[
https://issues.apache.org/jira/browse/HADOOP-2230?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12543716
]
Allen Wittenauer commented on HADOOP-2230:
------------------------------------------
There are a lot of hidden issues here. Let's see if I can cover them all in
one post. :)
- On role based/capable operating systems (Solaris comes to mind) it is
possible to strictly curtail root's capability. It is not a safe assumption to
assume that root==all powerful.
- In many cases, esp. for large data centers, the sysadmins are not the same
people who administer the applications. So trusting a group like wheel or root
to hold who should have the power in Hadoop would cause these types of places a
lot of pain.
- Trusting the uid that hadoop to be running under as privileged may not be
possible if the hadoop process is running under a dedicated, noaccess type of
account. [In many places, they incorrectly use nobody or daemon for this type
of thing, but the name of the account is irrelevant. ]
That said, I think I'd really prefer to either be able to specify exactly what
users or what groups should contain the users that should be privileged.
While I realize there is no 'su' capability either, the more I think about
this, the more I'm thinking that there probably should be some sort of 'double
check' when it comes time for privilege escalation. After all, if I'm an admin
user I don't want to accidently rm -rf / without having some sort of safety net
(other than Trash, of cousre). chown/chgrp are much more dangerous without
this safety net, I think. For example, under roles on Solaris, a user can use
their 'superpowers' by issuing 'pfexec command' (vs. just using 'command').
Hmm...
> Post users: need admin-only access to HDFS
> -------------------------------------------
>
> Key: HADOOP-2230
> URL: https://issues.apache.org/jira/browse/HADOOP-2230
> Project: Hadoop
> Issue Type: New Feature
> Environment: All
> Reporter: Allen Wittenauer
>
> When user support gets added to HDFS, administrators are going to need to be
> able to set the namenode such that it only allows connections/interactions
> from the administrative user. This is particularly important after upgrades
> and for other administrative work that may require the changing of user/group
> ownership, permissions, location of files within the HDFS, etc.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.