Release Notes 1.0.1
for use with Red Hat JBoss Web Server 1.0.1
Abstract
1. Introduction Copy linkLink copied to clipboard!
1.1. Overview Copy linkLink copied to clipboard!
Apache Tomcat 5.5.28: Apache Tomcat is an implementation of the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Apache Tomcat version 5.5 implements the Servlet 2.4 and JavaServer Pages 2.0 specifications.Note
The default Red Hat Enterprise Linux 5 installation contains Apache Tomcat 5.5.23.Apache Tomcat 6.0.24: Apache Tomcat is an implementation of the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Apache Tomcat version 6.0 implements the Servlet 2.5 and JavaServer Pages 2.1 specifications.Apache Tomcat Native 1.1.19: Tomcat can use the Apache Portable Runtime to provide superior scalability, performance, and better integration with native server technologies. The Apache Portable Runtime is a highly portable library that is at the heart of Apache HTTP Server 2.x. APR has many uses, including access to advanced IO functionality (such as sendfile, epoll and OpenSSL), OS level functionality (random number generation, system status, etc), and native process handling (shared memory, NT pipes and Unix sockets). This package contains the Tomcat native library which provides support for using APR in Tomcat.Apache Tomcat Connector (mod_jk) 1.2.28: Apache Tomcat Connector (mod_jk) is a bridge between Apache Httpd and Apache Tomcat using binary AJP protocol. It also contains a load balancer, which provides clustering and fault tolerance.Apache HTTP Server 2.2.14: The Apache HTTP Server Project is an effort to develop and maintain an open-source HTTP server for modern operating systems. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services in sync with the current HTTP standards.Note
The default Red Hat Enterprise Linux 5 installation contains Apache HTTP Server 2.2.3-31.
- Red Hat Enterprise Linux 4, latest update (x86, x86_64)
- Red Hat Enterprise Linux 5, latest update (x86, x86_64)
- Solaris 9 (x86, SPARC32, SPARC64)
- Solaris 10 (x86, x86_64, SPARC64)
- Windows Server 2003 SP2 (x86, x86_64)
- Windows Server 2008 R2 (x86, x86_64)
Important
2. Installation Notes Copy linkLink copied to clipboard!
Important
yum remove Enterprise Application Platform before installing Enterprise Web Server.
2.1. Installation Notes for Red Hat Enterprise Linux Copy linkLink copied to clipboard!
rpm file; however we will also discuss installation via the zip package.
up2date java-<version>-<vendor>
up2date java-<version>-<vendor>
<version> is 1.6.0 and <vendor> can be sun or ibm.
yum install java-<version>-<vendor>
yum install java-<version>-<vendor>
<version> is 1.6.0 and <vendor> can be sun, ibm or openjdk. Please note that OpenJDK is only available for version 1.6.0.
alternatives --config java alternatives --config javac
alternatives --config java
alternatives --config javac
Important
java and javac commands will now be using the same JDK as well.
- If you are subscribed to the
Red Hat Application Stackchannel, you will need to disable that channel before installing the JBoss Enterprise Web Server. - Subscribe to the JBoss Enterprise Web Server channel: Red Hat Enterprise Linux 4 ews or Red Hat Enterprise Linux 5 ewsThe available channels for Red Hat Enterprise Linux 4 are:
- jb-ews-1-i386-es-4-rpm
- jb-ews-1-x86_64-as-4-rpm
- jb-ews-1-i386-es-4-rpm
- jb-ews-x86_64-es-4-rpm
The avaliable channels for Red Hat Enterprise Linux 5 are:- jb-ews-1-i386-server-5-rpm
- jb-ews-1-x86_64-server-5-rpm
- Install the packages: tomcat5, tomcat6, tomcat-native, httpd22 and mod_jkOn Red Hat Enterprise Linux 4 to install the packages, execute:
up2date tomcat6 tomcat6-webapps tomcat6-admin-webapps tomcat5 tomcat5-webapps tomcat5-admin-webapps ecj tomcat-native httpd22 mod_jk-ap20
up2date tomcat6 tomcat6-webapps tomcat6-admin-webapps tomcat5 tomcat5-webapps tomcat5-admin-webapps ecj tomcat-native httpd22 mod_jk-ap20Copy to Clipboard Copied! Toggle word wrap Toggle overflow - On Red Hat Enterprise Linux 5, to install the Tomcat 5 packages, you must make the following modification to the
/etc/yum.conffile. Comment out the option:exactarch=1
exactarch=1Copy to Clipboard Copied! Toggle word wrap Toggle overflow Note
This change should be reverted when installation is complete to return yum configuration to the default settings.Then install the packages:yum install tomcat6 tomcat6-webapps tomcat6-admin-webapps tomcat5.noarch tomcat5-webapps.noarch tomcat5-admin-webapps.noarch tomcat-native httpd mod_jk-ap20
yum install tomcat6 tomcat6-webapps tomcat6-admin-webapps tomcat5.noarch tomcat5-webapps.noarch tomcat5-admin-webapps.noarch tomcat-native httpd mod_jk-ap20Copy to Clipboard Copied! Toggle word wrap Toggle overflow
- Download the JBoss Enterprise Web Server zip file from the CSP site that is correct for your operating system and architecture.
- Unzip the file.
Important
2.2. Red Hat Enterprise Linux directory structure Copy linkLink copied to clipboard!
2.3. Running the Installation Copy linkLink copied to clipboard!
2.3.1. Running a RPM Installation Copy linkLink copied to clipboard!
Tomcat can be started, stopped, and configured to start automatically at boot time either from the command line or using a graphical tool.
tomcat5 or tomcat6 services can be started and stopped using the service command as root on a console window (as is typical of a network service):
tomcat5 service:
service tomcat5 start
service tomcat5 start
service tomcat5 stop
service tomcat5 stop
tomcat6 service:
service tomcat6 start
service tomcat6 start
service tomcat6 stop
service tomcat6 stop
su -s /bin/bash tomcat system command to deploy the application under the webapps directory. Alternatively, a developer can be listed in the tomcat user group by the system administrator. The best approach is to use the Web Console (URL above) to deploy the application.
chkconfig command (see the chkconfig man page for further details).
/etc/sysconfig/tomcat5 file for Tomcat version 5 and the /etc/sysconfig/tomcat6 file for Tomcat version 6.
The HTTP Server can be started, stopped, and configured to start automatically at boot time either from the command line or using a graphical tool.
service command as root on a console window (as is typical of a network service):
service httpd22 start
service httpd22 start
service httpd22 stop
service httpd22 stop
service httpd start
service httpd start
service httpd stop
service httpd stop
/etc/sysconfig/httpd22 file on Red Hat Enterprise Linux 4 and the /etc/sysconfig/httpd file on Red Hat Enterprise Linux 5.
To load the mod_jk module, the file /etc/httpd22/conf/httpd.conf on Red Hat Enterprise Linux 4 or the file /etc/httpd/conf/httpd.conf on Red Hat Enterprise Linux 5 needs to be updated, and a workers.properties file needs to be added in that directory. See /usr/share/doc/mod_jk-ap20-1.2.28/mod_jk.conf.sample and /usr/share/doc/mod_jk-ap20-1.2.28/workers.properties.sample for examples of how this can be achieved.
To use log4j for logging in Tomcat 6, install the tomcat6-log4j rpm file.
To use log4j for logging in Tomcat 5, you must copy the appropriate files from the Tomcat 6 distribution included in JBoss Enterprise Application Platform 1.0.1. Copy log4j.jar from tomcat6/extras into tomcat5/common/lib. Copy log4j.properties from tomcat6/extras files into tomcat5/common/classes.
Edit /etc/sysconfig/tomcat5 file for Tomcat 5 or /etc/sysconfig/tomcat6 for Tomcat 6 and add the LD_LIBRARY_PATH variable so that it points to the library correct library:
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/lib64/
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/lib64/
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/lib/
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/lib/
2.3.2. Running a ZIP Installation Copy linkLink copied to clipboard!
After extracting the zip file, check to see if a user called tomcat exists on the system by running the following command:
id tomcat
id tomcat
groupadd -g 91 -r tomcat useradd -c "Tomcat" -u 91 -g tomcat -s /bin/sh -r -d /home/tomcat tomcat
groupadd -g 91 -r tomcat
useradd -c "Tomcat" -u 91 -g tomcat -s /bin/sh -r -d /home/tomcat tomcat
tomcat user will be running Tomcat, then the ownership of the tomcat directories will need to be changed to reflect this:
chown -R tomcat:tomcat tomcat5
chown -R tomcat:tomcat tomcat5
chown -R tomcat:tomcat tomcat6
chown -R tomcat:tomcat tomcat6
tomcat user has execution permission to the tomcat install path.
JAVA_HOME variable must now be set and this can be achieved by either modifying your .bashrc file or by modifying the Tomcat catalina.sh file.
.bashrc file, add the following line with the correct path to suit your systems configuration (a path is provided here as an example only):
export JAVA_HOME=/usr/lib/jvm/java
export JAVA_HOME=/usr/lib/jvm/java
tomcat5/bin/catalina.sh or tomcat6/bin/catalina.sh file (depending on the version of Tomcat installed), add the following line with the correct path to suit your systems configuration (a path is provided here as an example only):
JAVA_HOME=/usr/lib/jvm/java
JAVA_HOME=/usr/lib/jvm/java
tomcat:
sh startup.sh
sh startup.sh
sh shutdown.sh
sh shutdown.sh
In order to run the HTTP Server, the distcache and pcre rpm packages must be installed as they are a requirement of mod_ssl. To check if these dependencies are already installed, execute the following in a command prompt:
rpm -q distcache pcre
rpm -q distcache pcre
up2date distcache up2date pcre
up2date distcache
up2date pcre
yum install distcache yum install pcre
yum install distcache
yum install pcre
y key.
rpm -q distcache rpm -q pcre
rpm -q distcache
rpm -q pcre
httpd directory and run the post install script by executing the following:
./.postinstall
./.postinstall
apache exists on the system by running the following command:
id apache
id apache
groupadd -g 91 -r apache 2> /dev/null || : useradd -c "Apache" -u 91 -g apache -s /bin/sh -r -d /home/apache apache 2> /dev/null || :
groupadd -g 91 -r apache 2> /dev/null || :
useradd -c "Apache" -u 91 -g apache -s /bin/sh -r -d /home/apache apache 2> /dev/null || :
apache user will be running the httpd service, then the ownership of the HTTP directories will need to be changed to reflect this:
chown -R apache:apache httpd
chown -R apache:apache httpd
apache user has execution permission to the HTTP server install path.
httpd directory and executing:
su -m -c "./sbin/apachectl start"
su -m -c "./sbin/apachectl start"
su -m -c "./sbin/apachectl stop"
su -m -c "./sbin/apachectl stop"
To load the mod_jk module, the file httpd/conf/httpd.conf needs to be updated, and a workers.properties file needs to be added in that directory. See doc/mod_jk/mod_jk.conf.sample and doc/mod_jk//workers.properties.sample for examples of how this can be achieved.
The native library for Tomcat 6 is setup to be used by default, with the LD_LIBRARY_PATH and -Djava.library.path having been set accordingly within the catalina.sh file.
INFO: The Apache Tomcat Native library which allows optimal performance in production environments was not found on the java.library.path
INFO: The Apache Tomcat Native library which allows optimal performance in production environments was not found on the java.library.path
In order to use log4j logging in Tomcat 6, copy the content of the extras/ directory into the lib/ directory and restart Tomcat.
2.4. Installation Notes for Microsoft Windows Copy linkLink copied to clipboard!
2.4.1. Prerequisites Copy linkLink copied to clipboard!
- Java SDK 1.6
- System environment variables:
JAVA_HOME- The install location of Java SDK 1.6.
TMP- Temporary directory.
TEMP- Temporary directory.
You must use a local administrator account to set up a system environment variable.Go to Control Panel > System and click on the Advanced tab. Click the button. Click the for System Variables, and enter the requiredJAVA_HOME,TMPandTEMPname-value pairs.
2.4.2. Installing Enterprise Web Server Copy linkLink copied to clipboard!
- Download the JBoss Enterprise Web Server zip file from the CSP site that is correct for your operating system and architecture.
- Unzip the Enterprise Web Server binary inside
C:\Program Files.To extract the.ziparchive, right-click on the file and selectExtract All.... Click . When prompted for the extract location, click and navigate to theC:\Program Filesdirectory. Click .Your files will be extracted toC:\Program Files\Red Hat\Enterprise Web Server. - Run JBoss Enterprise Web Server as an administrator:
- Run the Command Prompt as an administrator. Click on > > . Right-click on Command Prompt and select
Run as administrator.Note
You will need to selectRun as administratoreven if you are logged in as an administrator.Note
Windows Server 2003 does not have the User Account Control concept, so you will only need to run the Command Prompt (cmd.exe). - Inside the Command Prompt, type the following to move to the
etcdirectory of your Enterprise Web Server installation:cd /D "C:\Program Files\Red Hat\Enterprise Web Server\etc"
C:\> cd /D "C:\Program Files\Red Hat\Enterprise Web Server\etc"Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Run the post-installation script by typing:
call postinstall.bat
C:\> call postinstall.batCopy to Clipboard Copied! Toggle word wrap Toggle overflow This script creates the required symbolic links (Junction Points) for temporary logging and configuration directories.
2.4.3. Installing services Copy linkLink copied to clipboard!
Installing Apache Httpd as a service
- Run the Command Prompt as administrator. Click on > > . Right-click on Command Prompt and select
Run as administrator. - Move to the
bindirectory of your new installation:cd /D "C:\Program Files\Red Hat\Enterprise Web Server\bin"
C:\> cd /D "C:\Program Files\Red Hat\Enterprise Web Server\bin"Copy to Clipboard Copied! Toggle word wrap Toggle overflow Then type the following:httpd -k install
C:\> httpd -k installCopy to Clipboard Copied! Toggle word wrap Toggle overflow Note
This step can cause a Firewall security dialog prompt to allow networking access for the Apache Httpd service. Click if you wish to access this service from the network.Note
By default, Apache Httpd is configured to listen on port 80. If you have Microsoft IIS installed, ensure either that:World Wide Web...service is stopped and the Startup Type is set toManualWorld Wide Web...service is configured to listen on a different port
Alternatively, you can edit thehttpd.conffile before installing the service and change theListendirective to a port that will not collide with the Internet Information Service listening ports.
Installing Apache Tomcat as a service
- Run the Command Prompt as administrator. Click on > > . Right-click on Command Prompt and select
Run as administrator.Note
On 64-bit Windows, you need to use the 64-bit version of the Command Prompt (cmd.exe). Running thecmdcommand from a 32-bit application launches a 32-bit Command Prompt instance. This causes the service setup script to fail with a File Not Found warning. - Move to the
sbindirectory in your JBoss Enterprise Web Server installation:cd /D "C:\Program Files\Red Hat\Enterprise Web Server\sbin"
C:\> cd /D "C:\Program Files\Red Hat\Enterprise Web Server\sbin"Copy to Clipboard Copied! Toggle word wrap Toggle overflow Then type the following to install Apache Tomcat 6:call service6.bat install
C:\> call service6.bat installCopy to Clipboard Copied! Toggle word wrap Toggle overflow You can check the service parameters by typingtomcat6w.exe.Note
You can install Apache Tomcat 5.5 instead with thecall service5.bat installcommand, and check its service parameters withtomcat5w.exe.
2.4.3.1. Service security settings Copy linkLink copied to clipboard!
C:\Program Files\Red Hat folder and all of its subfolders.
For Windows Server 2003:
- Right-click on the
C:\Program Files\Red Hatfolder and click onProperties. - Select the
Securitytab. - Click the button and type in
LOCAL SERVICE. - Check the
Full Controlcheck box for the newLOCAL SERVICEaccount. - Click the button.
- Inside the Advanced Security Settings for Red Hat dialog, check the
Replace permissions on all child objects...check box and click the button.
2.5. Windows directory structure Copy linkLink copied to clipboard!
- The
binandsbindirectories contain the executable files for Apache HTTP Server and Tomcat. - The
etcdirectory contains configuration files for Apache HTTP Server and the post-installation script. - The
sharedirectory contains Apache Tomcat 5 and 6 installations and shared Java JARs. - The
varcontains two sub-directories:log- This directory contains the log files for Apache HTTP Server and Tomcat.
www- Apache HTTP Server looks in this directory for web content in the
defaultconfiguration.
2.6. Installation Notes for the Solaris Operating System Copy linkLink copied to clipboard!
package file; however we will also discuss installation via the zip package.
Note
srpms.
2.6.1. Installation using the Solaris package Copy linkLink copied to clipboard!
gunzip and pkgadd commands. The commands will be:
gunzip RHATews-1.0.0*-solaris10-i386.package.gz
gunzip RHATews-1.0.0*-solaris10-i386.package.gz
pkgadd -d RHATews-1.0.0*-solaris10-i386.package
pkgadd -d RHATews-1.0.0*-solaris10-i386.package
The following packages are available: 1 RHATews JBoss Enterprise Web Server (i386) 1.0.0,REV=2.el5 Select package(s) you wish to process (or 'all' to process all packages). (default: all) [?,??,q]:
The following packages are available:
1 RHATews JBoss Enterprise Web Server (i386) 1.0.0,REV=2.el5
Select package(s) you wish to process (or 'all' to process all packages). (default: all) [?,??,q]:
1 or just press enter. The following information will now appear:
y and press enter.
/opt/redhat/ews directory.
pkginfo -l RHATews
pkginfo -l RHATews
Note
JAVA_HOME environment variable was not set. Configuring this is discussed later in the Section 2.8, “Running on a Solaris Operating System Installation” section.
2.6.2. Installation using the zip package Copy linkLink copied to clipboard!
zip package requires root access and the GNU version of tar.
/opt directory since the post installation script will not run if installation occurs within a different location.
cd /opt unzip -q RHATews-1.0.0*-solaris10-i386.zip
cd /opt
unzip -q RHATews-1.0.0*-solaris10-i386.zip
cd /opt/redhat/ews/etc sh .postinstall
cd /opt/redhat/ews/etc
sh .postinstall
apache with an ID of 48 and tomcat with an ID of 91, will have been created. The apache user will be used to run httpd, while the tomcat user will be used to run tomcat.
tomcat group has write permission to:
/var/logs/tomcat5/var/logs/tomcat6
2.7. The Solaris operating system directory structure Copy linkLink copied to clipboard!
- Native Solaris packages require the absolute location
- Solaris operating systems (and other non-Red Hat Enterprise Linux platforms) must ship and build all the dependent components such as
openldap,openssl,db4andcyrus-saslto name a few.
2.8. Running on a Solaris Operating System Installation Copy linkLink copied to clipboard!
In order to run Tomcat on the Solaris operating system, some service configuration files will need manual editing.
JAVA_HOME variable to the desired JDK in the configuration file. The configuration file can be found at:
/opt/redhat/ews/etc/sysconfig/tomcat5
/opt/redhat/ews/etc/sysconfig/tomcat5
/opt/redhat/ews/etc/sysconfig/tomcat6
/opt/redhat/ews/etc/sysconfig/tomcat6
sbin/tomcat5 start
sbin/tomcat5 start
sbin/tomcat6 start
sbin/tomcat6 start
catalina.sh script is executed.
catalina.sh script file can be found within:
/opt/redhat/ews/share/tomcat5/bin
/opt/redhat/ews/share/tomcat5/bin
/opt/redhat/ews/share/tomcat6/bin
/opt/redhat/ews/share/tomcat6/bin
sbin/tomcat5 stop
sbin/tomcat5 stop
sbin/tomcat6 stop
sbin/tomcat6 stop
tomcat-native is automatically added to the LD_LIBRARY_PATH and -Djava.library.path during Tomcat startup. The catalina.sh script detects the running JVM version and adds the /opt/redhat/ews/lib path (/opt/redhat/ews/lib64 for 64 bit JVM) to the library path.
/opt/redhat/ews/etc/init.d directory. The following commands can be used to copy the necessary scripts:
cp /opt/redhat/ews/etc/init.d/tomcat6 /etc/rc3.d/S70tomcat5 cp /opt/redhat/ews/etc/init.d/tomcat6 /etc/rcS.d/K20tomcat5
cp /opt/redhat/ews/etc/init.d/tomcat6 /etc/rc3.d/S70tomcat5
cp /opt/redhat/ews/etc/init.d/tomcat6 /etc/rcS.d/K20tomcat5
cp /opt/redhat/ews/etc/init.d/tomcat6 /etc/rc3.d/S70tomcat6 cp /opt/redhat/ews/etc/init.d/tomcat6 /etc/rcS.d/K20tomcat6
cp /opt/redhat/ews/etc/init.d/tomcat6 /etc/rc3.d/S70tomcat6
cp /opt/redhat/ews/etc/init.d/tomcat6 /etc/rcS.d/K20tomcat6
init level numbers, consult your Solaris operating system documentation. The preferred method of service management is through the Solaris Service Management Facility. In order to read more about this facility, consult the smf(5) manual.
Apache httpd configuration files are located inside the /opt/redhat/ews/etc/httpd directory. By default all supported modules are loaded and enabled, so it is advised that you edit the httpd.conf file and disable the modules you don't need.
apachectl script located inside the /opt/redhat/ews/sbin directory. The apachectl script uses the configuration script, where you can edit and select various startup parameters, including the running of mpm. The file used is /opt/redhat/ews/etc/sysconfig/httpd
sbin/apachectl start
sbin/apachectl start
sbin/apachectl stop
sbin/apachectl stop
apachectl script should be added to your system startup files.
Note
docs/httpd/invoking.html and docs/httpd/stopping.html respectively.
Running mod_jk on the Solaris operating system is the same as running the package on Red Hat Enterprise Linux installed via zip. For detailed instructions see Running the mod_jk
2.9. Uninstalling the package in the Solaris operating sytem Copy linkLink copied to clipboard!
pkgrm RHATews
pkgrm RHATews
/opt/redhat/ews/var/run/tomcat5/var/run/tomcat6/var/cache/tomcat5/var/cache/tomcat6/var/log/httpd/var/cache/mod_ssl/var/cache/mod_proxy
2.10. Source Files Copy linkLink copied to clipboard!
2.11. Excluded, Removed and Deprecated Items Copy linkLink copied to clipboard!
Note
2.11.1. Excluded Items Copy linkLink copied to clipboard!
Tomcat Clusteringhas been excluded from theApache Tomcat 6component. Specifically thecatalina-tribes.jarfile has been removed. This has occurred to eliminate any possibility of session replication and because Red Hat does not believe this feature is suitable for medium or large scale production deployments.
2.11.2. Deprecated Items Copy linkLink copied to clipboard!
- The
Tomcat Clusteringfeature ofApache Tomcat 5is marked as deprecated for this release. Specifically thecatalina-cluster.jarfile has been deprecated.
2.11.3. Removed Items Copy linkLink copied to clipboard!
2.12. Product Support and License Website Links Copy linkLink copied to clipboard!
2.13. Issues fixed in this release Copy linkLink copied to clipboard!
2.13.1. Fixed Security Issues Copy linkLink copied to clipboard!
- CVE-2010-2086
- JBoss Enterprise Web Server 1.0.0 ships with Apache MyFaces 1.1.0. Apache MyFaces 1.1.0 does not support encrypted view state. When the application's view state is not encrypted, it is possible for an attacker to supply a new or modified view object as part of a request. This allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.This issue is resolved in JBoss Enterprise Web Server 1.0.1 because it does not include Apache MyFaces.
- CVE-2009-3555
- A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure Sockets Layer) protocols handle session renegotiation on Red Hat Enterprise Linux 4 and 5. A man-in-the-middle attacker could use this flaw to prefix arbitrary plain text to a client's session (for example, an HTTPS connection to a website). This could force the server to process an attacker's request as if authenticated using the victim's credentials.Refer to the following Knowledgebase article for more information about how this issue affects JBoss Enterprise Web Server: http://kbase.redhat.com/faq/docs/DOC-20491
- CVE-2009-3095
- A flaw was found in the Apache mod_proxy_ftp module on Red Hat Enterprise Linux 4 and 5 such that, in a reverse proxy configuration, a remote attacker could bypass intended access restrictions by creating a HTTP Authorization header and send arbitrary commands to the FTP server. (RHSA-2010:0011)
- CVE-2009-3094
- A NULL pointer dereference flaw was found in the Apache mod_proxy_ftp module on Red Hat Enterprise Linux 4 and 5. A malicious FTP server to which requests were proxied could use this flaw to crash an httpd child process through a malformed reply to the EPSV or PASV commands, resulting in a limited denial of service. (RHSA-2010:0011)
- CVE-2009-2902
- A directory traversal flaw was found in the Tomcat deployment process. WAR file names were not being sanitized during Tomcat deployment in Red Hat Enterprise Linux 4 and 5. This could allow attackers to create a specially-crafted WAR file that could delete files in the Tomcat host's work directory. (RHSA-2010:0119)
- CVE-2009-2699
- A flaw was found in the way errors were handled in the Event Port back end in the Apache Portable Runtime (APR) library, used by the Apache HTTP Server. If an error was incorrectly handled while processing HTTP requests, httpd could hang. Note: This flaw only affected users running JBoss Enterprise Web Server on the Solaris operating system.
- CVE-2009-2693
- A directory traversal flaw was found in the Tomcat deployment process. An attacker could create a specially-crafted WAR file which, once deployed by an unsuspecting local user, would lead to attacker-controlled content being deployed outside the web root, into directories accessible to the Tomcat process. (RHSA-2010:0119)
- CVE-2009-2412
- Multiple integer overflow flaws that led to heap-based buffer overflows were found in the way the Apache Portable Runtime (APR) included in httpd22 manages memory pool and relocatable memory allocations on Red Hat Enterprise Linux 4. An attacker could use these flaws to issue a specially-crafted request for memory allocation, which would lead to a denial of service (application crash) or, potentially, execute arbitrary code with the privileges of an application using the APR libraries. (RHSA-2009:1462)
- CVE-2009-1955
- A denial of service flaw was found in the Apache HTTP Server apr-util Extensible Markup Language (XML) parser for Red Hat Enterprise Linux 4. A remote attacker could create a specially-crafted XML document that would cause excessive memory consumption when processed by the XML decoding engine. (RHSA-2009:1160)
- CVE-2009-1891
- A denial of service flaw was found in the Apache HTTP Server mod_deflate module for Red Hat Enterprise Linux 4 and 5. This module continued to compress large files until compression was complete, even if the network connection that requested the content was closed before compression completed. This caused mod_deflate to consume large amounts of CPU if mod_deflate was enabled for a large file. (RHSA-2009:1155, RHSA-2009:1160)
- CVE-2009-1890
- A denial of service flaw was found in the Apache HTTP Server mod_proxy module when it was used as a reverse proxy on Red Hat Enterprise Linux 4 and 5. A remote attacker could use this flaw to force a proxy process to consume large amounts of CPU time. (RHSA-2009:1155, RHSA-2009:1160)
- CVE-2009-1195
- In Apache HTTP Server on Red Hat Enterprise Linux 4 and 5, in configurations using the
AllowOverridedirective with certainOptions=arguments, local users were not restricted from executing commands from a Server-Side-Include script as intended. (RHSA-2009:1155, RHSA-2009:1160) - CVE-2009-0783
- In Tomcat 5 and 6 on Red Hat Enterprise Linux 4 and 5, web applications containing their own XML parsers could replace the XML parser that Tomcat uses to parse configuration files. A malicious web application running on a Tomcat instance could read or, potentially, modify the configuration and XML-based data of other web applications deployed on the same Tomcat instance. (RHSA-2009:1506, RHSA-2009:1454)
- CVE-2009-0580
- In Tomcat 5 and 6 on Red Hat Enterprise Linux 4 and 5, the error checking methods of certain authentication classes did not have sufficient error checking, allowing remote attackers to ennumerate (via brute force methods) usernames registered with applications running on Tomcat when FORM-based authentication was used. (RHSA-2009:1506, RHSA-2009:1454)
- CVE-2009-0033
- A flaw was found in the way that the Tomcat 5 and 6 AJP (Apache JServ Protocol) connector processed AJP connections on Red Hat Enterprise Linux 4 and 5. An attacker could use this flaw to send specially-crafted requests that would cause a temporary denial of service. (RHSA-2009:1506, RHSA-2009:1454)
- CVE-2009-0023
- A heap-based underwrite flaw was discovered in the way Apache HTTP Server's apr-util library created compiled forms of particular search patterns on Red Hat Enterprise Linux 4. An attacker could formulate a specially-crafted search keyword that would overwrite arbitrary heap memory locatons when processed by the pattern preparation engine. (RHSA-2009:1160)
- CVE-2008-5515
- In Tomcat 5 and 6 on Red Hat Enterprise Linux 4 and 5, request dispatchers did not properly normalize user requests that had trailing query strings, which allowed remote attackers to send specially-crafted requests that would cause an information leak. (RHSA-2009:1506, RHSA-2009:1454)
- CVE-2007-5333
- Tomcat 5 did not properly handle a certain character sequence in cookie values on Red Hat Enterprise Linux 4 and 5. A remote attacker could use this flaw to obtain sensitive information, such as session IDs, and use this information for session hijacking attacks. (RHSA-2009:1454)
Note
Version 0 cookies that contain values that must be quoted to be valid are automatically changed to version 1 cookies. To reactivate the previous, but insecure, behavior, add the following entry to/etc/tomcat5/catalina.propertiesorg.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=false
org.apache.tomcat.util.http.ServerCookie.VERSION_SWITCH=falseCopy to Clipboard Copied! Toggle word wrap Toggle overflow - CVE-2009-1191
- An information disclosure flaw was found in Apache HTTP Server's mod_proxy_ajp module. In certain situations, if a user sent a specially-crafted HTTP request, the httpd server could return a response intended for another user. (RHSA-2009:1058)
2.13.2. General Fixed Issues Copy linkLink copied to clipboard!
- JBPAPP-3272
- Installing the tomcat5-admin-webapps package resulted in missing dependencies. This made it impossible to access the Tomcat Administration section from http://localhost:8080/. The missing dependency,
jakarta-commons-chain, has been added. - JBPAPP-3255
- The zip distribution of Enterprise Web Server 1.0 did not contain the administration web application, and directed users to download and install tomcat5-admin-webapps separately. The package is now included in the zip distribution.
- JBPAPP-2850
- Apache HTTP Server Control Interface (apachectl) required several modifications to work with Enterprise Web Server. The
httpd/.postinstallscript has been updated to make these modifications automatically. - JBPAPP-2122
- The apachectl binary available from the Customer Service Portal for Red Hat Enterprise Linux 4 and Red Hat Enterprise Linux 5 i386 was zero length. The fix for this caused problems with the RPM distribution. This has been corrected.
- JBPAPP-1838
- When Enterprise Web Server was installed by
zip, thehttpd/.postinstallscript did not modify theconf/httpd.conffile to point to the correctServerRootdirectory. - JBPAPP-1837
- Following RPM installation on Red Hat Enterprise Linux 4, the
/var/log/httpd22directory was not automatically created, which forced thehttpdstartup script to fail. The directory is now created on startup. - JBPAPP-1809
- Some Tomcat users would receive a warning that there were no write permissions on the directory. This problem can no longer be reproduced.
- JBPAPP-1788
- Tomcat 6 on the Solaris operating system stopped at the command
/ews/etc/init.d/tomcat6 stop, and though the server terminated successfully, the output displayed command usage errors because theCATALINA_PIDvariable was not defined in Tomcat 6.CATALINA_PIDis now defined and the command usage errors no longer occur. - JBPAPP-1783
- Two Tomcat Native libraries,
libaprandlibaprutilhave been included in Enterprise Web Server to prevent problems when running Enterprise Web Server on Red Hat Enterprise Linux 5.
2.13.3. Known Issues with this release Copy linkLink copied to clipboard!
General Known Issues
- JBPAPP-3789
- Installing both Tomcat 5 and Tomcat 6 rpms causes Tomcat 5 to load the Tomcat 6 servlet JAR,
tomcat6-servlet-2.5-api.jar, instead ofgeronimo-j2ee-1.4-apis.jar. Before Tomcat 6 is installed, Tomcat 5 uses:/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> /etc/alternatives/servlet -> /usr/share/java/geronimo-j2ee-1.4-apis.jar
/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> /etc/alternatives/servlet -> /usr/share/java/geronimo-j2ee-1.4-apis.jarCopy to Clipboard Copied! Toggle word wrap Toggle overflow After Tomcat 6 is installed, Tomcat 5 uses:/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> /etc/alternatives/servlet -> /usr/share/java/tomcat6-servlet-2.5-api.jar
/var/lib/tomcat5/common/lib/\[servlet\].jar -> /usr/share/java/servlet.jar -> /etc/alternatives/servlet -> /usr/share/java/tomcat6-servlet-2.5-api.jarCopy to Clipboard Copied! Toggle word wrap Toggle overflow There are two workarounds to this issue:- Install only the Tomcat 6 rpm, and install Tomcat 5 from the zip download.
- Remove
/var/lib/tomcat5/common/lib/\[servlet\].jarand copygeronimo-j2ee-1.4-apis.jarto/var/lib/tomcat5/common/lib/to achieve the same effect.
- JBPAPP-3762
- When JBoss Enterprise Web Server is run on the IBM Java Development Kit 1.6 using Java Security Manager, Tomcat 6 does not start.
- JBPAPP-3755
- The current JBoss ON plugin (v2.3) for JBoss Enterprise Web Server is not supported on Windows or Solaris platforms, and there are several known issues on Red Hat Enterprise Linux. JBoss ON support for JBoss Enterprise Web Server on these platforms is planned for a future release of JBoss ON.
- JBPAPP-3753
- Undeploying any web application in the
/managerand/adminapplications causes an infinite loop. We do not currently recommend using the/manageror/adminapplications to undeploy applications from your server. - JBPAPP-3735
- The Apache HTTP Server module mod_ssl provides an interface to the OpenSSL library, which provides Strong Encryption using the Transport Layer Security/Secure Sockets Layer security protocols. To use this feature, install the mod_ssl package.
- JBPAPP-3734
- Unless
<package>.noarchis specified for Tomcat 5 packages, yum fetches all Tomcat 5 packages from the Red Hat Enterprise Linux 5 base channel instead of the JBoss Enterprise Web Server channel. The installation instructions have been modified to include a work-around for this issue. - JBPAPP-3685
- Attempting to edit server configuration details with the Tomcat 5 administration application results in some configuration information being lost from the configuration file (
server.xml). At present we do not recommend using the the administration application for Tomcat 5. - JBPAPP-3658
- Attempting to delete an existing host with the Tomcat 5 Administration Tool results in a
NullPointerException. This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2. - JBPAPP-3646
- The Tomcat 6 test suite attempts to compile and execute
org.apache.catalina.tomcat.util.http.TestCookiesinstead oforg.apache.tomcat.util.http.TestCookies. This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2. - JBPAPP-3644
- Setting
SECURITY_MANAGER="true"insysconfig/tomcat5orsysconfig/tomcat6has no effect. To start the server securely, users must start with the-secureflag, like so:catalina.sh start -secure
catalina.sh start -secureCopy to Clipboard Copied! Toggle word wrap Toggle overflow This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2. - JBPAPP-3628
- When a virtual host is created using the
/host-manager/htmlapplication, all actions work as expected, but the newly created host is not persistently added to the Tomcat configuration. Only the localhost is listed after server restart. This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2. - JBPAPP-3627
- The Host Manager Help link in the
/host-managerapplication leads to a HTTP 404 Error. This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2. - JBPAPP-3626
- The links that Tomcat Web Application Manager displays for
/host-managerand/managerresult in a HTTP 404 Error. To work around this issue, add the following section to theWEB-INF/web.xmldescriptor, immediately after the servlet-mapping section:<welcome-file-list> <welcome-file> html/ </welcome-file> </welcome-file-list><welcome-file-list> <welcome-file> html/ </welcome-file> </welcome-file-list>Copy to Clipboard Copied! Toggle word wrap Toggle overflow This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2. - JBPAPP-3625
- When Tomcat Native is used upon server shutdown, a "Server accept failed" error occurs because the AJP Connector continues to wait for a client connection during shutdown. This is a problem upstream and is expected to be fixed for JBoss Enterprise Web Server 1.0.2.
- JBPAPP-2852
- RPM installation shares Java library files. When Enterprise Web Server coexists with Enterprise Application Platform or similar, library version conflicts occur. Only one version (either Enterprise Web Server or Enterprise Application Platform) can exist on one server when RPM installation is used. The workaround for this issue is to
yum removeEnterprise Application Platform before installing Enterprise Web Server. - JBPAPP-2655
jaxp_parser_impl.jarandxml-commons-apis.jarare not included in Tomcat 6. This can cause aSAXParseExceptionwhen parsing XML with a specific encoding (for example, GBK). Tomcat 6 requires JDK5 or higher; these JARs are not included in Tomcat because the JAXP implementation (JAXP 1.3) is built into JDK5. If users require encoding that is not supported by JAXP 1.3, the user must provide an external implementation of that encoding. The workaround for the missing JARs is therefore to copy them from Tomcat 5 into Tomcat 6.- JBPAPP-2150
- The presence of a
httpd-devel.i386package in the Red Hat Enterprise Linux 5 base channel means that thehttpd-develmay not be properly installed to the Red Hat Enterprise Linux x86_64 from the JBoss Enterprise Web Server channel. The correct way to install this package is to run the following command:yum install httpd-devel.x86_64
yum install httpd-devel.x86_64Copy to Clipboard Copied! Toggle word wrap Toggle overflow - JBPAPP-1966
- Apache Tomcat handles SSL encryption and decryption such that browser-httpd communication takes place in HTTPS. However, communication between httpd and JBoss Enterprise Web Server takes place in plain HTTP. By default, redirects will also use HTTP. To use HTTPS redirects, define the following attributes on the JBoss HTTP Connector:
proxyName="www.somedomain.com" proxyPort="443" scheme="https"
proxyName="www.somedomain.com" proxyPort="443" scheme="https"Copy to Clipboard Copied! Toggle word wrap Toggle overflow If JBoss Enterprise Web Server handles redirect requests for both HTTP and HTTPS, you will need one HTTP connector per protocol.
A. Revision History Copy linkLink copied to clipboard!
| Revision History | |||
|---|---|---|---|
| Revision 2.3.0-0.1 | Wed Feb 11 2015 | ||
| |||
| Revision 1.0.1-13 | Tue Jun 21 2011 | ||
| |||
| Revision 2.3.0-0 | Mon Dec 20 2010 | ||
| |||
| Revision 2.2.0-0 | Thu Oct 07 2010 | ||
| |||
| Revision 2.1.0-0 | Mon Feb 22 2010 | ||
| |||