+1 to use-cases involving knox audit event analysis! On Thu, Jul 12, 2018 at 11:03 PM larry mccay <lmc...@apache.org> wrote:
> We may not know the original authentication account for all usecases. > Especially in cloud deployments where authentication events can be > federated in various ways. > > Yes, cross project work in the security space can bring some interesting > synergies. > > > On Thu, Jul 12, 2018, 3:39 PM Simon Elliston Ball < > si...@simonellistonball.com> wrote: > > > It certainly might make for an interesting automated response if metron > > sent alerts to Knox to block IPs for example, or users in the case of > > strange behavior (though I wonder if that would generally be done > upstream > > in the authentication source, e.g. blocking an AD account). > > > > Pushing Knox audit events to Metron would also provide an interesting > data > > source for things like brute force detection, or strange access patterns. > > I’ve seen people doing similar things with Ranger. > > > > So far the only real issue I’ve seen with Knox itself is replacing > > certificates. I was hoping to do that by providing a blueprint setting in > > Ambari with a proper cert, but that’s probably a question for dev@ambari. > > Great to see so many projects working together! > > > > Simon > > > > > On 12 Jul 2018, at 17:10, larry mccay <lmc...@apache.org> wrote: > > > > > > Glad to see this work being done! > > > Please feel free to reach out to Knox dev@ list for any assistance and > > > potentially review. > > > > > > Only sort of related, I have been thinking about another integration > > > between Knox and Metron wherein possible threat details can be > > communicated > > > to Knox to take action on at authentication/authorization time. > > > Knox could also potentially push interesting events like possible brute > > > force login attempts to Metron. > > > Some bi-directional pub-sub model? > > > > > > Thoughts? > > > > > >> On Thu, Jul 12, 2018 at 11:57 AM, Casey Stella <ceste...@gmail.com> > > wrote: > > >> > > >> I added the feature branch: feature/METRON-1663-knoxsso > > >> > > >> https://git-wip-us.apache.org/repos/asf?p=metron.git;a= > > >> shortlog;h=refs/heads/feature/METRON-1663-knoxsso > > >> > > >> On Thu, Jul 12, 2018 at 11:13 AM Otto Fowler <ottobackwa...@gmail.com > > > > >> wrote: > > >> > > >>> I think I understand what you are saying very very very well Simon. > I > > am > > >>> not sure what would be different about your submittal from other > > >> submittals > > >>> where that argument failed. > > >>> > > >>> On July 12, 2018 at 11:07:02, Simon Elliston Ball ( > > >>> si...@simonellistonball.com) wrote: > > >>> > > >>> Agreed Otto, the challenge is that essentially each change cuts > across > > >>> dependencies in every component. I could break it down into the > changes > > >> for > > >>> making SSO work, and the changes for making it install, and the > changes > > >> for > > >>> making full-dev work, but that would mean violating our policy that > > >> testing > > >>> should be done for each PR on full dev, hence the one PR one unit > > >> approach. > > >>> Does that work, or do we want to review on the basis of a series of > > >>> untestable bits, and then a final working build PR that pulls it > > >> together? > > >>> > > >>> Simon > > >>> > > >>>> On 12 July 2018 at 16:00, Otto Fowler <ottobackwa...@gmail.com> > > wrote: > > >>>> > > >>>> Our policy in the past on such things is to require that they are > > >> broken > > >>>> into small reviewable chunks on a feature branch, even if the end to > > >> end > > >>>> working version was more ‘usable’. > > >>>> > > >>>> > > >>>> > > >>>> On July 12, 2018 at 10:51:30, Simon Elliston Ball ( > > >>>> si...@simonellistonball.com) wrote: > > >>>> > > >>>> I've been doing some work on getting the Metron UIs and REST layers > to > > >>> work > > >>>> with Apache KnoxSSO, and LDAP authentication, to remove the need to > > >> store > > >>>> passwords in MySQL, allow AD integration, secure up our > authentication > > >>>> points. I'm also working in a Knox service to allow the gateway to > > >>> provide > > >>>> full SSL for the interfaces and avoid all the proxying and CORS > things > > >> we > > >>>> have to worry about. > > >>>> > > >>>> This has ended up being a pretty chunky piece of work which involves > > >> very > > >>>> significant changes to the UIs, REST layer, and introduces Knox to > the > > >>>> blueprint, as well as messing with the full-dev build scripts, and > > >> adding > > >>>> ansible roles. > > >>>> > > >>>> As such, in-order to make it a bit more reviewable, would it be > better > > >> to > > >>>> contribute it to a feature branch? It could arguably be broken into > a > > >>>> series of PRs, but at least some parts of full dev would be broken > > >>> between > > >>>> most of the logical steps, since it's all kinda co-dependent, so > it's > > >>>> easier to look at as a unit. > > >>>> > > >>>> Simon > > >>>> > > >>>> > > >>> > > >>> > > >>> -- > > >>> -- > > >>> simon elliston ball > > >>> @sireb > > >>> > > >> > > >