Table of Contents
This chapter discusses how SavaPage secures sensitive user and application data, and how it communicates with external Information Providers.
HTTP Service Filters enforce access policies at the point where remote clients connect to the SavaPage server. Connection requests may be delayed, throttled, rejected, aborted or denied. Statistics are shown in the Admin Web App. See Section 4.3.7, “Filtered Requests”.
Details of the filtered requests are persisted in the rotating log file:
/opt/savapage/server/logs/security.log
This file has a tab separated value (TSV) format for easy import and
manipulation into spreadsheet programs. See
/opt/savapage/server/data/log4j.properties
for
more information.
If your log4j.properties
does not contain the "Security
Logger" section, copy it from:
/opt/savapage/server/examples/data/log4j.properties.template
A Denial of Service Filter keeps track of the number of requests from a
connection to the SavaPage server per second. If a limit is exceeded, the
request is either delayed, throttled, rejected or aborted. A throttled request
is placed in a queue and will only proceed when there is capacity. HTTP status
code 429
is sent if there are too many requests.
Configuration property | Description |
---|---|
system.dosfilter.enable |
Set to |
system.dosfilter.delay-msec |
Delay (in milliseconds) that is applied to all
requests over the rate limit
|
system.dosfilter.max-idle-tracker-msec |
Maximum amount of time (in milliseconds) to keep track
of request rates for a connection, before deciding that
the user has gone away, and discarding it. Default:
|
system.dosfilter.max-request-msec |
Maximum amount of time (in milliseconds) to allow the
request to process. Default:
|
system.dosfilter.max-requests-per-sec |
Maximum number of requests from a connection per
second. Requests in excess of this are first delayed,
then throttled. Default: |
system.dosfilter.throttle-msec |
Amount of time (in milliseconds) to async wait for
semaphore. Default: |
system.dosfilter.throttled-requests |
Number of requests over the rate limit able to be
considered at once. Default:
|
system.dosfilter.too-many-code |
HTTP status code to send if there are too many requests. Default: 429 (too many requests). 503 (service unavailable) is another option. |
system.dosfilter.whitelist |
Comma-separated list of host names, IPv4 addresses in
decimal notation Note: |
system.dosfilter.warn-interval.applog.mins |
Interval (minutes) within which filter events are
totaled and written as warning in the Application
Log. The expiration of the interval is
triggered by a filter event. Default:
|
system.dosfilter.warn-interval.webapp.secs |
Interval (seconds) within which filter events are
totaled and send as Real-time Activity warning with popup
message to the Admin Web App. Default:
|
Table 17.1. Denial of Service Filter : Configuration Properties
See Section 4.11.14, “Config Editor” on
how to set these properties.
An Inet Access Filter allows/denies remote access to the SavaPage server
according to a list of IP addresses. HTTP error code 403
is
sent if a request is denied.
Configuration property | Description |
---|---|
system.inetfilter.enable |
Set to |
system.inetfilter.whitelist |
A list of comma-separated list of IPv4/6 addresses,
individual or in CIDR notation that are allowed access.
Requests from remote addresses that do not match the
whitelist are denied with HTTP error code
Note: |
system.inetfilter.whitelist.empty-allow-all |
Set to If |
system.inetfilter.blacklist |
A list of comma-separated IPv4/6 addresses, individual
or in CIDR notation. Requests from remote addresses that
match the list are denied with HTTP error code
Black list entries are always applied, so that even if an entry matches the white list, a black list entry will override it. Note: |
system.inetfilter.warn-interval.applog.mins |
Interval (minutes) within which denied requests are
totaled and written as warning in the Application
Log. The expiration of the interval is
triggered by a InetAccessFilter event. Default:
|
system.inetfilter.warn-interval.webapp.secs |
Interval (seconds) within which denied requests are
totaled and send as Real-time Activity warning with popup
message to the Admin Web App. Default:
|
Table 17.2. Inet Access Filter : Configuration Properties
See Section 4.11.14, “Config Editor” on
how to set these properties.