1
0
Fork 0
mirror of https://git.sr.ht/~rjarry/aerc synced 2025-09-19 02:02:46 +02:00
aerc/lib/jwz/testdata/0033.e3fd617544226dc06abf36c95a9a2d11.eml
Robin Jarry 13e9ee3b40 lib: vendor-in the jwz library
The maintainer of this library has gone AWOL. We are depending on
a patch that has never been merged. Let's vendor the library to avoid
future issues.

This patch has been made with the following steps:

git clone https://github.com/konimarti/jwz lib/jwz
git -C lib/jwz checkout fix-missing-messages
mv lib/jwz/test/testdata/ham lib/jwz/testdata
sed -i 's#test/testdata#testdata#' lib/jwz/jwz_test.go
rm -rf lib/jwz/.* lib/jwz/docs lib/jwz/examples lib/jwz/test
sed -i 's#github.com/gatherstars-com/jwz#git.sr.ht/~rjarry/aerc/lib/jwz#' \
	lib/threadbuilder.go
go mod tidy
git add --intent-to-add lib/jwz
make fmt

Along with some manual adjustments to fix the linter warnings. Also, to
make the patch smaller, I only kept 93 test emails from the test data
fixture.

Changelog-changed: The JWZ library used for threading is now vendored.
Signed-off-by: Robin Jarry <robin@jarry.cc>
Reviewed-by: Moritz Poldrack <moritz@poldrack.dev>
2025-08-28 09:28:16 +02:00

101 lines
4.6 KiB
Text

From: neugens@libero.it Fri Aug 23 11:04:42 2002
Return-Path: <neugens@libero.it>
Delivered-To: zzzz@localhost.netnoteinc.com
Received: from localhost (localhost [127.0.0.1])
by phobos.labs.netnoteinc.com (Postfix) with ESMTP id BED4A44164
for <zzzz@localhost>; Fri, 23 Aug 2002 06:03:50 -0400 (EDT)
Received: from phobos [127.0.0.1]
by localhost with IMAP (fetchmail-5.9.0)
for zzzz@localhost (single-drop); Fri, 23 Aug 2002 11:03:50 +0100 (IST)
Received: from webnote.net (mail.webnote.net [193.120.211.219]) by
dogma.slashnull.org (8.11.6/8.11.6) with ESMTP id g7MJiiZ22036 for
<zzzz@example.com>; Thu, 22 Aug 2002 20:44:44 +0100
Received: from outgoing.securityfocus.com (outgoing2.securityfocus.com
[66.38.151.26]) by webnote.net (8.9.3/8.9.3) with ESMTP id UAA06503 for
<zzzz@example.com>; Thu, 22 Aug 2002 20:44:51 +0100
Received: from lists.securityfocus.com (lists.securityfocus.com
[66.38.151.19]) by outgoing.securityfocus.com (Postfix) with QMQP id
3B4388F353; Thu, 22 Aug 2002 12:41:59 -0600 (MDT)
Mailing-List: contact secprog-help@securityfocus.com; run by ezmlm
Precedence: bulk
List-Id: <secprog.list-id.securityfocus.com>
List-Post: <mailto:secprog@securityfocus.com>
List-Help: <mailto:secprog-help@securityfocus.com>
List-Unsubscribe: <mailto:secprog-unsubscribe@securityfocus.com>
List-Subscribe: <mailto:secprog-subscribe@securityfocus.com>
Delivered-To: mailing list secprog@securityfocus.com
Delivered-To: moderator for secprog@securityfocus.com
Received: (qmail 10062 invoked from network); 22 Aug 2002 17:41:11 -0000
Content-Type: text/plain; charset="us-ascii"
From: Mario Torre <neugens@libero.it>
To: secprog@securityfocus.com
Subject: Encryption approach to secure web applications
Date: Thu, 22 Aug 2002 20:15:15 +0200
User-Agent: KMail/1.4.1
MIME-Version: 1.0
Message-Id: <200208222015.15926.neugens@libero.it>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by dogma.slashnull.org
id g7MJiiZ22036
Hi everybody!
I'm writing a web application in java (tomcat + jsp/servlets + database
access with postgreSQL).
This will be released under the GPL and will eventually be useful as a
framework for other web applications.
The application main focus is e-commerce, but not limited to that.
I would like to use some form of cryptography to protect data on the
database, but I have some problem figuring out the right approach.
Above all, how to store passwords and keys in a shared web server.
A problem that I was unable to solve is how to store keys for
encryption/decryption. The api that I'm using is the jca (jdk1.4.x),
and the methods of saving generated keys in keystores fails always.
I can serialize the object, and store in the database, but this is not
the most secure approach: this key is needed to decrypt data in the
database, but the database is accessible from the web application.
Assuming that I can find a good and secure place where to store the
database password, I can use a different database with different
user... Argh... to complex and doesn't really solve the problem.
Where I can found good documentation about this topic?
There is another approach that I would share with the list, something I
thought that can be of bit interest, but probabily wrong and insecure.
After all, I'm a real beginner in secure programming, and I'm here to
learn methods and technics.
First of all, I need a secure way to keep database passwords secure, so
I have to keep them separate from the main server. The right approach
could be using a small java bean application that run as normal user
(not tomcat, so it is not shared with other web services or, worst, the
nobody user), that has no shell login, but has a default home directory
or a place where it can hold passwords and keys.
The web application could then open an ssl connection (could be done in
the init method at server startup) to get database passwords. The small
bean could check via code signature/rmi/whatever else that the source
is the right one, and handle all the database connections, or give the
db connection/password to the main web application.
In this way, we solve the problem of keeping the keys and passwords in
shared directories, and also, an attacker should get root/bean user
account to read data. This is not perfect, and works only if your
provider gives the opportunity to configure a separated java
application (that means, really, another server running in the
background).
Any suggestions?
Thank you,
Mario Torre
--
Please avoid sending me Word or PowerPoint attachments.
See http://www.fsf.org/philosophy/no-word-attachments.html