[
https://issues.apache.org/jira/browse/AIRFLOW-2809?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16561060#comment-16561060
]
ASF subversion and git services commented on AIRFLOW-2809:
----------------------------------------------------------
Commit dfa7b26ddaca80ee8fd9915ee9f6eac50fac77f6 in incubator-airflow's branch
refs/heads/master from XD-DENG
[ https://git-wip-us.apache.org/repos/asf?p=incubator-airflow.git;h=dfa7b26 ]
[AIRFLOW-2809] Fix security issue regarding Flask SECRET_KEY
It's recommended by Falsk community to use random
SECRET_KEY for security reason.
However, in Airflow there is a default value for
secret_key and most users will ignore to change
it.
This may cause security concern.
Closes #3651 from XD-DENG/patch-2
> Fix security issue regarding Flask SECRET_KEY
> ---------------------------------------------
>
> Key: AIRFLOW-2809
> URL: https://issues.apache.org/jira/browse/AIRFLOW-2809
> Project: Apache Airflow
> Issue Type: Bug
> Components: webserver
> Reporter: Xiaodong DENG
> Assignee: Xiaodong DENG
> Priority: Major
>
> h2. Background
> Currently there is a configuration item *secret_key* in the configuration
> .cfg file, with a default value "temporary_key".
> h2. Issue
> Most admins would ignore it and just use the default value "temporary_key".
> However, this may be very dangerous. User may modify the cookie if they try
> the default SECRET_KEY while the admin didn't change it.
> In Flask documentation, it's suggested to have a SECRET_KEY which is as
> random as possible ([http://flask.pocoo.org/docs/1.0/quickstart/] ).
> h2. My Proposal
> If Admin explicitly specified the SECRET_KEY in *.cfg* file, we use this
> SECRET_KEY given by Admin.
> If the default SECRET_KEY is not changed in *.cfg* file, randomly generate
> SECRET_KEY. Meanwhile, print INFO to remind that a randomly generated
> SECRET_KEY is used.
> This solution will not affect user experience at all.
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)