Conversation

For Apache Log4j remediation priority it seems the best approach right now is: 1. log4j 2.x through 2.14 - update to 2.16 2. log4j 1.x - update to 2.16 3. log4j 2.15 - update to 2.16
33
876
Replying to
logback is the real continuation of log4j1 by the original developer. Most people would really be better off using the far simpler and dramatically lower attack surface java.util.logging from the standard library. Fancy processing / triggers can be done separately via rsyslog.
1
33
Replying to and
logback is far closer to log4j1 than log4j2 and far lower attack surface. It was only vulnerable if the attacker had control of your configuration or you set up these rarely used features. twitter.com/DanielMicay/st is really the way to go for most people. Keep it simple instead...
Quote Tweet
java.util.logging is easy to use and has everything you would ever need. If you want fancy processing/triggers, you should use rsyslog. logger.warning("message"); logger.fine(() -> "lazy evaluation: " + parameter); That high-level API dynamically adds class/method name itself.
Show this thread
4
Replying to and
Covered by the next tweet: twitter.com/DanielMicay/st. logback's incarnation of this vulnerability was an opt-in configuration option so an attacker would need to have control of the configuration file or you'd need to be in the very tiny minority enabling such a weird feature.
Quote Tweet
Replying to @DanielMicay and @WeldPond
logback is far closer to log4j1 than log4j2 and far lower attack surface. It was only vulnerable if the attacker had control of your configuration or you set up these rarely used features. twitter.com/DanielMicay/st is really the way to go for most people. Keep it simple instead...
1
2
Show replies