[ 
https://issues.apache.org/jira/browse/HADOOP-15162?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16317386#comment-16317386
 ] 

Eric Yang commented on HADOOP-15162:
------------------------------------

In summary, proxy user ACL should be checked for simple security instead of 
reliance on isSecurityEnabled().  {{isSecurityEnabled()}} gives a false sense 
that proxy user ACL shouldn't be checked which leading to use of 
UserGroupInformation.createRemoteUser(remoteUser) in server code, which is a 
bad practice for not verifying the credential of current server user.  Is this 
something that need to be improved or we mark this as won't fix  and make sure 
people always use proper proxy user directive for server side code?

{code}
proxyUser = UserGroupInformation.getLoginUser();
        ugi = UserGroupInformation
            .createProxyUser(remoteUser, proxyUser);
{code}


> UserGroupInformation.createRemoteUser hardcode authentication method to SIMPLE
> ------------------------------------------------------------------------------
>
>                 Key: HADOOP-15162
>                 URL: https://issues.apache.org/jira/browse/HADOOP-15162
>             Project: Hadoop Common
>          Issue Type: Bug
>          Components: security
>            Reporter: Eric Yang
>
> {{UserGroupInformation.createRemoteUser(String user)}} is hard coded 
> Authentication method to SIMPLE by HADOOP-10683.  This by passed proxyuser 
> ACL check, isSecurityEnabled check, and allow caller to impersonate as 
> anyone.  This method could be abused in the main code base, which can cause 
> part of Hadoop to become insecure without proxyuser check for both SIMPLE or 
> Kerberos enabled environment.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to