diff --git a/webapps/docs/changelog.xml b/webapps/docs/changelog.xml
index 2e5194e254f4..5a277c3084ca 100644
--- a/webapps/docs/changelog.xml
+++ b/webapps/docs/changelog.xml
@@ -183,6 +183,12 @@
recommendation for the use the trimSpaces
option for Jasper
in production environments. (markt)
+ EncryptInterceptor
does not provide sufficient protection
+ to run Tomcat clustering over an untrusted network. This is
+ CVE-2022-29885. (markt)
+
The EncryptInterceptor +provides confidentiality and integrity protection but it does not protect +against all risks associated with running a Tomcat cluster on an untrusted +network, particularly DoS attacks.
+There are many options for providing a secure, trusted network for use by a Tomcat cluster. These include:
The EncryptInterceptor +provides confidentiality and integrity protection but it does not protect +against all risks associated with running a Tomcat cluster on an untrusted +network, particularly DoS attacks.
+diff --git a/webapps/docs/security-howto.xml b/webapps/docs/security-howto.xml index 046a2ecc70f5..b0278e40cf18 100644 --- a/webapps/docs/security-howto.xml +++ b/webapps/docs/security-howto.xml @@ -469,10 +469,12 @@ trusted network is used for all of the cluster related network traffic. It is not safe to run a cluster on a insecure, untrusted network.
-If you are operating on an untrusted network or would prefer to - exercise an over-abundance of caution, you can use the +
If you require confidentiality and/or integrity protection then you can + use the EncryptInterceptor - to encrypt traffic between nodes.
+ to encrypt traffic between nodes. This interceptor does not protect + against all the risks of running on an untrusted network, particularly + DoS attacks.