>> Hadoop does not invoke Ranger authorizer for "hdfs" superuser.


I couldn¹t find an open issue
<https://issues.apache.org/jira/issues/?jql=project%20%3D%20HADOOP%20AND%20
text%20~%20%22call%20authorizer%20for%20superuser%22> on Hadoop project
for this item.  Or has this been remedied in the new authorization API
that Hadoop has been working towards?



From:  Balaji Ganesan <[email protected]>
Reply-To:  "[email protected]"
<[email protected]>
Date:  Sunday, June 7, 2015 at 5:16 PM
To:  Suraj Nayak <[email protected]>
Cc:  "[email protected]" <[email protected]>,
"[email protected]" <[email protected]>
Subject:  Re: hdfs user can bypass policy in ranger


Hadoop does not invoke Ranger authorizer for "hdfs" superuser. A
recommended method would be to setup separate administrator, different
from "hdfs" user. We have these administrators showing up in the audit logs

<<<Even the audits are not captured via Ranger for hdfs users. By
encrypting the data we can solve the issue of data
 access by admins partially, as hdfs user can apply brute force method to
crack the encryption system and this activity is never logged in Ranger.


I am not sure what brute force method you are referring here. In HDFS
encryption that has been introduced, "hdfs" user can be blocked and it
would be very hard for "hdfs" user to get a key to decrypt data.


On Sun, Jun 7, 2015 at 1:49 PM, Suraj Nayak
<[email protected]> wrote:

Thanks Balaji for your reply.

Is there a reason why Ranger does not call authorizer for superuser
operations? 

Even the audits are not captured via Ranger for hdfs users. By encrypting
the data we can solve the issue of data access by admins partially, as
hdfs user can apply brute force method to crack the encryption system and
this activity is never logged
 in Ranger.

Can we enable auditing for superusers?

Thanks in advance! 



On Thu, Jun 4, 2015 at 12:28 PM, Balaji Ganesan
<[email protected]> wrote:

Yes, best way to protect sensitive data from admins would be to use
encryption. For access control, HDFS does not call Ranger authorizer for
superuser operations. Consequently, there is no access control enforced by
Ranger nor there is Ranger
 audit. 

On Thu, Jun 4, 2015 at 6:17 AM, Suraj Nayak
<[email protected]> wrote:

Thanks Loïc for the quick response! So, to protect PII information being
accessed from admins encryption is the way ahead. Right?

On Thu, Jun 4, 2015 at 5:55 AM, Chanel Loïc
<[email protected]> wrote:

Hi Suraj Nayak,
 
As Hadoop authorizations run the same way than Unix ones,
hdfs is the equivalent of super user in Linux.
So basically yes
hdfs can bypass any rule/policy set by Ranger as it has all the rights on
the cluster.
 
Regards,
 
 
Loïc
 
 
De : Suraj Nayak [mailto:[email protected]]

Envoyé : jeudi 4 juin 2015 14:48
À :[email protected]
Objet : hdfs user can bypass policy in ranger
 
Hi Ranger Users,
 

Am new to Ranger. What I tried was, I created a HDFS policy for a file
created by user say
hdusr. The policy states only hdusr can access. Ranger behaves perfectly
well by denying access to this hdfs file resource for all users other than
hdusr except hdfs user.

 

Does this mean that hdfs superuser can bypass the policy and open, rename
and delete a file which is protected by Ranger policy?

 

Thanks in advance :)

 

-- 
Thanks

Suraj Nayak M









________________________________________

Ce message et les pièces jointes sont confidentiels et réservés à l'usage
exclusif de ses destinataires. Il peut également être protégé par le
secret professionnel. Si vous recevez ce message par erreur, merci d'en
avertir immédiatement l'expéditeur et de le
 détruire. L'intégrité du message ne pouvant être assurée sur Internet, la
responsabilité de Worldline ne pourra être recherchée quant au contenu de
ce message. Bien que les meilleurs efforts soient faits pour maintenir
cette transmission exempte de tout virus,
 l'expéditeur ne donne aucune garantie à cet égard et sa responsabilité ne
saurait être recherchée pour tout dommage résultant d'un virus transmis.

This e-mail and the documents attached are confidential and intended
solely for the addressee; it may also be privileged. If you receive this
e-mail in error, please notify the sender immediately and destroy it. As
its integrity cannot be secured on the Internet,
 the Worldline liability cannot be triggered for the message content.
Although the sender endeavours to maintain a computer virus-free network,
the sender does not warrant that this transmission is virus-free and will
not be liable for any damages resulting
 from any virus transmitted.







-- 
Thanks
Suraj Nayak M


















-- 
Thanks
Suraj Nayak M










Reply via email to