[ 
https://issues.apache.org/jira/browse/RANGER-2833?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dineshkumar Yadav updated RANGER-2833:
--------------------------------------
    Description: 
Currently Strict-transport-security is not enforced on login.jsp 

*Description*: The application fails to prevent users from connecting to it 
over unencrypted connections. An attacker able to modify a legitimate user's 
network traffic could bypass the application's use of SSL/TLS encryption, and 
use the application as a platform for attacks against its users. This attack is 
performed by rewriting HTTPS links as HTTP, so that if a targeted user follows 
a link to the site from an HTTP page, their browser never attempts to use an 
encrypted connection. The sslstrip tool automates this process.

To exploit this vulnerability, an attacker must be suitably positioned to 
intercept and modify the victim's network traffic.This scenario typically 
occurs when a client communicates with the server over an insecure connection 
such as public Wi-Fi, or a corporate or home network that is shared with a 
compromised computer. Common defenses such as switched networks are not 
sufficient to prevent this. An attacker situated in the user's ISP or the 
application's hosting infrastructure could also perform this attack. Note that 
an advanced adversary could potentially target any connection made over the 
Internet's core infrastructure.

*Mitigation*: The application should instruct web browsers to only access the 
application using HTTPS. To do this, enable HTTP Strict Transport Security 
(HSTS) by adding a response header with the name 'Strict-Transport-Security' 
and the value 'max-age=expireTime', where expireTime is the time in seconds 
that browsers should remember that the site should only be accessed using 
HTTPS. Consider adding the 'includeSubDomains' flag if appropriate.

Note that because HSTS is a "trust on first use" (TOFU) protocol, a user who 
has never accessed the application will never have seen the HSTS header, and 
will therefore still be vulnerable to SSL stripping attacks. To mitigate this 
risk, you can optionally add the 'preload' flag to the HSTS header, and submit 
the domain for review by browser vendors.

  was:
Currently Strict transport security is not enforced on login.jsp 

*Description*: The application fails to prevent users from connecting to it 
over unencrypted connections. An attacker able to modify a legitimate user's 
network traffic could bypass the application's use of SSL/TLS encryption, and 
use the application as a platform for attacks against its users. This attack is 
performed by rewriting HTTPS links as HTTP, so that if a targeted user follows 
a link to the site from an HTTP page, their browser never attempts to use an 
encrypted connection. The sslstrip tool automates this process.

To exploit this vulnerability, an attacker must be suitably positioned to 
intercept and modify the victim's network traffic.This scenario typically 
occurs when a client communicates with the server over an insecure connection 
such as public Wi-Fi, or a corporate or home network that is shared with a 
compromised computer. Common defenses such as switched networks are not 
sufficient to prevent this. An attacker situated in the user's ISP or the 
application's hosting infrastructure could also perform this attack. Note that 
an advanced adversary could potentially target any connection made over the 
Internet's core infrastructure.

*Mitigation*: The application should instruct web browsers to only access the 
application using HTTPS. To do this, enable HTTP Strict Transport Security 
(HSTS) by adding a response header with the name 'Strict-Transport-Security' 
and the value 'max-age=expireTime', where expireTime is the time in seconds 
that browsers should remember that the site should only be accessed using 
HTTPS. Consider adding the 'includeSubDomains' flag if appropriate.

Note that because HSTS is a "trust on first use" (TOFU) protocol, a user who 
has never accessed the application will never have seen the HSTS header, and 
will therefore still be vulnerable to SSL stripping attacks. To mitigate this 
risk, you can optionally add the 'preload' flag to the HSTS header, and submit 
the domain for review by browser vendors.


> Enforcing Strict transport security
> -----------------------------------
>
>                 Key: RANGER-2833
>                 URL: https://issues.apache.org/jira/browse/RANGER-2833
>             Project: Ranger
>          Issue Type: Bug
>          Components: Ranger
>            Reporter: Dineshkumar Yadav
>            Priority: Major
>
> Currently Strict-transport-security is not enforced on login.jsp 
> *Description*: The application fails to prevent users from connecting to it 
> over unencrypted connections. An attacker able to modify a legitimate user's 
> network traffic could bypass the application's use of SSL/TLS encryption, and 
> use the application as a platform for attacks against its users. This attack 
> is performed by rewriting HTTPS links as HTTP, so that if a targeted user 
> follows a link to the site from an HTTP page, their browser never attempts to 
> use an encrypted connection. The sslstrip tool automates this process.
> To exploit this vulnerability, an attacker must be suitably positioned to 
> intercept and modify the victim's network traffic.This scenario typically 
> occurs when a client communicates with the server over an insecure connection 
> such as public Wi-Fi, or a corporate or home network that is shared with a 
> compromised computer. Common defenses such as switched networks are not 
> sufficient to prevent this. An attacker situated in the user's ISP or the 
> application's hosting infrastructure could also perform this attack. Note 
> that an advanced adversary could potentially target any connection made over 
> the Internet's core infrastructure.
> *Mitigation*: The application should instruct web browsers to only access the 
> application using HTTPS. To do this, enable HTTP Strict Transport Security 
> (HSTS) by adding a response header with the name 'Strict-Transport-Security' 
> and the value 'max-age=expireTime', where expireTime is the time in seconds 
> that browsers should remember that the site should only be accessed using 
> HTTPS. Consider adding the 'includeSubDomains' flag if appropriate.
> Note that because HSTS is a "trust on first use" (TOFU) protocol, a user who 
> has never accessed the application will never have seen the HSTS header, and 
> will therefore still be vulnerable to SSL stripping attacks. To mitigate this 
> risk, you can optionally add the 'preload' flag to the HSTS header, and 
> submit the domain for review by browser vendors.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to