[ 
https://issues.apache.org/jira/browse/HADOOP-2632?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Robert Chansler resolved HADOOP-2632.
-------------------------------------

       Resolution: Fixed
    Fix Version/s: 0.18.0

No outstanding problems.

> Discussion of fsck operation in the permissions regime
> ------------------------------------------------------
>
>                 Key: HADOOP-2632
>                 URL: https://issues.apache.org/jira/browse/HADOOP-2632
>             Project: Hadoop Core
>          Issue Type: Task
>          Components: dfs
>    Affects Versions: 0.16.0
>            Reporter: Robert Chansler
>            Assignee: Robert Chansler
>             Fix For: 0.18.0
>
>
> Proposal: In 0.16, with permission checking enabled, fsck will just work 
> regardless of permission settings.
> The normal operation of fsck can reveal information about the name system 
> that would otherwise be unavailable to a user via other commands that would 
> be subject to permission checking. While not best, this situation seems 
> tolerable for 0.16.
>   1. It not certain what permission checking should be done, other than 
> perhaps just restricting fsck to the superuser.
>   2. The information revealed is not too privileged.
>   3. The mischievous user has better things to do.
>   4. fsck does not fit with either of the existing models for permission 
> checking.
> fsck is implemented as HTTP GET of a well-known URL. As such, the first 
> thought is that it should operate with the permissions of web UI client. In 
> 0.16, the web UI client is presumed to have the identity of some 
> cluster-configured user. If the cluster-configured user is the superuser, web 
> UI clients can browse the contents of any file. If the user is any other 
> identity, the user would not have full access to the name space necessary for 
> fsck to operate unless every directory had mode a+r. The alternative is to 
> treat fsck according to the rules of other administrative commands. At 
> present, fsck does no RPC requests, and so there is no option to apply the 
> permission checking rules used by other commands.
> If it is important to change 0.16 so that fsck checked user identity, an 
> implementation would have to use a new RPC to obtain a ticket that authorized 
> access to the fsck URL. The ticket would be passed as a parameter to HTTP 
> GET. The implementation of fsck would check the the proffered ticket was 
> valid before traversing the name space.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to