java - Is the communication between httpd and tomcat secure? -
we have app running on tomcat port 8080, , fronting apache httpd, ssl installed , implemented, request redirected port 443, , proxy tomcat 8080 mod_proxy_httpd:
proxypass / http://localhost:8080/ retry=0 timeout=5 proxypassreverse / http://localhost:8080/
everything works fine, request client httpd secured, communication between httpd , tomcat not encrypted.
my question is: 1.would issue if communication between httpd , tomcat not encrypted? provided httpd , tomcat under same sever?
2.we transmitting sensitive data, such customer credit card information during payment processing, need implement ssl on tomcat (e.g.port 8443), , proxy request 443 secured tomcat port 8443? gonna secured client httpd tomcat, affect performance, since 2 way encryption/decryption needed.
we have been searching on issue, found no clear answers. appreciated.
if stick localhost (e.g. have apache httpd on same server tomcat) secure: if don't trust implementation of "localhost" networking, couldn't trust tls implementation on same server well.
you might gain performance having apache on different server tomcat. in case depend on network between both: routers, cabling etc. if don't trust network, might can work on. however, note have connection between tomcat , filesystems (temp files), databases, etc. - transport encryption nailed, data can still leak out of application if can't trust datacenter/network security.
we can't judge level can trust network, you'll have yourself.
note in case mention in question, tomcat have no idea connection has been made in https when forward on http (e.g.: browser -> apache https, apache -> tomcat http)
you can configure tomcat's connector assume connection secure (look secure
attribute on connector's documentation), means absolutely need make sure never allow http connection forwarded connector. check if ajp (a different protocol) - forward of http(s) connection's properties tomcat. (me among them), don't.
Comments
Post a Comment