This repository was archived by the owner on Apr 15, 2018. It is now read-only.
This repository was archived by the owner on Apr 15, 2018. It is now read-only.
Disable dynamic class loading and Java serialization by default #14
Open
Description
Deserialization of data from untrusted users can represent a security flaw. While Copycat and Atomix clusters should never be exposed to untrusted users, there's nevertheless no good reason to have dynamic class loading and Java serialization enabled. Performance is slow for Java serialization, and dynamic class loading requires serializing class names. These features should be disabled by default in order to encourage more efficient and secure white listing of classes with space-compact serialization IDs.
Metadata
Metadata
Assignees
Labels
No labels