13) |
Aug
(31) |
Sep
(111) |
Oct
(52) |
Nov
(72) |
Dec
(42) |
| 2006 |
Jan
(21) |
Feb
(32) |
Mar
(33) |
Apr
(24) |
May
(15) |
Jun
(40) |
Jul
(32) |
Aug
(19) |
Sep
(38) |
Oct
(37) |
Nov
(63) |
Dec
(37) |
| 2007 |
Jan
(18) |
Feb
(39) |
Mar
(69) |
Apr
(49) |
May
(71) |
Jun
(59) |
Jul
(71) |
Aug
(85) |
Sep
(46) |
Oct
(14) |
Nov
(25) |
Dec
(56) |
| 2008 |
Jan
(24) |
Feb
(77) |
Mar
(104) |
Apr
(44) |
May
(41) |
Jun
(11) |
Jul
(31) |
Aug
(59) |
Sep
(44) |
Oct
(86) |
Nov
(66) |
Dec
(93) |
| 2009 |
Jan
(88) |
Feb
(41) |
Mar
(49) |
Apr
(135) |
May
(22) |
Jun
(31) |
Jul
(60) |
Aug
(71) |
Sep
(76) |
Oct
(18) |
Nov
(52) |
Dec
(20) |
| 2010 |
Jan
(8) |
Feb
(50) |
Mar
(35) |
Apr
(48) |
May
(46) |
Jun
(84) |
Jul
(38) |
Aug
(61) |
Sep
(51) |
Oct
(31) |
Nov
(17) |
Dec
(18) |
| 2011 |
Jan
(51) |
Feb
(14) |
Mar
(17) |
Apr
(23) |
May
(15) |
Jun
(11) |
Jul
(5) |
Aug
(5) |
Sep
(15) |
Oct
(8) |
Nov
(5) |
Dec
(25) |
| 2012 |
Jan
(2) |
Feb
(4) |
Mar
(6) |
Apr
(9) |
May
(27) |
Jun
(32) |
Jul
(36) |
Aug
(10) |
Sep
(16) |
Oct
(3) |
Nov
(13) |
Dec
(7) |
| 2013 |
Jan
(1) |
Feb
(4) |
Mar
|
Apr
(1) |
May
|
Jun
(2) |
Jul
|
Aug
(1) |
Sep
(4) |
Oct
(2) |
Nov
(1) |
Dec
|
| 2014 |
Jan
|
Feb
|
Mar
(2) |
Apr
(1) |
May
(2) |
Jun
(9) |
Jul
(5) |
Aug
(2) |
Sep
(4) |
Oct
|
Nov
|
Dec
|
| 2015 |
Jan
(3) |
Feb
(2) |
Mar
(4) |
Apr
(3) |
May
(1) |
Jun
(2) |
Jul
|
Aug
(2) |
Sep
(5) |
Oct
(1) |
Nov
|
Dec
|
| 2016 |
Jan
|
Feb
(5) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
(5) |
Sep
(3) |
Oct
|
Nov
|
Dec
|
| 2017 |
Jan
(6) |
Feb
|
Mar
|
Apr
(10) |
May
(2) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(1) |
Nov
(1) |
Dec
|
| 2018 |
Jan
(2) |
Feb
(5) |
Mar
|
Apr
|
May
(1) |
Jun
(3) |
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
| 2019 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
|
Jun
|
Jul
(1) |
Aug
(1) |
Sep
|
Oct
|
Nov
|
Dec
|
| 2020 |
Jan
|
Feb
(2) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(2) |
Oct
|
Nov
|
Dec
|
| 2021 |
Jan
(5) |
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
| 2023 |
Jan
|
Feb
(2) |
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
| S | M | T | W | T | F | S |
|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
1
|
|
2
|
3
|
4
|
5
|
6
(2) |
7
(8) |
8
(2) |
|
9
|
10
|
11
|
12
(2) |
13
|
14
|
15
|
|
16
|
17
|
18
|
19
|
20
|
21
|
22
|
|
23
|
24
|
25
|
26
|
27
(2) |
28
|
29
|
|
30
|
|
|
|
|
|
|
|
From: <php...@li...> - 2012-09-07 21:55:10
|
You can secure the back end using basic auth and send something like "Authorization: Basic " base64_encode(user.":".pass) but this won't solve the other problems (files, all apps running in shared memory). |
|
From: <php...@li...> - 2012-09-07 20:53:17
|
Thanks for your responses. Yes, it's a shared host, so it's not especially secure to begin with, but a service that lets all and sundry execute any Java code they desire is one more gaping hole I'd prefer not to have open. Am I correct that there's no support for authentication within the client in Java.inc? If so, can anybody shed any light on why it's not supported? (i.e. is it more complicated to implement than I'm imagining? Is the back-end communication not happening over HTTP? Did it just never occur to anybody that somebody might want this feature?) In other words, if I decide to try modifying the client to support basic authentication, will I live to regret it? :) Thanks again, -Jon On Fri, Sep 7, 2012 at 3:46 PM, <php...@li... > wrote: > On Fri, Sep 7, 2012 at 4:33 PM, < > php...@li... > > wrote: > > > If you install and update apache (or any other http server) from your > linux > > distribution (redhat or debian) you should be relatively save. > > > > he said he´s running a shared hosting account,quote: "this still allows > everybody on my shared hosting server..." > > FC > -- > During times of Universal Deceit, telling the truth becomes a revolutionary > act > Durante épocas de Engaño Universal, decir la verdad se convierte en un Acto > Revolucionario > - George Orwell > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > php-java-bridge-users mailing list > php...@li... > https://lists.sourceforge.net/lists/listinfo/php-java-bridge-users > |
|
From: <php...@li...> - 2012-09-07 19:47:00
|
On Fri, Sep 7, 2012 at 4:33 PM, <php...@li... > wrote: > If you install and update apache (or any other http server) from your linux > distribution (redhat or debian) you should be relatively save. > he said he´s running a shared hosting account,quote: "this still allows everybody on my shared hosting server..." FC -- During times of Universal Deceit, telling the truth becomes a revolutionary act Durante épocas de Engaño Universal, decir la verdad se convierte en un Acto Revolucionario - George Orwell |
|
From: <php...@li...> - 2012-09-07 19:46:38
|
Hi again. Sorry, I misunderstood you post. There's no resonable way to sandbox your application. In general Java's security manager is the wrong path, but it might work for your specific application. You might want to implement your own xen based solution instead. |
|
From: <php...@li...> - 2012-09-07 19:34:03
|
Use Apache as a frint end and jee server as a back end and block all access to the jee port except from localhost. If you install and update apache (or any other http server) from your linux distribution (redhat or debian) you should be relatively save. |
|
From: <php...@li...> - 2012-09-07 19:25:54
|
Hello all, I'm in the process of deploying an application which uses PHP/Java Bridge, and I'm having some difficulty figuring out how to secure the bridge against unauthorized usage. I've configured Tomcat to block access to the servelet except from localhost, but unless I'm mistaken, this still allows everybody on my shared hosting server to run arbitrary Java code in my container (reading or writing any of my files, etc.). This is certainly not ideal. I have followed the instructions to run P/JB with Tomcat's security manager (http://php-java-bridge.sourceforge.net/pjb/FAQ.html#tomcat-security), but this appears to simply bypass the security manager altogether, making it something of a non-solution. I would like to do one or ideally both of the following: 1. Run PHP/JavaBridge with a security manager so that I can prevent it from accessing files or directories not specifically required by my application. 2. Require authentication (e.g. basic HTTP authentication) when connecting to the PHP/Java Bridge servelet (presumably I could set this up in Tomcat, but I don't see any way to perform the authentication on the client end from my PHP application). Any pointers would be appreciated. Thank you! -Jon |
|
From: <php...@li...> - 2012-09-07 12:08:59
|
I thought so. If you don't want to use a jee (e.g. tomcat, glassfish,jetty...) back end, you're on your own. Please see FAQ and install document on php-java-bridge.sf.net for details. |
|
From: <php...@li...> - 2012-09-07 12:03:51
|
Thanks for your answer. I'm not using Tomcat though, but directly calling java classes. I wonder if this could mean that a java class is for some reason not responding.. Thanks again, A --- Gio 6/9/12, php...@li... <php...@li...> ha scritto: > Da: php...@li... <php...@li...> > Oggetto: [Php-java-bridge-users] mysterious error(s) > A: php...@li... > Data: Giovedì 6 settembre 2012, 15:18 > Hello, > I get this error message in the Apache error log, and I > cannot understand what's causing it. > > Could somebody help please? Or at least point me to the > right direction :) > > > [Thu Sep 06 16:45:13 2012] [error] [client 131.152.227.94] > PHP Notice: fwrite() [<a > href='function.fwrite'>function.fwrite</a>]: send > of 193 bytes failed with errno=32 Broken pipe in > /import/wnz/home/mirz/libraries/php/Java.inc on line 652, > referer: http://www.clipz.unibas.ch/index.php?r=tools%2Falignment%2FregionalAlignment&strand=%2B&orgId=7&yt0=Show+genome+browser > > Java.inc looks like this: > > 648: $res .= "\r\n"; > 649: $res .= "\177"; > 650: $res .= $compatibility; > 651: $res .= $data; > 652: $count = fwrite($socket, $res) or > $this->shutdownBrokenConnection("Broken connection > handle"); > 653: fflush($socket) or > $this->shutdownBrokenConnection("Broken connection > handle"); > 654: return $count;} > 655: function read($size) > {if(is_null($this->headers)) $this->parseHeaders(); > 656: $data = fread($this->socket, > $this->headers['content_length']); > > > Another problem I get is that in a certain page I have this > error: > Error 500 > Undefined index: content_length > Which I strongly suspect that it's the same "content_length" > of line 656.. > > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's > security and > threat landscape has changed and how IT managers can > respond. Discussions > will include endpoint security, mobile security and the > latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > php-java-bridge-users mailing list > php...@li... > https://lists.sourceforge.net/lists/listinfo/php-java-bridge-users > |