diff --git a/webapps/docs/changelog.xml b/webapps/docs/changelog.xml index 2e5194e254f4..5a277c3084ca 100644 --- a/webapps/docs/changelog.xml +++ b/webapps/docs/changelog.xml @@ -183,6 +183,12 @@ recommendation for the use the trimSpaces option for Jasper in production environments. (markt) + + Update the documentation web application to state that the + EncryptInterceptor does not provide sufficient protection + to run Tomcat clustering over an untrusted network. This is + CVE-2022-29885. (markt) + diff --git a/webapps/docs/cluster-howto.xml b/webapps/docs/cluster-howto.xml index 076ef93e3a61..2edaf71d3580 100644 --- a/webapps/docs/cluster-howto.xml +++ b/webapps/docs/cluster-howto.xml @@ -127,9 +127,13 @@ Tomcat cluster. These include:

  • private LAN
  • a Virtual Private Network (VPN)
  • IPSEC
  • -
  • Encrypt cluster traffic using the EncryptInterceptor
  • +

    The EncryptInterceptor +provides confidentiality and integrity protection but it does not protect +against all risks associated with running a Tomcat cluster on an untrusted +network, particularly DoS attacks.

    +
    diff --git a/webapps/docs/config/cluster.xml b/webapps/docs/config/cluster.xml index 9211edd972dd..21d0fe5f4799 100644 --- a/webapps/docs/config/cluster.xml +++ b/webapps/docs/config/cluster.xml @@ -52,12 +52,16 @@ to run a cluster on a insecure, untrusted network.

    There are many options for providing a secure, trusted network for use by a Tomcat cluster. These include:

    +

    The EncryptInterceptor +provides confidentiality and integrity protection but it does not protect +against all risks associated with running a Tomcat cluster on an untrusted +network, particularly DoS attacks.

    +

    diff --git a/webapps/docs/security-howto.xml b/webapps/docs/security-howto.xml index 046a2ecc70f5..b0278e40cf18 100644 --- a/webapps/docs/security-howto.xml +++ b/webapps/docs/security-howto.xml @@ -469,10 +469,12 @@ trusted network is used for all of the cluster related network traffic. It is not safe to run a cluster on a insecure, untrusted network.

    -

    If you are operating on an untrusted network or would prefer to - exercise an over-abundance of caution, you can use the +

    If you require confidentiality and/or integrity protection then you can + use the EncryptInterceptor - to encrypt traffic between nodes.

    + to encrypt traffic between nodes. This interceptor does not protect + against all the risks of running on an untrusted network, particularly + DoS attacks.