J2EE Security 66
J2EE Security for Servlets, EJBs, and Web Services | |
author | Pankaj Kumar |
pages | 426 (12 page index) |
publisher | Prentice Hall |
rating | 9 |
reviewer | Simon P. Chappell |
ISBN | 0131402641 |
summary | A great combination of security primer and cookbook. |
What is J2EE Security?
J2EE Security covers a very wide range of techniques and mechanisms: Access control based on permissions and authentication of identity; encryption of data passing in or out of an application; and validation of presented credentials. These are the big things: needless to say, there are levels of detail below each of these three.What do I know about J2EE Security?
More than I did when I started reading this book! In my experience, security is either bolted on at the last minute or badly implemented using home-grown techniques. As one who has seen or tried both of these approaches, I was determined to seek out the better way, so when the chance to review this book came along I jumped at it.Overview
The first section, with chapter one and two, is "The Background." Chapter one is a security primer and should be old hat to most of the readership of Slashdot. Chapter two is a tour of the Java language strictly from a security perspective. This is interesting and very informative, even for a long-time Java programmer like me.The second section is "The Technology," and includes chapters three through seven. Chapter three is a discussion of cryptography with Java and would have been worth the price of the whole book for me if (I hadn't have gotten it for free as a review copy)! :-) Chapter four covers PKI (Public Key Infrastructure) with Java. Managing certificates is explained as well as the steps necessary to issue and revoke your own. Chapter five is a discussion of access control. Access control in Java is available based on the origin of the code (the applet effect), the signer of the code or the logged-in user. Chapter six concerns securing the wire. This is the use of encryption for the transmission channel, SSL in a web browser being the most obvious example, where everything served over HTTPS is encrypted. Chapter seven secures the message. This covers message encryption for those times in life where you have to use a non-encrypted transfer medium as well as techniques for authentication, so that the message you do send can be guaranteed to be authentic and provably from you.
The third section is "The Application." Chapter eight discusses the security aspects of RMI based applications, especially using the Java security managers. Chapter nine reviews web application security using both declarative and programmatic security, giving examples using Apache Tomcat.Chapter ten discusses EJB security, including JNDI-based client authentication, SSL and declarative access control. Chapter eleven talks about the security issues associated with web services using the Apache Axis tool to illustrate the points. Chapter twelve is a wrap up of the whole book.
What's To Like
The book is logically divided into chapters on each of the main aspects of security that apply to J2EE. These chapters are then located within three sections: background, technology and application. This sequence worked nicely for me, each chapter getting more detailed. This way I knew how deep I was by how far into the book I'd gotten.The main thing that struck me about this book was that it was designed to be practical. Mr. Kumar not only explains his point and gives you example source code, but he has written a freely available security toolkit, to demonstrate each of the points he makes. The Java Security Tool Kit (JSTK) is a very nice addition to the book's text. Being able to try out the concept being explained really helps. This approach takes example code to another level and I hope other authors will take note.
What's To Consider
There is almost nothing to nit-pick concerning the book, but I do have one complaint about the JSTK software. The supplied shell scripts in the bin directory all had MS-DOS end-of-lines. This prevented them running unmodified on my OS X iBook. I had to remove all of the ^M's. This may also be a problem under Linux, but I have not had an opportunity to test there yet. Once the end-of-line problem was fixed, the software worked like a charm.Summary
A great combination of security primer and cookbook. If you're a serious crypto-freak then you probably don't need this book. If you're a regular Java programmer looking to move to the next level in your understanding and practice of security in your J2EE applications, then this is an excellent book to purchase and learn from.Table Of Contents
1. A Security Primer
2. A Quick Tour of the Java Platform
3. Cryptography with Java
4. PKI with Java
5. Access Control
6. Securing the Wire
7. Securing the Message
8. RMI Security
9. Web Application Security
10. EJB Security
11. Web Service Security
12. Conclusions
Appendix A: Public Key Cryptography Standards
Appendix B: Standard Names - Java Cryptographic Services
Appendix C: JSTK Tools
Appendix D: Example Programs
Appendix E: Products Used For Examples Appendix F: Standardization Bodies
Simon P. Chappel would like Tim O'Reilly to call him to discuss the great Java book he's itching to write. You can purchase J2EE Security from bn.com. Slashdot welcomes readers' book reviews -- to submit a review for consideration, read the book review guidelines, then visit the submission page.
Slashbot book review (Score:2, Troll)
Also, it introduces nice security concepts in a clear and easy way which self taught coders might not have come considered before.
I got my copy from Barns & Noble which was a couple of dolla
Re:Slashbot book review (Score:3, Insightful)
Re:Slashbot book review (Score:1)
Stop using outdated, inefficient methods of retail transaction, the future growth of productivity and economnic gains depend on it.
Re:Slashbot book review (Score:2)
Re:Slashbot book review (Score:1)
I have lost all faith in the mod system!
J2EE security? should be just Java 2 security (Score:5, Interesting)
9. Web Application Security
10. EJB Security
11. Web Service Security
Seems more like this is Security book for all Java 2 folks with J2EE tagged on at end. Ohh let us not forget that J2EE is a big buzzword that will most likely increase sales an extra 10-15% versus naming the book "Java Security"
i'll take the karma hit to state my opinion. Name the book on what it is about not what will generate a large amount of sales.
Re:J2EE security? should be just Java 2 security (Score:5, Insightful)
I know it's a shame to have programmers who think that telnet is "secure" because they are prompted with a login, but usually these programmers are not stupid, they are just uninformed. As soon as they realize the issues involved, they take steps to correct them. That is why I am happy to see that the foundations of "what we mean by security" was laid out before the "how we do it in J2EE"
That said, I am sorry to see that they didn't devote a chapter to Java's authentication and authorization service (JAAS), as in my humble opinion, for all of its power, its not terribly straightforward or simple. In a mixed application environment, the pressures for "single sign-on" capabilites usually require JAAS or a home brew implementation which most likely would be even less secure.
Re:J2EE security? should be just Java 2 security (Score:2)
in the case of identity theft. is level 2 ID theft them finding out your SSN and calling and getting a new SSN saying you are the ID theft? (kinda like a reverse ID theft?)
thank you but no thank you.
Re:J2EE security? should be just Java 2 security (Score:1)
Re:J2EE security? should be just Java 2 security (Score:1)
JAAS is indeed a great feature of Java/J2EE systems and no good book would be complete without a good discussion on this topic. This book is no different. It include a complete chapter devoted to it -- the chapter titled "Access Control". This chapter includes description of policy files to control access using codebase (from where the class files are loaded), signer, logged-in user or any combination of these. The cahpter also has details on using LoginModules, how to write J
Re:J2EE security? should be just Java 2 security (Score:4, Interesting)
12. Securing the Application Server
13. Securing the JVM and the ClassLoader
14. Securing the Operating System (or at least, the File System)
Because if I add to attack a J2EE application, I would do (14), (13) and then (12). If that doesn't work, I would go straight to (10) or to the database. So, maybe they should also have added:
15. Securing the JDBC driver properties and the Database
Overall, this is another Java book that I will not buy.
Role of programmer versus server admin (Score:2)
I would guess the reasoning for omitting these steps is due to this role seperation, or the fact that Application Servers and OSes tend to have vastly different configuration options and covering all of them (or even just a few major ones like WebLogic, JRun, WebSphere, etc.) could be a book
quote? (Score:5, Funny)
I thought it was "with power comes great responsibility"? Applicable nonetheless.
Re:quote? (Score:2)
With scope comes complexity.
With power comes the willingness to tackle more scope.
With power comes complexity? (Score:5, Funny)
Re:With power comes complexity? (Score:2)
with EJB comes power, with power comes complexity,
Re:With power comes complexity? (Score:1)
Programming primadonnas (Score:5, Insightful)
Security models and tools that are so complex as be underutilized are worthless. It only takes one unsecured app to ruin all the rest of your security. Ultimately security will have to come automagically from the framework, compiler, or language itself. It will be a fight because programmers will feel too constrained in such an environment (thinking they can do it better, which may be true). If only experts can write secure code, we will never have security. This business will always have amateurs working in it. If we have to depend on expertise, we will never have security.
Someone's going to say it, dos2unix (Score:5, Informative)
For those who may be unfamiliar with file conversion issues, here's (only a few) ways to convert DOS text files.
For Linux, there's dos2unix.
For MacOSX, there's native2ascii (Haven't used it personally, but is reported to work)
Also dos2unix has been ported to MacOSX, see http://www.osxgnu.org/software/Fileutils/Unix2Dos
And I'm not including several dozen awk scripts, perl commands, shell scripts, etc. to do the same thing.
For perl (Score:1)
Re:Someone's going to say it, dos2unix (Score:2)
Jason.
Re:Someone's going to say it, dos2unix (Score:4, Interesting)
It's not pratical to maintain two dialects when they are not both in active use, in language or in computer software.
Never mind that DOS was created after UNIX, and decided to be particular about wanting thier own file format, so they embedded what was previously a printer command just in case the computer didn't realize that it already had a carrige return to process.
Of course, I'm not really trying to convince you that the UNIX way is better, but now you see it from a different point of view.
Re:Someone's going to say it, dos2unix (Score:3, Interesting)
Just a carriage return (no line feed) can be used as a status display with a command line app. In a loop you update the status (such as a line counter), then use just the caraige return to return the cursor to the beginning of the line. The you write out the line number again ON THE SAME LINE.
Just a line feed can mimic a tree. One line down, same character position.
Re:Someone's going to say it, dos2unix (Score:2)
Re:Someone's going to say it, dos2unix (Score:1)
I have always thought that the *nix way was wrong, and took control AWAY from me. If I want a CR, I want a the actions of a CR, NOT an automatic CR/LF.
Automatic actions are the MS way, IMHO.
Sigh, now I will get flamed for this, Oh Well.....
Re:Someone's going to say it, dos2unix (Score:2, Interesting)
Re:Someone's going to say it, dos2unix (Score:2)
set fileformats=unix
That will make it show the ^Ms
Not so (Score:4, Insightful)
---------------
Some of the most powerful concepts are also among the most simple. One of the principle weaknesses of the Java (and C#, and before that Win32 and MFC) API is that they fail to grasp that.
Re:Not so (Score:4, Insightful)
Java APIs make things as simple as possible. But not simpler.
Re:Not so (Score:2, Insightful)
Sample chapter download (Score:5, Informative)
This chapter is for Web Services Security using XML Encryption and XML digital signatures.
iksrazal
Another good book on the subject... (Score:5, Informative)
I highly reccomend it and it's a great "how to" companion to O'Reilly's Java Security [oreilly.com] by Scott Oaks.
Plain text passwords in web.xml (Score:5, Informative)
If I see one more book on server side Java that has example web.xml web app configuration files with plain text passwords, I'm going to go postal.
Re:Plain text passwords in web.xml (Score:2, Interesting)
Re:Plain text passwords in web.xml (Score:2, Informative)
Re:Plain text passwords in web.xml (Score:1)
Re:Plain text passwords in web.xml (Score:4, Informative)
Depending on your choice, the authenticating service can be:
a different passwd file not in
a shadow password file
a NIS setup
a Windows Domain controller
a kerberos setup
and many many more...
JAAS is not simple to setup and it's documentation isn't written for the people who need it the most. Homebrew encryption is easy to break, so people don't bother encrypting. These factors play a big role in the number of plain text password files.
Re:Plain text passwords in web.xml (Score:3, Interesting)
To reduce complexity, the same db user is often the owner of the database schema so has unlimited power to mangle tables and data.
It is kind of ironic to have powerful db server the creators of which put together sofisticated securuty features and always see the databa
Java security documentation (Score:1, Informative)
http://www.cgisecurity.com/development/java.shtml [cgisecurity.com]
IBM red book (Score:1)