You are viewing a plain text version of this content. The canonical link for it is here.
Posted to derby-dev@db.apache.org by "Dag H. Wanvik (JIRA)" <ji...@apache.org> on 2014/08/20 01:31:18 UTC
[jira] [Comment Edited] (DERBY-6620) Network client DataSources
silently swallow SecurityExceptions when trying to read the tracing
properties
[ https://issues.apache.org/jira/browse/DERBY-6620?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14103031#comment-14103031 ]
Dag H. Wanvik edited comment on DERBY-6620 at 8/19/14 11:30 PM:
----------------------------------------------------------------
This is client side code. If it runs under a security manager, the reading of system properties *derby.client.traceDirectory* and *derby.client.traceLevel* can fail unless permissions are given in the policy file in use. Now, under normal operation, one wouldn't be using these properties; they are mainly available for debugging the protocol. So, does it really constitute a security issue if these properties can't be read? It *could* trip up an admin trying to enable protocol tracing, and finding the trace file has ended up somewhere it shouldn't.
So, would it be worth it to write a warning message on the console (where else?) in this case? It could be seen
as an annoyance if the user isn't trying to use tracing at all.... I am not quite convinced its the right thing to do. I would have liked the warning to appear only if tracing is attempted, but it appears the properties are always read, cf. BasicClientDataSource40#updateDataSourceValues, which is called from #getConnection unconditionally.
was (Author: dagw):
This is client side code. If it runs under a security manager, the reading of system properties *derby.client.traceDirectory* and *derby.client.traceLevel* can fail unless permissions are given in the policy file in use. Now, under normal operation, one wouldn't be using these properties; they are mainly available for debugging the protocol. So, does it really constitute a security issue if these properties can't be read? It *could* trip up an admin trying to enable protocol tracing, and finding the trace file has ended up somewhere it shouldn't.
So, would it be worth it to write a warning message on the console (where else?) in this case? It could be seen
as an annoyance if the user isn't trying to use tracing at all.... I am not quite convinced its the right thing to do. I would have liked the warning to appear only if tracing is attempted, but it the properties are always read, cf. BasicClientDataSource40#updateDataSourceValues, which is called from #getConnection unconditionally.
> Network client DataSources silently swallow SecurityExceptions when trying to read the tracing properties
> ---------------------------------------------------------------------------------------------------------
>
> Key: DERBY-6620
> URL: https://issues.apache.org/jira/browse/DERBY-6620
> Project: Derby
> Issue Type: Bug
> Components: JDBC
> Affects Versions: 10.11.1.1
> Reporter: Rick Hillegas
> Assignee: Dag H. Wanvik
>
> The swallowing occurs here:
> {noformat}
> org.apache.derby.jdbc.ClientBaseDataSourceRoot run Catch java.lang.SecurityException 1 line 457
> {noformat}
> Maybe a warning could be raised to alert the user to the problem and encourage them to correct their security policy.
--
This message was sent by Atlassian JIRA
(v6.2#6252)