X-Loop: [email protected] Subject: bug#437: tomcat8: Tomcat8 fix for CVE-2020-1938 breaks compatibility with Apache2 mod_proxy_ajp Reply-To: Gianluca Bonetti <[email protected]>, [email protected] Resent-From: Gianluca Bonetti <[email protected]> Resent-To: [email protected] Resent-CC: [email protected] X-Loop: [email protected] Resent-Date: Mon, 04 May 2020 20:03:02 +0000 Resent-Message-ID: <[email protected]> Resent-Sender: [email protected] X-Devuan-PR-Message: report 437 X-Devuan-PR-Package: tomcat8 X-Devuan-PR-Keywords: Received: via spool by [email protected] id=B.158862240224149 (code B); Mon, 04 May 2020 20:03:02 +0000 Received: (at submit) by bugs.devuan.org; 4 May 2020 20:00:02 +0000 Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Mon, 04 May 2020 20:00:01 +0000 (UTC) Received: from sys3.prometeoinformatica.it (sys3.prometeoinformatica.it [94.23.203.76]) by vm6.ganeti.dyne.org (Postfix) with ESMTP id 91650F6050A for <[email protected]>; Mon, 4 May 2020 21:54:36 +0200 (CEST) Received: by sys3.prometeoinformatica.it (Postfix, from userid 0) id B57911A86; Mon, 4 May 2020 21:54:35 +0200 (CEST) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Gianluca Bonetti <[email protected]> To: Devuan Bug Tracking System <[email protected]> Message-ID: <158862207573.24044.3823604338219569371.reportbug@sys3.prometeoinformatica.it> X-Mailer: reportbug 7.1.6+devuan2.1 Date: Mon, 04 May 2020 21:54:35 +0200 X-Spam-Status: No, score=3.2 required=5.0 tests=DKIM_ADSP_CUSTOM_MED, FORGED_GMAIL_RCVD,FREEMAIL_FROM,NML_ADSP_CUSTOM_MED,SPF_SOFTFAIL autolearn=disabled version=3.4.2 X-Spam-Level: *** X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Package: tomcat8 Version: 8.5.54-0+deb9u1 Severity: grave Dear Maintainer, Last tomcat8 upgrade, fixing CVE-2020-1938, is breaking the functionalities of Tomcat AJP connector in standard setup. The updated tomcat8 version implements 'secretRequired' parameter in <Connector> tag for config file /etc/tomcat8/server.xml (attached by reportbut) and the implicit default for 'secretRequired' is true. The default value is not explicitly marked in the standard server.xml, nor documented there. However, current apache2 package version 2.4.25-3+deb9u9 does not support secret in mod_proxy_ajp. Hence, to get a working system using AJP, secretRequired has to be set to false in server.xml Apache2 mod_proxy_ajp supports secret since version 2.5, backported to 2.4.42. https://httpd.apache.org/docs/trunk/mod/mod_proxy_ajp.html https://httpd.apache.org/docs/2.4/mod/mod_proxy_ajp.html The solution is either to upgrade the apache2 package, or to have the default for 'secretRequired' set to 'false', with some comments in the server.xml itself. The standard configuration accepts AJP connections from localhost only, and/or iptables rules can applied as well. Adding relevant part of catalina.out to this bug report. Thank you Cheers Gianluca Bonetti -- System Information: Debian Release: 9 Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-12-amd64 (SMP w/8 CPU cores) Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages tomcat8 depends on: ii adduser 3.115 ii debconf [debconf-2.0] 1.5.61 ii lsb-base 4.1+devuan2 ii tomcat8-common 8.5.54-0+deb9u1 ii ucf 3.0036 Versions of packages tomcat8 recommends: ii authbind 2.1.2 ii libtcnative-1 1.2.21-1~deb9u1 Versions of packages tomcat8 suggests: pn tomcat8-admin <none> pn tomcat8-docs <none> pn tomcat8-examples <none> pn tomcat8-user <none> -- Configuration Files: /etc/tomcat8/server.xml changed: <?xml version="1.0" encoding="UTF-8"?> <!-- Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. --> <!-- Note: A "Server" is not itself a "Container", so you may not define subcomponents such as "Valves" at this level. Documentation at /docs/config/server.html --> <Server port="8005" shutdown="SHUTDOWN"> <Listener className="org.apache.catalina.startup.VersionLoggerListener" /> <!-- Security listener. Documentation at /docs/config/listeners.html <Listener className="org.apache.catalina.security.SecurityListener" /> --> <!--APR library loader. Documentation at /docs/apr.html --> <Listener className="org.apache.catalina.core.AprLifecycleListener" SSLEngine="on" /> <!-- Prevent memory leaks due to use of particular java/javax APIs--> <Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener" /> <Listener className="org.apache.catalina.mbeans.GlobalResourcesLifecycleListener" /> <Listener className="org.apache.catalina.core.ThreadLocalLeakPreventionListener" /> <!-- Global JNDI resources Documentation at /docs/jndi-resources-howto.html --> <GlobalNamingResources> <!-- Editable user database that can also be used by UserDatabaseRealm to authenticate users --> <Resource name="UserDatabase" auth="Container" type="org.apache.catalina.UserDatabase" description="User database that can be updated and saved" factory="org.apache.catalina.users.MemoryUserDatabaseFactory" pathname="conf/tomcat-users.xml" /> </GlobalNamingResources> <!-- A "Service" is a collection of one or more "Connectors" that share a single "Container" Note: A "Service" is not itself a "Container", so you may not define subcomponents such as "Valves" at this level. Documentation at /docs/config/service.html --> <Service name="Catalina"> <!--The connectors can use a shared executor, you can define one or more named thread pools--> <!-- <Executor name="tomcatThreadPool" namePrefix="catalina-exec-" maxThreads="150" minSpareThreads="4"/> --> <!-- A "Connector" represents an endpoint by which requests are received and responses are returned. Documentation at : Java HTTP Connector: /docs/config/http.html Java AJP Connector: /docs/config/ajp.html APR (HTTP/AJP) Connector: /docs/apr.html Define a non-SSL/TLS HTTP/1.1 Connector on port 8080 --> <!-- <Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" redirectPort="8443" /> --> <!-- A "Connector" using the shared thread pool--> <!-- <Connector executor="tomcatThreadPool" port="8080" protocol="HTTP/1.1" connectionTimeout="20000" redirectPort="8443" /> --> <!-- Define an SSL/TLS HTTP/1.1 Connector on port 8443 This connector uses the NIO implementation. The default SSLImplementation will depend on the presence of the APR/native library and the useOpenSSL attribute of the AprLifecycleListener. Either JSSE or OpenSSL style configuration may be used regardless of the SSLImplementation selected. JSSE style configuration is used below. --> <!-- <Connector port="8443" protocol="org.apache.coyote.http11.Http11NioProtocol" maxThreads="150" SSLEnabled="true"> <SSLHostConfig> <Certificate certificateKeystoreFile="conf/localhost-rsa.jks" type="RSA" /> </SSLHostConfig> </Connector> --> <!-- Define an SSL/TLS HTTP/1.1 Connector on port 8443 with HTTP/2 This connector uses the APR/native implementation which always uses OpenSSL for TLS. Either JSSE or OpenSSL style configuration may be used. OpenSSL style configuration is used below. --> <!-- <Connector port="8443" protocol="org.apache.coyote.http11.Http11AprProtocol" maxThreads="150" SSLEnabled="true" > <UpgradeProtocol className="org.apache.coyote.http2.Http2Protocol" /> <SSLHostConfig> <Certificate certificateKeyFile="conf/localhost-rsa-key.pem" certificateFile="conf/localhost-rsa-cert.pem" certificateChainFile="conf/localhost-rsa-chain.pem" type="RSA" /> </SSLHostConfig> </Connector> --> <!-- Define an AJP 1.3 Connector on port 8009 --> <Connector protocol="AJP/1.3" secretRequired="false" address="127.0.0.1" port="8009" redirectPort="8443" /> <!-- An Engine represents the entry point (within Catalina) that processes every request. The Engine implementation for Tomcat stand alone analyzes the HTTP headers included with the request, and passes them on to the appropriate Host (virtual host). Documentation at /docs/config/engine.html --> <!-- You should set jvmRoute to support load-balancing via AJP ie : <Engine name="Catalina" defaultHost="localhost" jvmRoute="jvm1"> --> <Engine name="Catalina" defaultHost="localhost"> <!--For clustering, please take a look at documentation at: /docs/cluster-howto.html (simple how to) /docs/config/cluster.html (reference documentation) --> <!-- <Cluster className="org.apache.catalina.ha.tcp.SimpleTcpCluster"/> --> <!-- Use the LockOutRealm to prevent attempts to guess user passwords via a brute-force attack --> <Realm className="org.apache.catalina.realm.LockOutRealm"> <!-- This Realm uses the UserDatabase configured in the global JNDI resources under the key "UserDatabase". Any edits that are performed against this UserDatabase are immediately available for use by the Realm. --> <Realm className="org.apache.catalina.realm.UserDatabaseRealm" resourceName="UserDatabase"/> </Realm> <Host name="localhost" appBase="webapps" unpackWARs="true" autoDeploy="true"> <!-- SingleSignOn valve, share authentication between web applications Documentation at: /docs/config/valve.html --> <!-- <Valve className="org.apache.catalina.authenticator.SingleSignOn" /> --> <!-- Access log processes all example. Documentation at: /docs/config/valve.html Note: The pattern used is equivalent to using pattern="common" --> <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" prefix="localhost_access_log" suffix=".txt" pattern="%h %l %u %t "%r" %s %b" /> </Host> </Engine> </Service> </Server> -- debconf information: tomcat8/username: tomcat8 tomcat8/javaopts: -Djava.awt.headless=true -Xms8g -Xmx8g -XX:+UseG1GC -Dserver=1 -Xdebug -Xrunjdwp:transport=dt_socket,address=8000,server=y,suspend=n tomcat8/groupname: tomcat8 -- catalina.out: 04-May-2020 19:49:31.629 GRAVE [main] org.apache.catalina.core.StandardService.startInternal Failed to start connector [Connector[AJP/1.3-8009]] org.apache.catalina.LifecycleException: Protocol handler start failed at org.apache.catalina.connector.Connector.startInternal(Connector.java:1086) at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183) at org.apache.catalina.core.StandardService.startInternal(StandardService.java:440) at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183) at org.apache.catalina.core.StandardServer.startInternal(StandardServer.java:766) at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183) at org.apache.catalina.startup.Catalina.start(Catalina.java:688) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:343) at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:474) Caused by: java.lang.IllegalArgumentException: The AJP Connector is configured with secretRequired="true" but the secret attribute is either null or "". This combination is not valid. at org.apache.coyote.ajp.AbstractAjpProtocol.start(AbstractAjpProtocol.java:274) at org.apache.catalina.connector.Connector.startInternal(Connector.java:1083) ... 12 more 04-May-2020 19:49:31.630 INFORMAZIONI [main] org.apache.catalina.startup.Catalina.start Server startup in 6947 ms
Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) Content-Type: text/plain; charset=utf-8 X-Loop: [email protected] From: "Devuan bug Tracking System" <[email protected]> To: Gianluca Bonetti <[email protected]> Subject: bug#437: Acknowledgement (tomcat8: Tomcat8 fix for CVE-2020-1938 breaks compatibility with Apache2 mod_proxy_ajp) Message-ID: <[email protected]> References: <158862207573.24044.3823604338219569371.reportbug@sys3.prometeoinformatica.it> X-Devuan-PR-Message: ack 437 X-Devuan-PR-Package: tomcat8 Reply-To: [email protected] Date: Mon, 04 May 2020 20:03:04 +0000 Thank you for filing a new bug report with Devuan. You can follow progress on this bug here: 437: https://bugs.devuan.org/cgi/= bugreport.cgi?bug=3D437. This is an automatically generated reply to let you know your message has been received. Your message is being forwarded to the package maintainers and other interested parties for their attention; they will reply in due course. Your message has been sent to the package maintainer(s): [email protected] If you wish to submit further information on this problem, please send it to [email protected]. Please do not send mail to [email protected] unless you wish to report a problem with the Bug-tracking system. --=20 437: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D437 Devuan Bug Tracking System Contact [email protected] with problems
X-Loop: [email protected] Subject: bug#437: tomcat8: Tomcat8 fix for CVE-2020-1938 breaks compatibility with Apache2 mod_proxy_ajp Reply-To: Mark Hindley <[email protected]>, [email protected] Resent-From: Mark Hindley <[email protected]> Resent-To: [email protected] Resent-CC: [email protected] X-Loop: [email protected] Resent-Date: Tue, 05 May 2020 08:33:01 +0000 Resent-Message-ID: <[email protected]> Resent-Sender: [email protected] X-Devuan-PR-Message: followup 437 X-Devuan-PR-Package: tomcat8 X-Devuan-PR-Keywords: References: <158862207573.24044.3823604338219569371.reportbug@sys3.prometeoinformatica.it> Received: via spool by [email protected] id=B437.158866740313084 (code B ref 437); Tue, 05 May 2020 08:33:01 +0000 Received: (at 437) by bugs.devuan.org; 5 May 2020 08:30:03 +0000 Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Tue, 05 May 2020 08:30:03 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 5CDA1F604B7 for <[email protected]>; Tue, 5 May 2020 10:22:34 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1jVsqV-0004We-4Y; Tue, 05 May 2020 09:22:31 +0100 Received: (nullmailer pid 18591 invoked by uid 1000); Tue, 05 May 2020 08:22:30 -0000 Date: Tue, 5 May 2020 09:22:30 +0100 From: Mark Hindley <[email protected]> To: [email protected], Gianluca Bonetti <[email protected]> Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <158862207573.24044.3823604338219569371.reportbug@sys3.prometeoinformatica.it> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=0.0 required=5.0 tests=FAKE_REPLY_C,SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Control: tags -1 debian On Mon, 04 May 2020 21:54:35 +0200 Gianluca Bonetti <[email protected]> wrote: > Package: tomcat8 > Version: 8.5.54-0+deb9u1 > Severity: grave > > Dear Maintainer, > > Last tomcat8 upgrade, fixing CVE-2020-1938, is breaking the functionalities of Tomcat AJP connector > in standard setup. Gianluca, Thanks for this. However neither tomcat8 nor apache2 are forked packages in Devuan and we use Debian's packages directly. Please report this issue directly to Debian's BTS. Thanks Mark
Received: (at 437) by bugs.devuan.org; 5 May 2020 08:30:03 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Tue, 05 May 2020 08:30:03 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 5CDA1F604B7 for <[email protected]>; Tue, 5 May 2020 10:22:34 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1jVsqV-0004We-4Y; Tue, 05 May 2020 09:22:31 +0100 Received: (nullmailer pid 18591 invoked by uid 1000); Tue, 05 May 2020 08:22:30 -0000 Date: Tue, 5 May 2020 09:22:30 +0100 From: Mark Hindley <[email protected]> To: [email protected], Gianluca Bonetti <[email protected]> Subject: Re: tomcat8: Tomcat8 fix for CVE-2020-1938 breaks compatibility with Apache2 mod_proxy_ajp Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <158862207573.24044.3823604338219569371.reportbug@sys3.prometeoinformatica.it> X-Debbugs-No-Ack: No Thanks User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=0.0 required=5.0 tests=FAKE_REPLY_C,SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Control: tags -1 debian On Mon, 04 May 2020 21:54:35 +0200 Gianluca Bonetti <[email protected]> wrote: > Package: tomcat8 > Version: 8.5.54-0+deb9u1 > Severity: grave > > Dear Maintainer, > > Last tomcat8 upgrade, fixing CVE-2020-1938, is breaking the functionalities of Tomcat AJP connector > in standard setup. Gianluca, Thanks for this. However neither tomcat8 nor apache2 are forked packages in Devuan and we use Debian's packages directly. Please report this issue directly to Debian's BTS. Thanks Mark
X-Loop: [email protected] Subject: bug#437: tomcat8: Tomcat8 fix for CVE-2020-1938 breaks compatibility with Apache2 mod_proxy_ajp Reply-To: Mark Hindley <[email protected]>, [email protected] Resent-From: Mark Hindley <[email protected]> Resent-To: [email protected] Resent-CC: [email protected] X-Loop: [email protected] Resent-Date: Tue, 05 May 2020 08:48:01 +0000 Resent-Message-ID: <[email protected]> Resent-Sender: [email protected] X-Devuan-PR-Message: followup 437 X-Devuan-PR-Package: tomcat8 X-Devuan-PR-Keywords: debian References: <158862207573.24044.3823604338219569371.reportbug@sys3.prometeoinformatica.it> <[email protected]> <158862207573.24044.3823604338219569371.reportbug@sys3.prometeoinformatica.it> Received: via spool by [email protected] id=B437.158866800415122 (code B ref 437); Tue, 05 May 2020 08:48:01 +0000 Received: (at 437) by bugs.devuan.org; 5 May 2020 08:40:04 +0000 Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Tue, 05 May 2020 08:40:04 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 7D37BF604B7 for <[email protected]>; Tue, 5 May 2020 10:27:37 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1jVsvP-0004Yr-HG; Tue, 05 May 2020 09:27:35 +0100 Received: (nullmailer pid 18650 invoked by uid 1000); Tue, 05 May 2020 08:27:34 -0000 Date: Tue, 5 May 2020 09:27:34 +0100 From: Mark Hindley <[email protected]> To: [email protected], Gianluca Bonetti <[email protected]> Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[email protected]> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org On Tue, May 05, 2020 at 09:22:30AM +0100, Mark Hindley wrote: > Control: tags -1 debian https://bugs.debian.org/959747
Received: (at control) by bugs.devuan.org; 21 May 2020 10:20:03 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Thu, 21 May 2020 10:20:03 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id C95B8F608FF for <[email protected]>; Thu, 21 May 2020 12:16:45 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1jbiFn-0007Tu-Tc for [email protected]; Thu, 21 May 2020 11:16:44 +0100 Received: (nullmailer pid 7097 invoked by uid 1000); Thu, 21 May 2020 10:16:43 -0000 Date: Thu, 21 May 2020 11:16:43 +0100 From: Mark Hindley <[email protected]> To: [email protected] Subject: Add forwarded debian bug numbers Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Debbugs-No-Ack: No Thanks User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-0.0 required=5.0 tests=SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org forwarded 437 https://bugs.debian.org/959747 forwarded 426 https://bugs.debian.org/939435 forwarded 433 https://bugs.debian.org/959050 forwarded 437 https://bugs.debian.org/959747 forwarded 316 https://bugs.debian.org/911604 forwarded 350 https://bugs.debian.org/813347 forwarded 428 https://bugs.debian.org/950986 forwarded 463 https://bugs.debian.org/922550
MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) X-Loop: [email protected] From: "Devuan bug Tracking System" <[email protected]> To: Mark Hindley <[email protected]> Subject: bug#437: marked as done (tomcat8: Tomcat8 fix for CVE-2020-1938 breaks compatibility with Apache2 mod_proxy_ajp) Message-ID: <[email protected]> References: <[email protected]> <158862207573.24044.3823604338219569371.reportbug@sys3.prometeoinformatica.it> X-Devuan-PR-Message: closed 437 X-Devuan-PR-Package: tomcat8 X-Devuan-PR-Keywords: debian Reply-To: [email protected] Date: Tue, 02 Jul 2024 07:12:01 +0000 Content-Type: multipart/mixed; boundary="----------=_1719904321-541-0" This is a multi-part message in MIME format... ------------=_1719904321-541-0 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Your message dated Tue, 2 Jul 2024 08:09:35 +0100 with message-id <[email protected]> and subject line Closed in in Debian #959747 has caused the Devuan bug report #437, regarding tomcat8: Tomcat8 fix for CVE-2020-1938 breaks compatibility with = Apache2 mod_proxy_ajp to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) --=20 437: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D437 Devuan Bug Tracking System Contact [email protected] with problems ------------=_1719904321-541-0 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at submit) by bugs.devuan.org; 4 May 2020 20:00:02 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Mon, 04 May 2020 20:00:01 +0000 (UTC) Received: from sys3.prometeoinformatica.it (sys3.prometeoinformatica.it [94.23.203.76]) by vm6.ganeti.dyne.org (Postfix) with ESMTP id 91650F6050A for <[email protected]>; Mon, 4 May 2020 21:54:36 +0200 (CEST) Received: by sys3.prometeoinformatica.it (Postfix, from userid 0) id B57911A86; Mon, 4 May 2020 21:54:35 +0200 (CEST) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Gianluca Bonetti <[email protected]> To: Devuan Bug Tracking System <[email protected]> Subject: tomcat8: Tomcat8 fix for CVE-2020-1938 breaks compatibility with Apache2 mod_proxy_ajp Message-ID: <158862207573.24044.3823604338219569371.reportbug@sys3.prometeoinformatica.it> X-Mailer: reportbug 7.1.6+devuan2.1 Date: Mon, 04 May 2020 21:54:35 +0200 X-Spam-Status: No, score=3.2 required=5.0 tests=DKIM_ADSP_CUSTOM_MED, FORGED_GMAIL_RCVD,FREEMAIL_FROM,NML_ADSP_CUSTOM_MED,SPF_SOFTFAIL autolearn=disabled version=3.4.2 X-Spam-Level: *** X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Package: tomcat8 Version: 8.5.54-0+deb9u1 Severity: grave Dear Maintainer, Last tomcat8 upgrade, fixing CVE-2020-1938, is breaking the functionalities of Tomcat AJP connector in standard setup. The updated tomcat8 version implements 'secretRequired' parameter in <Connector> tag for config file /etc/tomcat8/server.xml (attached by reportbut) and the implicit default for 'secretRequired' is true. The default value is not explicitly marked in the standard server.xml, nor documented there. However, current apache2 package version 2.4.25-3+deb9u9 does not support secret in mod_proxy_ajp. Hence, to get a working system using AJP, secretRequired has to be set to false in server.xml Apache2 mod_proxy_ajp supports secret since version 2.5, backported to 2.4.42. https://httpd.apache.org/docs/trunk/mod/mod_proxy_ajp.html https://httpd.apache.org/docs/2.4/mod/mod_proxy_ajp.html The solution is either to upgrade the apache2 package, or to have the default for 'secretRequired' set to 'false', with some comments in the server.xml itself. The standard configuration accepts AJP connections from localhost only, and/or iptables rules can applied as well. Adding relevant part of catalina.out to this bug report. Thank you Cheers Gianluca Bonetti -- System Information: Debian Release: 9 Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-12-amd64 (SMP w/8 CPU cores) Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages tomcat8 depends on: ii adduser 3.115 ii debconf [debconf-2.0] 1.5.61 ii lsb-base 4.1+devuan2 ii tomcat8-common 8.5.54-0+deb9u1 ii ucf 3.0036 Versions of packages tomcat8 recommends: ii authbind 2.1.2 ii libtcnative-1 1.2.21-1~deb9u1 Versions of packages tomcat8 suggests: pn tomcat8-admin <none> pn tomcat8-docs <none> pn tomcat8-examples <none> pn tomcat8-user <none> -- Configuration Files: /etc/tomcat8/server.xml changed: <?xml version="1.0" encoding="UTF-8"?> <!-- Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. --> <!-- Note: A "Server" is not itself a "Container", so you may not define subcomponents such as "Valves" at this level. Documentation at /docs/config/server.html --> <Server port="8005" shutdown="SHUTDOWN"> <Listener className="org.apache.catalina.startup.VersionLoggerListener" /> <!-- Security listener. Documentation at /docs/config/listeners.html <Listener className="org.apache.catalina.security.SecurityListener" /> --> <!--APR library loader. Documentation at /docs/apr.html --> <Listener className="org.apache.catalina.core.AprLifecycleListener" SSLEngine="on" /> <!-- Prevent memory leaks due to use of particular java/javax APIs--> <Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener" /> <Listener className="org.apache.catalina.mbeans.GlobalResourcesLifecycleListener" /> <Listener className="org.apache.catalina.core.ThreadLocalLeakPreventionListener" /> <!-- Global JNDI resources Documentation at /docs/jndi-resources-howto.html --> <GlobalNamingResources> <!-- Editable user database that can also be used by UserDatabaseRealm to authenticate users --> <Resource name="UserDatabase" auth="Container" type="org.apache.catalina.UserDatabase" description="User database that can be updated and saved" factory="org.apache.catalina.users.MemoryUserDatabaseFactory" pathname="conf/tomcat-users.xml" /> </GlobalNamingResources> <!-- A "Service" is a collection of one or more "Connectors" that share a single "Container" Note: A "Service" is not itself a "Container", so you may not define subcomponents such as "Valves" at this level. Documentation at /docs/config/service.html --> <Service name="Catalina"> <!--The connectors can use a shared executor, you can define one or more named thread pools--> <!-- <Executor name="tomcatThreadPool" namePrefix="catalina-exec-" maxThreads="150" minSpareThreads="4"/> --> <!-- A "Connector" represents an endpoint by which requests are received and responses are returned. Documentation at : Java HTTP Connector: /docs/config/http.html Java AJP Connector: /docs/config/ajp.html APR (HTTP/AJP) Connector: /docs/apr.html Define a non-SSL/TLS HTTP/1.1 Connector on port 8080 --> <!-- <Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" redirectPort="8443" /> --> <!-- A "Connector" using the shared thread pool--> <!-- <Connector executor="tomcatThreadPool" port="8080" protocol="HTTP/1.1" connectionTimeout="20000" redirectPort="8443" /> --> <!-- Define an SSL/TLS HTTP/1.1 Connector on port 8443 This connector uses the NIO implementation. The default SSLImplementation will depend on the presence of the APR/native library and the useOpenSSL attribute of the AprLifecycleListener. Either JSSE or OpenSSL style configuration may be used regardless of the SSLImplementation selected. JSSE style configuration is used below. --> <!-- <Connector port="8443" protocol="org.apache.coyote.http11.Http11NioProtocol" maxThreads="150" SSLEnabled="true"> <SSLHostConfig> <Certificate certificateKeystoreFile="conf/localhost-rsa.jks" type="RSA" /> </SSLHostConfig> </Connector> --> <!-- Define an SSL/TLS HTTP/1.1 Connector on port 8443 with HTTP/2 This connector uses the APR/native implementation which always uses OpenSSL for TLS. Either JSSE or OpenSSL style configuration may be used. OpenSSL style configuration is used below. --> <!-- <Connector port="8443" protocol="org.apache.coyote.http11.Http11AprProtocol" maxThreads="150" SSLEnabled="true" > <UpgradeProtocol className="org.apache.coyote.http2.Http2Protocol" /> <SSLHostConfig> <Certificate certificateKeyFile="conf/localhost-rsa-key.pem" certificateFile="conf/localhost-rsa-cert.pem" certificateChainFile="conf/localhost-rsa-chain.pem" type="RSA" /> </SSLHostConfig> </Connector> --> <!-- Define an AJP 1.3 Connector on port 8009 --> <Connector protocol="AJP/1.3" secretRequired="false" address="127.0.0.1" port="8009" redirectPort="8443" /> <!-- An Engine represents the entry point (within Catalina) that processes every request. The Engine implementation for Tomcat stand alone analyzes the HTTP headers included with the request, and passes them on to the appropriate Host (virtual host). Documentation at /docs/config/engine.html --> <!-- You should set jvmRoute to support load-balancing via AJP ie : <Engine name="Catalina" defaultHost="localhost" jvmRoute="jvm1"> --> <Engine name="Catalina" defaultHost="localhost"> <!--For clustering, please take a look at documentation at: /docs/cluster-howto.html (simple how to) /docs/config/cluster.html (reference documentation) --> <!-- <Cluster className="org.apache.catalina.ha.tcp.SimpleTcpCluster"/> --> <!-- Use the LockOutRealm to prevent attempts to guess user passwords via a brute-force attack --> <Realm className="org.apache.catalina.realm.LockOutRealm"> <!-- This Realm uses the UserDatabase configured in the global JNDI resources under the key "UserDatabase". Any edits that are performed against this UserDatabase are immediately available for use by the Realm. --> <Realm className="org.apache.catalina.realm.UserDatabaseRealm" resourceName="UserDatabase"/> </Realm> <Host name="localhost" appBase="webapps" unpackWARs="true" autoDeploy="true"> <!-- SingleSignOn valve, share authentication between web applications Documentation at: /docs/config/valve.html --> <!-- <Valve className="org.apache.catalina.authenticator.SingleSignOn" /> --> <!-- Access log processes all example. Documentation at: /docs/config/valve.html Note: The pattern used is equivalent to using pattern="common" --> <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" prefix="localhost_access_log" suffix=".txt" pattern="%h %l %u %t "%r" %s %b" /> </Host> </Engine> </Service> </Server> -- debconf information: tomcat8/username: tomcat8 tomcat8/javaopts: -Djava.awt.headless=true -Xms8g -Xmx8g -XX:+UseG1GC -Dserver=1 -Xdebug -Xrunjdwp:transport=dt_socket,address=8000,server=y,suspend=n tomcat8/groupname: tomcat8 -- catalina.out: 04-May-2020 19:49:31.629 GRAVE [main] org.apache.catalina.core.StandardService.startInternal Failed to start connector [Connector[AJP/1.3-8009]] org.apache.catalina.LifecycleException: Protocol handler start failed at org.apache.catalina.connector.Connector.startInternal(Connector.java:1086) at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183) at org.apache.catalina.core.StandardService.startInternal(StandardService.java:440) at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183) at org.apache.catalina.core.StandardServer.startInternal(StandardServer.java:766) at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183) at org.apache.catalina.startup.Catalina.start(Catalina.java:688) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:343) at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:474) Caused by: java.lang.IllegalArgumentException: The AJP Connector is configured with secretRequired="true" but the secret attribute is either null or "". This combination is not valid. at org.apache.coyote.ajp.AbstractAjpProtocol.start(AbstractAjpProtocol.java:274) at org.apache.catalina.connector.Connector.startInternal(Connector.java:1083) ... 12 more 04-May-2020 19:49:31.630 INFORMAZIONI [main] org.apache.catalina.startup.Catalina.start Server startup in 6947 ms ------------=_1719904321-541-0 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at 437-done) by bugs.devuan.org; 2 Jul 2024 07:10:33 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2a01:4f9:fff1:13::5fd9:f9e4] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Tue, 02 Jul 2024 07:10:33 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id mWZrIrGng2YpKwAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Tue, 02 Jul 2024 07:09:37 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 5D1D244E; Tue, 2 Jul 2024 07:09:37 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id B595D386 for <[email protected]>; Tue, 2 Jul 2024 07:09:36 +0000 (UTC) Received: from hindley.org.uk (apollo.hindleynet [192.168.1.3]) by mx.hindley.org.uk (Postfix) with SMTP id 49A9A11A for <[email protected]>; Tue, 2 Jul 2024 08:09:35 +0100 (BST) Received: (nullmailer pid 11321 invoked by uid 1000); Tue, 02 Jul 2024 07:09:35 -0000 Date: Tue, 2 Jul 2024 08:09:35 +0100 From: Mark Hindley <[email protected]> To: [email protected] Subject: Closed in in Debian #959747 Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Debbugs-No-Ack: No Thanks Tomcat8 removed in Debian. Closing related bugs. Mark ------------=_1719904321-541-0--
MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) X-Loop: [email protected] From: "Devuan bug Tracking System" <[email protected]> To: Gianluca Bonetti <[email protected]> Subject: bug#437 closed by Mark Hindley <[email protected]> (Closed in in Debian #959747) Message-ID: <[email protected]> References: <[email protected]> <158862207573.24044.3823604338219569371.reportbug@sys3.prometeoinformatica.it> X-Devuan-PR-Message: they-closed 437 X-Devuan-PR-Package: tomcat8 X-Devuan-PR-Keywords: debian Reply-To: [email protected] Date: Tue, 02 Jul 2024 07:12:02 +0000 Content-Type: multipart/mixed; boundary="----------=_1719904322-541-1" This is a multi-part message in MIME format... ------------=_1719904322-541-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" This is an automatic notification regarding your bug report which was filed against the tomcat8 package: #437: tomcat8: Tomcat8 fix for CVE-2020-1938 breaks compatibility with Apac= he2 mod_proxy_ajp It has been closed by Mark Hindley <[email protected]>. Their explanation is attached below along with your original report. If this explanation is unsatisfactory and you have not received a better one in a separate message then please contact Mark Hindley <mark@hin= dley.org.uk> by replying to this email. --=20 437: https://bugs.devuan.org/cgi/bugreport.cgi?bug=3D437 Devuan Bug Tracking System Contact [email protected] with problems ------------=_1719904322-541-1 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at 437-done) by bugs.devuan.org; 2 Jul 2024 07:10:33 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2a01:4f9:fff1:13::5fd9:f9e4] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Tue, 02 Jul 2024 07:10:33 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id mWZrIrGng2YpKwAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Tue, 02 Jul 2024 07:09:37 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 5D1D244E; Tue, 2 Jul 2024 07:09:37 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id B595D386 for <[email protected]>; Tue, 2 Jul 2024 07:09:36 +0000 (UTC) Received: from hindley.org.uk (apollo.hindleynet [192.168.1.3]) by mx.hindley.org.uk (Postfix) with SMTP id 49A9A11A for <[email protected]>; Tue, 2 Jul 2024 08:09:35 +0100 (BST) Received: (nullmailer pid 11321 invoked by uid 1000); Tue, 02 Jul 2024 07:09:35 -0000 Date: Tue, 2 Jul 2024 08:09:35 +0100 From: Mark Hindley <[email protected]> To: [email protected] Subject: Closed in in Debian #959747 Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Debbugs-No-Ack: No Thanks Tomcat8 removed in Debian. Closing related bugs. Mark ------------=_1719904322-541-1 Content-Type: message/rfc822 Content-Disposition: inline Content-Transfer-Encoding: 7bit Received: (at submit) by bugs.devuan.org; 4 May 2020 20:00:02 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Mon, 04 May 2020 20:00:01 +0000 (UTC) Received: from sys3.prometeoinformatica.it (sys3.prometeoinformatica.it [94.23.203.76]) by vm6.ganeti.dyne.org (Postfix) with ESMTP id 91650F6050A for <[email protected]>; Mon, 4 May 2020 21:54:36 +0200 (CEST) Received: by sys3.prometeoinformatica.it (Postfix, from userid 0) id B57911A86; Mon, 4 May 2020 21:54:35 +0200 (CEST) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Gianluca Bonetti <[email protected]> To: Devuan Bug Tracking System <[email protected]> Subject: tomcat8: Tomcat8 fix for CVE-2020-1938 breaks compatibility with Apache2 mod_proxy_ajp Message-ID: <158862207573.24044.3823604338219569371.reportbug@sys3.prometeoinformatica.it> X-Mailer: reportbug 7.1.6+devuan2.1 Date: Mon, 04 May 2020 21:54:35 +0200 X-Spam-Status: No, score=3.2 required=5.0 tests=DKIM_ADSP_CUSTOM_MED, FORGED_GMAIL_RCVD,FREEMAIL_FROM,NML_ADSP_CUSTOM_MED,SPF_SOFTFAIL autolearn=disabled version=3.4.2 X-Spam-Level: *** X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Package: tomcat8 Version: 8.5.54-0+deb9u1 Severity: grave Dear Maintainer, Last tomcat8 upgrade, fixing CVE-2020-1938, is breaking the functionalities of Tomcat AJP connector in standard setup. The updated tomcat8 version implements 'secretRequired' parameter in <Connector> tag for config file /etc/tomcat8/server.xml (attached by reportbut) and the implicit default for 'secretRequired' is true. The default value is not explicitly marked in the standard server.xml, nor documented there. However, current apache2 package version 2.4.25-3+deb9u9 does not support secret in mod_proxy_ajp. Hence, to get a working system using AJP, secretRequired has to be set to false in server.xml Apache2 mod_proxy_ajp supports secret since version 2.5, backported to 2.4.42. https://httpd.apache.org/docs/trunk/mod/mod_proxy_ajp.html https://httpd.apache.org/docs/2.4/mod/mod_proxy_ajp.html The solution is either to upgrade the apache2 package, or to have the default for 'secretRequired' set to 'false', with some comments in the server.xml itself. The standard configuration accepts AJP connections from localhost only, and/or iptables rules can applied as well. Adding relevant part of catalina.out to this bug report. Thank you Cheers Gianluca Bonetti -- System Information: Debian Release: 9 Architecture: amd64 (x86_64) Kernel: Linux 4.9.0-12-amd64 (SMP w/8 CPU cores) Locale: LANG=it_IT.UTF-8, LC_CTYPE=it_IT.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages tomcat8 depends on: ii adduser 3.115 ii debconf [debconf-2.0] 1.5.61 ii lsb-base 4.1+devuan2 ii tomcat8-common 8.5.54-0+deb9u1 ii ucf 3.0036 Versions of packages tomcat8 recommends: ii authbind 2.1.2 ii libtcnative-1 1.2.21-1~deb9u1 Versions of packages tomcat8 suggests: pn tomcat8-admin <none> pn tomcat8-docs <none> pn tomcat8-examples <none> pn tomcat8-user <none> -- Configuration Files: /etc/tomcat8/server.xml changed: <?xml version="1.0" encoding="UTF-8"?> <!-- Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. --> <!-- Note: A "Server" is not itself a "Container", so you may not define subcomponents such as "Valves" at this level. Documentation at /docs/config/server.html --> <Server port="8005" shutdown="SHUTDOWN"> <Listener className="org.apache.catalina.startup.VersionLoggerListener" /> <!-- Security listener. Documentation at /docs/config/listeners.html <Listener className="org.apache.catalina.security.SecurityListener" /> --> <!--APR library loader. Documentation at /docs/apr.html --> <Listener className="org.apache.catalina.core.AprLifecycleListener" SSLEngine="on" /> <!-- Prevent memory leaks due to use of particular java/javax APIs--> <Listener className="org.apache.catalina.core.JreMemoryLeakPreventionListener" /> <Listener className="org.apache.catalina.mbeans.GlobalResourcesLifecycleListener" /> <Listener className="org.apache.catalina.core.ThreadLocalLeakPreventionListener" /> <!-- Global JNDI resources Documentation at /docs/jndi-resources-howto.html --> <GlobalNamingResources> <!-- Editable user database that can also be used by UserDatabaseRealm to authenticate users --> <Resource name="UserDatabase" auth="Container" type="org.apache.catalina.UserDatabase" description="User database that can be updated and saved" factory="org.apache.catalina.users.MemoryUserDatabaseFactory" pathname="conf/tomcat-users.xml" /> </GlobalNamingResources> <!-- A "Service" is a collection of one or more "Connectors" that share a single "Container" Note: A "Service" is not itself a "Container", so you may not define subcomponents such as "Valves" at this level. Documentation at /docs/config/service.html --> <Service name="Catalina"> <!--The connectors can use a shared executor, you can define one or more named thread pools--> <!-- <Executor name="tomcatThreadPool" namePrefix="catalina-exec-" maxThreads="150" minSpareThreads="4"/> --> <!-- A "Connector" represents an endpoint by which requests are received and responses are returned. Documentation at : Java HTTP Connector: /docs/config/http.html Java AJP Connector: /docs/config/ajp.html APR (HTTP/AJP) Connector: /docs/apr.html Define a non-SSL/TLS HTTP/1.1 Connector on port 8080 --> <!-- <Connector port="8080" protocol="HTTP/1.1" connectionTimeout="20000" redirectPort="8443" /> --> <!-- A "Connector" using the shared thread pool--> <!-- <Connector executor="tomcatThreadPool" port="8080" protocol="HTTP/1.1" connectionTimeout="20000" redirectPort="8443" /> --> <!-- Define an SSL/TLS HTTP/1.1 Connector on port 8443 This connector uses the NIO implementation. The default SSLImplementation will depend on the presence of the APR/native library and the useOpenSSL attribute of the AprLifecycleListener. Either JSSE or OpenSSL style configuration may be used regardless of the SSLImplementation selected. JSSE style configuration is used below. --> <!-- <Connector port="8443" protocol="org.apache.coyote.http11.Http11NioProtocol" maxThreads="150" SSLEnabled="true"> <SSLHostConfig> <Certificate certificateKeystoreFile="conf/localhost-rsa.jks" type="RSA" /> </SSLHostConfig> </Connector> --> <!-- Define an SSL/TLS HTTP/1.1 Connector on port 8443 with HTTP/2 This connector uses the APR/native implementation which always uses OpenSSL for TLS. Either JSSE or OpenSSL style configuration may be used. OpenSSL style configuration is used below. --> <!-- <Connector port="8443" protocol="org.apache.coyote.http11.Http11AprProtocol" maxThreads="150" SSLEnabled="true" > <UpgradeProtocol className="org.apache.coyote.http2.Http2Protocol" /> <SSLHostConfig> <Certificate certificateKeyFile="conf/localhost-rsa-key.pem" certificateFile="conf/localhost-rsa-cert.pem" certificateChainFile="conf/localhost-rsa-chain.pem" type="RSA" /> </SSLHostConfig> </Connector> --> <!-- Define an AJP 1.3 Connector on port 8009 --> <Connector protocol="AJP/1.3" secretRequired="false" address="127.0.0.1" port="8009" redirectPort="8443" /> <!-- An Engine represents the entry point (within Catalina) that processes every request. The Engine implementation for Tomcat stand alone analyzes the HTTP headers included with the request, and passes them on to the appropriate Host (virtual host). Documentation at /docs/config/engine.html --> <!-- You should set jvmRoute to support load-balancing via AJP ie : <Engine name="Catalina" defaultHost="localhost" jvmRoute="jvm1"> --> <Engine name="Catalina" defaultHost="localhost"> <!--For clustering, please take a look at documentation at: /docs/cluster-howto.html (simple how to) /docs/config/cluster.html (reference documentation) --> <!-- <Cluster className="org.apache.catalina.ha.tcp.SimpleTcpCluster"/> --> <!-- Use the LockOutRealm to prevent attempts to guess user passwords via a brute-force attack --> <Realm className="org.apache.catalina.realm.LockOutRealm"> <!-- This Realm uses the UserDatabase configured in the global JNDI resources under the key "UserDatabase". Any edits that are performed against this UserDatabase are immediately available for use by the Realm. --> <Realm className="org.apache.catalina.realm.UserDatabaseRealm" resourceName="UserDatabase"/> </Realm> <Host name="localhost" appBase="webapps" unpackWARs="true" autoDeploy="true"> <!-- SingleSignOn valve, share authentication between web applications Documentation at: /docs/config/valve.html --> <!-- <Valve className="org.apache.catalina.authenticator.SingleSignOn" /> --> <!-- Access log processes all example. Documentation at: /docs/config/valve.html Note: The pattern used is equivalent to using pattern="common" --> <Valve className="org.apache.catalina.valves.AccessLogValve" directory="logs" prefix="localhost_access_log" suffix=".txt" pattern="%h %l %u %t "%r" %s %b" /> </Host> </Engine> </Service> </Server> -- debconf information: tomcat8/username: tomcat8 tomcat8/javaopts: -Djava.awt.headless=true -Xms8g -Xmx8g -XX:+UseG1GC -Dserver=1 -Xdebug -Xrunjdwp:transport=dt_socket,address=8000,server=y,suspend=n tomcat8/groupname: tomcat8 -- catalina.out: 04-May-2020 19:49:31.629 GRAVE [main] org.apache.catalina.core.StandardService.startInternal Failed to start connector [Connector[AJP/1.3-8009]] org.apache.catalina.LifecycleException: Protocol handler start failed at org.apache.catalina.connector.Connector.startInternal(Connector.java:1086) at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183) at org.apache.catalina.core.StandardService.startInternal(StandardService.java:440) at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183) at org.apache.catalina.core.StandardServer.startInternal(StandardServer.java:766) at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:183) at org.apache.catalina.startup.Catalina.start(Catalina.java:688) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.apache.catalina.startup.Bootstrap.start(Bootstrap.java:343) at org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:474) Caused by: java.lang.IllegalArgumentException: The AJP Connector is configured with secretRequired="true" but the secret attribute is either null or "". This combination is not valid. at org.apache.coyote.ajp.AbstractAjpProtocol.start(AbstractAjpProtocol.java:274) at org.apache.catalina.connector.Connector.startInternal(Connector.java:1083) ... 12 more 04-May-2020 19:49:31.630 INFORMAZIONI [main] org.apache.catalina.startup.Catalina.start Server startup in 6947 ms ------------=_1719904322-541-1--
Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.
Devuan Bugs Owner <[email protected]>.
Last modified:
Sun, 1 Dec 2024 00:39:02 UTC