SOLR-607 is still open.Till it is committed this solution may not be poossible
--Noble

On Mon, Jun 30, 2008 at 10:23 AM, Noble Paul നോബിള്‍ नोब्ळ्
<[EMAIL PROTECTED]> wrote:
> If you have a master slave configuration I guess it is a good idea to
> remove the updatehandler altogether from slaves.
> --Noble
>
> On Sat, Jun 28, 2008 at 2:39 AM, Chris Hostetter
> <[EMAIL PROTECTED]> wrote:
>>
>> : > A basic technique that can be used to mitigate the risk of a possible 
>> CSRF
>> : > attack like this is to configure your Servlet Container so that access to
>> : > paths which can modify the index (ie: /update, /update/csv, etc...) are
>> : > restricted either to specific client IPs, or using HTTP Authentication.
>> :
>> : My understanding is that HTTP authentication is useless against XSRF,
>> : because browsers cache the authentication tokens. Once you have
>> : authenticated, you are still vulnerable to attacks.
>>
>> while I agree that is generally true, my suggestion about using HTTP
>> Authentication was to reduce the number of "clients" that have access to
>> update URLs.  if you add authentication but then give everyone on your
>> intranet a username/password it would certianly defeat the point ...
>> people, using web browsers, don't typically need to hit URLs
>> like "/update".   Updates are typically sent by other applications, so if
>> you use authentication and hardcode credentials into your "update clients"
>> (which are automated and no going to hit arbitrary URLs maliciously fed to
>> them by bad guys) but do not give credentials to people who surf the
>> public internet you can help mitigate the risk.
>>
>> (of course: if you have a something like a webcrawler scraping webpages
>> and posting the docs directly to Solr, then that crawler could fall prey
>> to a CSRF attack as well -- you'd want to make sure that the
>> "crawl" requests didn't have access to the same credentials needed for
>> sending updates)
>>
>> : Restricting access to the servlet container by IP is probably safer.
>> : To access the admin pages, I proxy the servlet container via Apache,
>> : similar to this snippet given below.
>> :
>> : This requires the user to authenticate via SSL for all SOLR-related
>> : pages, and additionally blocks all update queries. If one also would
>>
>> But doesn't that mean that any system with a legitimate need to update
>> the index has to bypass your proxy?  What prevents a CSRF based attack
>> from bypasing your proxy as well?
>> : Comments, anyone? This configuration is container-agnostic, so if no
>> : serious problems are found with my setup, which Wiki page would be
>> : most appropriate for this snippet?
>>
>> It's container agnostic, but does require the use an an Apache HTTPD proxy
>> ... recipies like this seem like they'd be suitable on the SolrSecurity
>> page (but it still seems like there's a missing piece ... restricting the
>> appserver so it only accepts requests from the proxy, and a way for the
>> proxy to pass requests on to /update if and only if they come from
>> specific IPs, or specific "users", etc...
>>
>>
>> -Hoss
>>
>>
>
>
>
> --
> --Noble Paul
>



-- 
--Noble Paul

Reply via email to