[ 
https://issues.apache.org/jira/browse/HADOOP-7621?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13104030#comment-13104030
 ] 

Aaron T. Myers commented on HADOOP-7621:
----------------------------------------

bq. keep all auth config in one place

Sure, but it's called "{{security-site.xml}}", but it doesn't contain most of 
the Hadoop security configs, just the HTTP auth filter configs. For that 
matter, is it unreasonable that there might be some HTTP auth filter config 
which clients might need to know? It seems like we're unnecessarily overloading 
the purpose of this file to be both secret and to group like-configs in the 
same place.

bq. make sense. Do we have such group today?

The answer to that is going to be specific to whatever method a user uses to 
install/configure Hadoop. FWIW, in CDH's packages there is a 'hadoop' group 
which both 'mapred' and 'hdfs' belong to. I don't know for sure, but I bet this 
is what the built-in Hadoop packages do, too.

bq. so where would be the location of this 'secret' file?

Good question. Kerberos has two distinct files: {{/etc/krb5.conf}} and 
{{/etc/krb5kdc/kdc.conf}}, where the former is world-readable, and the latter 
is not. Maybe, then, {{/etc/hadoop/conf/}} and {{/etc/hadoop/conf-secret/}} ?

bq. AFAIK you can set permissions with File but you cannot check them.

Ah, that could very well be. Pretty sure Hadoop has some classes with helper 
methods to deal with getting/setting group permissions, which might use JNI or 
fork a sub-process.

bq. using a 'secret' file just for this secret, what if there is something else 
needing a secret? we don't want those 'secrets' files to proliferate.

That's totally valid, and a very good point. Still, though, I'm not sure that 
the solution you have here is appropriate. For example, what if something 
should be secret only to the MR daemons, but not to the HDFS daemons, or vice 
versa? We couldn't reasonably put such a secret in {{security-site.xml}}, since 
as previously-mentioned this file must be readable by both.

> alfredo config should be in a file not readable by users
> --------------------------------------------------------
>
>                 Key: HADOOP-7621
>                 URL: https://issues.apache.org/jira/browse/HADOOP-7621
>             Project: Hadoop Common
>          Issue Type: Bug
>          Components: security
>    Affects Versions: 0.20.205.0, 0.23.0, 0.24.0
>            Reporter: Alejandro Abdelnur
>            Assignee: Alejandro Abdelnur
>            Priority: Critical
>             Fix For: 0.20.205.0, 0.23.0, 0.24.0
>
>         Attachments: HADOOP-7621.patch
>
>
> [thxs ATM for point this one out]
> Alfredo configuration currently is stored in the core-site.xml file, this 
> file is readable by users (it must be as Configuration defaults must be 
> loaded).
> One of Alfredo config values is a secret which is used by all nodes to 
> sign/verify the authentication cookie.
> A user could get hold of this secret and forge authentication cookies for 
> other users.
> Because of this the Alfredo configuration, should be move to a user 
> non-readable file.

--
This message is automatically generated by JIRA.
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to