[
https://issues.apache.org/jira/browse/AMBARI-10777?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14544468#comment-14544468
]
Luciano Resende commented on AMBARI-10777:
------------------------------------------
These are pretty much the same, with a "security spin" on the current jira.
Once one is fixed, both should be marked fixed.
> Security exposure - Quicklinks to Web UI exposes cluster servers
> ----------------------------------------------------------------
>
> Key: AMBARI-10777
> URL: https://issues.apache.org/jira/browse/AMBARI-10777
> Project: Ambari
> Issue Type: Improvement
> Components: security
> Affects Versions: 1.7.0, 2.0.0, 2.2.0, Ambari-2.1
> Environment: All
> Reporter: Jeffrey E Rodriguez
> Original Estimate: 168h
> Remaining Estimate: 168h
>
> Ambari Security exposure -
> "Quick Links" Ambari allow Ambari users to access servers inside of users
> cluster. e.g. Click oozie Web UI, if installed, you get redirected to Ooozie
> UI server. Worse yet, if not SSL set up that is a gapping security hole.
> Since Knox is a component of Ambari then it makes sense to set the
> Quickreferences as a proxified links.
> This could work as follows:
> + If Knox is installed, the current topology may be picked and the proxified
> links could be derived from the Knox gateway configuration.
> The URL variable can then be set to the proxy URLs.
> + If Knox is not installed then we use the default non proxy URL variables.
> In the example of Oozie, if you put the Oozie Knox through a proxy and put
> the proxified link that would be accessed through Knox securely and outsiders
> to the cluster would not gain information about the inside of the cluster.
> Also We need to think about customers who may want to set a firewall, how
> would customer access User Interfaces services in a cluster managed by Ambari
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)