[ 
https://issues.apache.org/jira/browse/COUCHDB-1631?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13535282#comment-13535282
 ] 

Dave Cottlehuber commented on COUCHDB-1631:
-------------------------------------------

Let's say you have a cloud hosted application. A simple query to _all_dbs gives 
somebody a list of the number of subscribers you have, and potentially from 
that list of DB names, may be able to identify businesses or individuals who 
are actually using that service, if you're using per-user DBs, which is a 
common couch scenario. You should have sensible precautions in place to avoid 
this, of course.

@Benoit: Point taken about futon, can you expand on your suggestion? Do you 
mean let _all_dbs work if the requesting url has _utils/ in it?

Seeing the DBs you have permissions for would be better. I don't see how to do 
this in a way that doesn't require iterating over all DBs to retrieve roles and 
user access, which seems a pretty bad approach, even if it were cached. This 
might be more workable in bigcouch, not sure how DB security information is 
shared there.
                
> Require admin privileges to read _all_dbs
> -----------------------------------------
>
>                 Key: COUCHDB-1631
>                 URL: https://issues.apache.org/jira/browse/COUCHDB-1631
>             Project: CouchDB
>          Issue Type: New Feature
>          Components: HTTP Interface
>            Reporter: Dave Cottlehuber
>         Attachments: force_admins_only_for_all_dbs.diff
>
>
> The patch for this is straightforwards, & I think that this should actually 
> be the default behaviour in future. Comments?
> Note to self, docs, tests required once discussion is settled.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to