[ 
https://issues.apache.org/jira/browse/HADOOP-15600?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16556094#comment-16556094
 ] 

Daryn Sharp commented on HADOOP-15600:
--------------------------------------

*-Infinity*. This would cause a landslide of CVEs. There must be no default 
proxy users. Defaults will apply to every service. The exposure from 
exploitable systems would be huge.  I would never want my clusters configured 
in such a nightmarish way.

{quote}These settings are default to be opened which allows any hosts to 
impersonate any user.{quote}
First off, this completely false unless something is terribly broken in 3.x.  
There are NO proxy users unless defined. If a proxy user is configured with an 
ACL, but has no explicit hosts, it will fail. You must very specifically 
configure a proxy user.


bq. This will allow the cluster to default to a closed network and default 
"users" group to reduce risks.
Quite the opposite.  Proxy users should be tightly controlled. When it comes to 
security the default posture must be deny, with specific rules for specific 
rules to limit attack vectors. Opening proxy access from entire network ranges 
is unfathomable. My proxy definitions specifically list every host. I would 
never use a network range, esp. 10.0.0.0/8.

There is no reason for "hdfs" to be a proxy user.  While one may think it's ok 
because hdfs can access everything anyway, that's false.  Allowing hdfs to 
proxy will allow the admin to walk right through:
 # the "security.hdfs.unreadable.by.superuser" feature
 # external access enforcers that restrict the capabilities of hdfs
 # kms key ACLs are moot and EZ data is no longer shielded from admins

Letting the RM, and presumably the NMs, be proxy users to all services is a 
terrible idea.  Steal credentials from one node and it's game over.

> Set default proxy user settings to non-routable IP addresses and default 
> users group
> ------------------------------------------------------------------------------------
>
>                 Key: HADOOP-15600
>                 URL: https://issues.apache.org/jira/browse/HADOOP-15600
>             Project: Hadoop Common
>          Issue Type: Sub-task
>          Components: security
>            Reporter: Eric Yang
>            Priority: Major
>
> The default setting to restrict the cluster nodes to communicate with peer 
> nodes are controlled by: hadoop.proxyuser.[hdfs.yarn].hosts, and 
> hadoop.proxyuser.[hdfs|yarn].groups.  These settings are default to be opened 
> which allows any hosts to impersonate any user.
> The proposal is to default settings to:
> {code}
>     <property>
>       <name>hadoop.proxyuser.hdfs.hosts</name>
>       
> <value>127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,169.254.0.0/16</value>
>     </property>
>     <property>
>       <name>hadoop.proxyuser.hdfs.groups</name>
>       <value>users</value>
>     </property>
>     <property>
>       <name>hadoop.proxyuser.yarn.hosts</name>
>       
> <value>127.0.0.0/8,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,169.254.0.0/16</value>
>     </property>
>     <property>
>       <name>hadoop.proxyuser.yarn.groups</name>
>       <value>users</value>
>     </property>
> {code}
> This will allow the cluster to default to a closed network and default 
> "users" group to reduce risks.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to