Re: Hadoop and security.

2008-10-06 Thread Steve Loughran
Dmitry Pushkarev wrote: Dear hadoop users, I'm lucky to work in academic environment where information security is not the question. However, I'm sure that most of the hadoop users aren't. Here is the question: how secure hadoop is? (or let's say foolproof) Right now hadoop is

Re: Hadoop and security.

2008-10-06 Thread Edward Capriolo
You bring up some valid points. This would be a great topic for a white paper. The first line of defense should be to apply inbound and outbound iptables rules. Only source IPs that have a direct need to interact with the cluster should be allowed to. The same is true with the web access. Only a

Re: Hadoop and security.

2008-10-06 Thread Allen Wittenauer
On 10/6/08 6:39 AM, Steve Loughran [EMAIL PROTECTED] wrote: Edward Capriolo wrote: You bring up some valid points. This would be a great topic for a white paper. -a wiki page would be a start too I was thinking about doing Deploying Hadoop Securely for a ApacheCon EU talk, as by that

Re: Hadoop and security.

2008-10-06 Thread Steve Loughran
Edward Capriolo wrote: You bring up some valid points. This would be a great topic for a white paper. -a wiki page would be a start too The first line of defense should be to apply inbound and outbound iptables rules. Only source IPs that have a direct need to interact with the cluster

Re: Hadoop and security.

2008-10-06 Thread Steve Loughran
Allen Wittenauer wrote: On 10/6/08 6:39 AM, Steve Loughran [EMAIL PROTECTED] wrote: Edward Capriolo wrote: You bring up some valid points. This would be a great topic for a white paper. -a wiki page would be a start too I was thinking about doing Deploying Hadoop Securely for a

Hadoop and security.

2008-10-05 Thread Dmitry Pushkarev
Dear hadoop users, I'm lucky to work in academic environment where information security is not the question. However, I'm sure that most of the hadoop users aren't. Here is the question: how secure hadoop is? (or let's say foolproof) Here is the answer:

Re: Hadoop and security.

2008-10-05 Thread Ted Dunning
Hadoopy is secure enough to be used on a cluster that has access control in a friendly environment. That is to say, not very. These issues are well known. User identities were added recently, but, as you note, they are dependent on trusting unix logins and can easily be spoofed. More secure