ESAPI配置文件属性说明原文档

更新时间:2023-07-12 09:10:41 阅读: 评论:0

ESAPI配置⽂件属性说明原⽂档ESAPI配置⽂件属性说明原⽂档
美国好看的大片#
# OWASP Enterpri Security API (ESAPI) Properties file -- PRODUCTION Version
#
# This file is part of the Open Web Application Security Project (OWASP)
# Enterpri Security API (ESAPI) For details, plea e
# owasp/www-project-enterpri-curity-api/
#
# Copyright (c)2008,2009- The OWASP Foundation
#
# DISCUSS: This may cau a major backwards compatibility issue, etc. but
#    from a name space perspective, we probably should have prefaced
#    all the property names with ESAPI or at least OWASP. Otherwi
#    there could be problems is someone loads this properties file into
#    the System  We could also put this file into the
#    esapi.jar file (perhaps as a ResourceBundle) and then allow an external
#    ESAPI properties be defined that would overwrite the defaults.
#    That keeps the application's properties relatively simple as usually
#    they will only want to    a few  If looks like we
#    already support multiple override levels of this in the
#    DefaultSecurityConfiguration class, but I'm suggesting placing the
#    defaults in the esapi.jar  That way,if the jar is signed,
#    we could detect if tho properties had been tampered with.(The
#    code to the jar signatures is maybe 70-90 LOC,
#    but off cour there is an execution penalty (similar to way
#    that the parate sunjce.jar ud to when a class from it was
#    first loaded). Thoughts?
>>>>>>>>>>>>>>>####
#
# WARNING: Operating system protection should be ud to down the .esapi
# resources directory and all the files inside and all the directories all the
# way up to root directory of the file  Note that if you are using
# file-bad implementations, that some files may need to read-write as they
# get updated dynamically.
#
#===========================================================================
# ESAPI Configuration
#
# If true, then print all the ESAPI properties t here when they are loaded.
# If fal, they are not  Uful to output when running JUnit tests.
# If you need to    a properties related problem, turning this on may help.
# This is 'fal' in the src/test/resources/.esapi  It is 'true' by
# default for reasons of backward compatibility with ESAPI versions.
ESAPI.printProperties=true
# ESAPI is designed to easily  You can u the reference implementation
# or implement your own providers to advantage of your enterpri's curity
#  The functions in ESAPI are referenced using the ESAPI locator, like:
鬼谷子连招#
#    String ciphertext =
#  ptor().encrypt("Secret message");// Deprecated in 2.0
#    CipherText cipherText =
#  ptor().encrypt(new PlainText("Secret message"));// Preferred
#
# Below you can specify the classname for the provider that you wish to in your
#  The only requirement is that it implement the appropriate ESAPI interface.
# This allows you to switch curity implementations in the future without rewriting the
# entire application.
#
# ExperimentalAccessController l in .esapi directory
ESAPI.AccessControl=DefaultAccessController
ESAPI.AccessControl=DefaultAccessController
# FileBadAuthenticator requires file in .esapi directory
ESAPI.Authenticator=FileBadAuthenticator
ESAPI.Encoder=DefaultEncoder
ESAPI.Encryptor=JavaEncryptor
ESAPI.Executor=DefaultExecutor
ESAPI.HTTPUtilities=DefaultHTTPUtilities
ESAPI.IntrusionDetector=DefaultIntrusionDetector
# Log4JFactory l or log4j.properties in classpath - www.laliluna.de/log4j-tutorial.html
形容山水的诗句# Note that this is now considered deprecated!
#ESAPI.Logger=Log4JLogFactory
ESAPI.Logger=JavaLogFactory
# To u the new SLF4J logger in ESAPI (e GitHub issue #129), t
#    ESAPI.Logger=Slf4JLogFactory冬天快乐
# and do whatever other normal SLF4J configuration that you normally would do for your
ESAPI.Randomizer=DefaultRandomizer
ESAPI.Validator=DefaultValidator
#===========================================================================
# ESAPI Authenticator
#
Authenticator.AllowedLoginAttempts=3
Authenticator.MaxOldPasswordHashes=13
Authenticator.UrnameParameterName=urname
Authenticator.PasswordParameterName=password
# RememberTokenDuration (in days)
Authenticator.RememberTokenDuration=14
# Session Timeouts (in minutes)
Authenticator.IdleTimeoutDuration=20
Authenticator.AbsoluteTimeoutDuration=120
#===========================================================================
# ESAPI Encoder
#
# ESAPI canonicalizes input before validation to bypassing filters with attacks.
# Failure to input is a very common mistake when implementing validation schemes.
# Canonicalization is automatic when using the ESAPI Validator, but you can also u the
# following code to data.
#
#      ESAPI.Encoder().canonicalize("%22hello world"");
去公园的英文
#
# Multiple encoding is when a single encoding format is applied multiple  Allowing
# multiple encoding is strongly
Encoder.AllowMultipleEncoding=fal
# Mixed encoding is when multiple different encoding formats are applied, or when
# multiple formats are  Allowing multiple encoding is strongly
Encoder.AllowMixedEncoding=fal
# The default list of codecs to when canonicalizing untrusted  The list should include the codecs
# for all downstream interpreters or  For example,if the data is likely to up in a URL, HTML, or
# inside JavaScript, then the list of codecs below is  The order of the list is not terribly
Encoder.DefaultCodecList=HTMLEntityCodec,PercentCodec,JavaScriptCodec
#===========================================================================
# ESAPI Encryption
#
# The ESAPI Encryptor provides cryptographic functions with simplified API.
# To get started, generate a new key using java -classpath esapi.jar JavaEncryptor # There is not currently any support for key rotation, so be careful when changing your key and salt as it
# will invalidate all signed, encrypted, and hashed data.
#
# WARNING: Not all combinations of algorithms and key lengths are supported.
# If you choo to    a key length greater than 128, you MUST download the
# If you choo to    a key length greater than 128, you MUST download the
# unlimited strength policy files and install in the lib directory of your JRE/JDK.
# See /java/downloads/index.jsp for more information.
#
#  ***** IMPORTANT: Do NOT forget to the with own values!*****
# To calculate the values, you can run:
#  java -classpath esapi.jar JavaEncryptor
#
#Encryptor.MasterKey=
#Encryptor.MasterSalt=
# Provides the default JCE provider that ESAPI will "prefer"for its symmetric
# encryption and hashing.(That is it will look to this provider first, but it
# will defer to providers if the requested algorithm is not implemented
# by this provider.) If left unt, ESAPI will just u your Java VM's current
# preferred JCE provider, which is generally t in the file
# "$JAVA_HOME/jre/lib/curity/java.curity".
#
# The main intent of this is to ESAPI symmetric encryption to
# ud with FIPS 140-2 compliant crypto- For details, e the ction
# "Using ESAPI Symmetric Encryption with FIPS 140-2 Cryptographic Modules" in
# the ESAPI 2.0 Symmetric Encryption Ur Guide, at:
# /svn/trunk/documentation/esapi4java-core-2.0-symmetric-crypto-ur-guide.html # However,this property also allows you to u an alternate JCE provider
# such as "Bouncy Castle" without having to changes to"java.curity".
# See Javadoc for SecurityProviderLoader for further  If you wish to
# a provider that is not known to SecurityProviderLoader, you may specify the
# fully-qualified class name of the JCE provider class that implements
# Provider. If the name contains a '.',this is interpreted as
# a fully-qualified class name that implements Provider.
#
# NOTE: Setting this property has the side-effect of changing it in your application
#      as well, so if you are using JCE in your application directly rather than
#      through ESAPI (you wouldn't do that, would you?;-), it will change the
#      preferred JCE provider there as well.
#
# Default: Keeps the JCE provider t to JVM ts it
Encryptor.PreferredJCEProvider=
# AES is the most widely ud and strongest encryption  This
# should agree with Encryptor.CipherTransformation property.
# Warning: This property does not control the default reference implementation for
#    ESAPI 2.0 using JavaEncryptor. Also,this property will be dropped
#    in the future.
# @deprecated
Encryptor.EncryptionAlgorithm=AES
#  For ESAPI Java 2.0- New encrypt / decrypt methods u
Encryptor.CipherTransformation=AES/CBC/PKCS5Padding
# Applies to ESAPI 2.0 and later only!
# Comma-parated list of cipher modes that provide *BOTH*
# confidentiality *AND* message authenticity.(NIST refers to cipher
# modes as "combined modes" so that's what we shall call them.) If any of the
# cipher modes are ud then no MAC is calculated and stored
# in the CipherText upon  Likewi,if one of the
# cipher modes is ud with, no attempt will be made
# to the MAC contained in the CipherText object regardless
# of whether it contains one or  Since the expectation is that
# the cipher modes support support message authenticity already,
# injecting a MAC in the CipherText object would be at best redundant.
#
# Note that as of JDK 1.5, the SunJCE provider does not support *any*
# of the cipher  Of the listed, only GCM and CCM are currently
# NIST approved. YMMV for other JCE  E.g., Bouncy Castle supports
# GCM and CCM with"NoPadding" mode, but not with"PKCS5Padding" or other
# padding
Encryptor.bined_modes=GCM,CCM,IAPM,EAX,OCB,CWC
# Applies to ESAPI 2.0 and later only!
# Additional cipher modes allowed for ESAPI 2.0 The
# cipher modes are in _addition_ to specified by the property
# 'Encryptor.bined_modes'.
# Note: We will add support for streaming modes like CFB & OFB once
# we add support for'specified'to property 'Encryptor.ChooIVMethod'
# (probably in ESAPI 2.1).
# DISCUSS: Better name?
Encryptor.cipher_modes.additional_allowed=CBC
# Default key size to for cipher specified by Encryptor.EncryptionAlgorithm.
# Note that this MUST be a valid key size for the algorithm being ud
# (as specified by Encryptor.EncryptionAlgorithm). So for example,if AES is ud,
# it must be 128,192, or 256. If DESede is chon, then it must be either 112 or 168. #
# Note that 128-bits is almost always sufficient and for AES it appears to more
# somewhat more resistant to key attacks than is 256-bit AES.)
#
# Defaults to128-bits if left blank.
#
# NOTE: If you u a key size >128-bits, then you MUST have the JCE Unlimited
#      Strength Jurisdiction Policy files installed
#
Encryptor.EncryptionKeyLength=128
# This is the _minimum_ key size (in bits) that we allow with ANY symmetric
# cipher for doing encryption.(There is no minimum for decryption.)
#
# Generally,if you only u one algorithm,this should be t the same as
# the Encryptor.EncryptionKeyLength
Encryptor.MinEncryptionKeyLength=128
# Becau 2.x us CBC mode by default, it requires initialization vector (IV).
# (All cipher modes except ECB require an IV.) There are two choices: we can either # u a fixed IV known to parties or allow ESAPI to    a random IV. While
# the IV does not need to hidden from adversaries, it is important that the
# adversary not be allowed to Also, random IVs are generally much more
# cure than fixed IVs.(In fact, it is esntial that feed-back cipher modes
# such as CFB and OFB u a different IV for each encryption with given key so
# in such cas, random IVs are much  By default, ESAPI 2.0us
# IVs. If you wish to'fixed' IVs, t 'Encryptor.ChooIVMethod=fixed' and
# uncomment the Encryptor.fixedIV.
#
# Valid values:  random|fixed|specified  'specified' not yet implemented; planned for2.3 #                                              'fixed' is deprecated as of 2.2
#                                              and will be removed in 2.3.
Encryptor.ChooIVMethod=random
# If you choo to    a fixed IV, then you must place a fixed IV here that
# is known to others who are sharing your cret  The format should
# be a hex string that is the same length as the cipher block size for the
# cipher algorithm that you are  The following is an *example*for AES
# from an AES test vector for AES-128/CBC as described in:
# NIST Special Publication 800-38A (2001 Edition)
# "Recommendation for Block Cipher Modes of Operation".
# (Note that the block size for AES is 16 bytes ==128 bits.)
#
爱国儿歌#  @Deprecated-- fixed IVs are deprecated as of the 2.2 relea and support
#                  will be removed in the next relea (tentatively,2.3).
#                  If you MUST u this, at least replace this IV with
#                  that your legacy application was
Encryptor.fixedIV=0x000102030405060708090a0b0c0d0e0f
# Whether or not CipherText should u a message authentication code (MAC)with
# This prevents an adversary from altering the IV as well as allowing a more
# fool-proof way of determining the decryption failed becau of an incorrect
# key being  This refers to"parate" MAC calculated and stored
# in CipherText, not part of any MAC that is calculated as a result of a
# "combined mode" cipher mode.
#
# If you are using ESAPI with FIPS 140-2 cryptographic module, you *must* also
# t this property to That is becau ESAPI takes the master key and
# derives 2 keys from it--a key for the MAC and a key for encryption--and
# becau ESAPI is not itlf FIPS 140-2 verified such intermediary aterations
# to from FIPS approved sources would have the effect of making your FIPS
# approved key generation and thus your FIPS approved JCE provider unapproved!
# More details in
#      documentation/esapi4java-core-2.0-readme-crypto-changes.html
#      documentation/esapi4java-core-2.0-symmetric-crypto-ur-guide.html
# You have been
Encryptor.CipherText.uMAC=true
# Whether or not the PlainText object may be overwritten and then marked
# eligible for garbage  If not t,this is still treated as 'true'.
Encryptor.PlainText.overwrite=true
# Do not u DES except in a legacy situations.56-bit is way too small key size.
#Encryptor.EncryptionKeyLength=56
#Encryptor.MinEncryptionKeyLength=56
#Encryptor.EncryptionAlgorithm=DES
# TripleDES is considered strong enough for most purpos.
# Note: There is also a 112-bit version of DESede. Using the 168-bit version
#  requires the special jurisdiction policy from Sun.
#Encryptor.EncryptionKeyLength=168
#Encryptor.MinEncryptionKeyLength=112
#Encryptor.EncryptionAlgorithm=DESede
Encryptor.HashAlgorithm=SHA-512
Encryptor.HashIterations=1024
Encryptor.DigitalSignatureAlgorithm=SHA1withDSA
企业推广方式Encryptor.DigitalSignatureKeyLength=1024
Encryptor.RandomAlgorithm=SHA1PRNG
Encryptor.CharacterEncoding=UTF-8
# This is the Pudo Random Function (PRF) that ESAPI's Key Derivation Function
# (KDF) normally  Note this is *only* the PRF ud for ESAPI's KDF and
# *not* what is ud for ESAPI's MAC.(Currently, HmacSHA1 is always ud for
# the MAC, mostly to the overall size at a minimum.)
#
# Currently supported choices for JDK 1.5 and 1.6 are:
# HmacSHA1 (160 bits), HmacSHA256 (256 bits), HmacSHA384 (384 bits), and
# HmacSHA512 (512 bits).
# Note that HmacMD5 is *not* supported for the PRF ud by the KDF even though
# the JDKs support  See the ESAPI 2.0 Symmetric Encryption Ur Guide
# further
Encryptor.KDF.PRF=HmacSHA256
#===========================================================================
# ESAPI HttpUtilties
#资料员实习日记
# The HttpUtilities provide basic protections to HTTP requests and  Primarily the methods # protect against malicious data from attackers, such as unprintable characters, escaped characters, # and other simple  The HttpUtilities also provides methods for dealing with,
# headers, and CSRF tokens.
#
# Default file upload location (remember to backslashes with \\)
HttpUtilities.UploadDir=C:\\ESAPI\\testUpload

本文发布于:2023-07-12 09:10:41,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/89/1078262.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:配置   美国   诗句
相关文章
留言与评论(共有 0 条评论)
   
验证码:
推荐文章
排行榜
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图