Details
-
Bug
-
Status: Closed
-
Trivial
-
Resolution: Fixed
-
10.3.1.4, 10.3.2.1
-
None
-
N/A
Description
The Server and Administration guide contains a section about customizing the Network Server's security policy, based on the template policy:
http://db.apache.org/derby/docs/dev/adminguide/tadminnetservcustom.html
This section mentions that the variable ${derby.security.host} should be replaced with a suitable value.
However, the template policy, at /demo/templates/server.policy (released binaries) or java/drda/org/apache/derby/drda/template.policy (SVN codeline), does not refer to any variable or property called ${derby.security.host}. Instead, the policy file specifies the wildcard address, with appropriate comments:
<quote>
// Accept connections from any host. Derby is listening to the host
// interface specified via the -h option to "NetworkServerControl
// start" on the command line, via the address parameter to the
// org.apache.derby.drda.NetworkServerControl constructor in the API
// or via the property derby.drda.host; the default is localhost.
// You may want to restrict allowed hosts, e.g. to hosts in a specific
// subdomain, e.g. "*.acme.com".
permission java.net.SocketPermission "*", "accept";
</quote>
Attachments
Attachments
Issue Links
- is related to
-
DERBY-2820 Improve documentation in Admin Guide regarding Network Server security policy
- Closed