<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Alt om ingenting og litt i mellom &#187; security</title>
	<atom:link href="http://hovenko.no/blog/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://hovenko.no/blog</link>
	<description>En blogg av Knut-Olav</description>
	<lastBuildDate>Mon, 10 Mar 2025 19:25:02 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.2.1</generator>
		<item>
		<title>How to not tell about a security breach?</title>
		<link>https://hovenko.no/blog/2009/09/07/how-to-not-tell-about-a-security-breach/</link>
		<comments>https://hovenko.no/blog/2009/09/07/how-to-not-tell-about-a-security-breach/#comments</comments>
		<pubDate>Mon, 07 Sep 2009 12:59:55 +0000</pubDate>
		<dc:creator>Knut-Olav</dc:creator>
				<category><![CDATA[English-posts]]></category>
		<category><![CDATA[Klagemuren]]></category>
		<category><![CDATA[Teknologi]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WordPress]]></category>

		<guid isPermaLink="false">http://hovenko.no/blog/?p=346</guid>
		<description><![CDATA[WordPress is breached, again. I guess I run an unsecure version of WordPress, but I&#8217;m not sure. All I am told is that i don&#8217;t runt he latest version of WordPress and that I should upgrade, because upgrading is easy. No, it&#8217;s not easy. I keep history of my webpage in Subversion, so every time [...]]]></description>
			<content:encoded><![CDATA[<p>WordPress is breached, again. I guess I run an unsecure version of WordPress, but I&#8217;m not sure. All I am told is that i don&#8217;t runt he latest version of WordPress and <a href="http://wordpress.org/development/2009/09/keep-wordpress-secure/">that I should upgrade, because upgrading is easy</a>.</p>
<p>No, it&#8217;s not easy. I keep history of my webpage in Subversion, so every time I need to upgrade WordPress I need to add the new version into Subversion in the vendor branch, merge in the changes in a WordPress current branch and then merge the changes into trunk of my web page. Why I do this, you say? No software is perfect, WordPress is far from it, so I need to alter some core code from time to time. That&#8217;s why.</p>
<p>Ok, back to the topic. Matt Mullenweg does not tell me in his blog post (link above) anything about what versions of WordPress that are potential targets for this Internet worm that exploits this security breach, nor what part of the code that makes it possible, not even how to patch it up. The entire blog post is just explaining that security holes do happen and some theory about how to protect yourself from it. Nothing concrete. Not very useful.</p>
]]></content:encoded>
			<wfw:commentRss>https://hovenko.no/blog/2009/09/07/how-to-not-tell-about-a-security-breach/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Howto bypass Weblogic security model</title>
		<link>https://hovenko.no/blog/2008/10/28/howto-bypass-weblogic-security-model/</link>
		<comments>https://hovenko.no/blog/2008/10/28/howto-bypass-weblogic-security-model/#comments</comments>
		<pubDate>Mon, 27 Oct 2008 22:08:08 +0000</pubDate>
		<dc:creator>Knut-Olav</dc:creator>
				<category><![CDATA[English-posts]]></category>
		<category><![CDATA[Programmering]]></category>
		<category><![CDATA[Teknologi]]></category>
		<category><![CDATA[Java]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[sikkerhet]]></category>
		<category><![CDATA[Weblogic]]></category>

		<guid isPermaLink="false">http://hovenko.no/blog/?p=180</guid>
		<description><![CDATA[Oracle Weblogic (former BEA Weblogic) enforces a security model by default that is unhealthy for developers writing REST web services or other kinds of web applications using HTTP Authentication for security. By default, when sending an HTTP Authentication header, Weblogic will check its own security realms for users matching the username and password. If there [...]]]></description>
			<content:encoded><![CDATA[<p>Oracle Weblogic (former BEA Weblogic) enforces a security model by default that is unhealthy for developers writing REST web services or other kinds of web applications using HTTP Authentication for security.</p>
<p>By default, when sending an HTTP Authentication header, Weblogic will check its own security realms for users matching the username and password. If there is no match, a 401 UNAUTHORIZED response is sent directly back to the client, without ever hitting your web application code. That takes care of the security, i guess&#8230;</p>
<p>This might sound like a good idea, except for those cases when your application is able to handle its own authentication. How can your application handle security when the request never hits your code?</p>
<p>Another problem, as i see it, is that Weblogic enforces this security model even for web application that are configured with no security at all. You can use your web application as much as you like, as long as you don&#8217;t send any HTTP Authentication headers. But when you decide to send an HTTP Authentication header like that, just for fun or when navigating from another website after being authenticated, Weblogic decides on your applications behalf that you are no longer worthy enough to use your application. That sucks&#8230;</p>
<p><strong>The solution</strong><br />
The solution? Yes, you can bypass the security model of Weblogic, at least for those applications that does not rely on the web containers security. It took me many weeks of frustration before I found a solution to my problem, but I got there&#8230;</p>
<p>Shutdown your admin server and open the config/config.xml file for editing. Add the following XML code into the &lt;security -configuration&gt; node:</p>
<blockquote><p>
&lt;enforce-valid-basic-auth-credentials&gt;<br />
&nbsp;&nbsp;&nbsp;&nbsp;false<br />
&lt;/enforce-valid-basic-auth-credentials&gt;
</p></blockquote>
<p>Start the admin server again. Then you need to restart all the application servers to make the change take effect. Restart them one by one to avoid downtime&#8230; you are of course running a cluster right? <img src='https://hovenko.no/blog/wp-includes/images/smilies/icon_wink.gif' alt=';)' class='wp-smiley' /> </p>
]]></content:encoded>
			<wfw:commentRss>https://hovenko.no/blog/2008/10/28/howto-bypass-weblogic-security-model/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
