[ https://issues.apache.org/jira/browse/RANGER-2833?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Dineshkumar Yadav reassigned RANGER-2833: ----------------------------------------- Assignee: Dineshkumar Yadav > Enforcing Strict transport security > ----------------------------------- > > Key: RANGER-2833 > URL: https://issues.apache.org/jira/browse/RANGER-2833 > Project: Ranger > Issue Type: Bug > Components: Ranger > Reporter: Dineshkumar Yadav > Assignee: Dineshkumar Yadav > Priority: Major > > Currently Strict-transport-security is not enforced on login.jsp > *Description*: The application fails to prevent users from connecting to it > over unencrypted connections. An attacker able to modify a legitimate user's > network traffic could bypass the application's use of SSL/TLS encryption, and > use the application as a platform for attacks against its users. This attack > is performed by rewriting HTTPS links as HTTP, so that if a targeted user > follows a link to the site from an HTTP page, their browser never attempts to > use an encrypted connection. The sslstrip tool automates this process. > To exploit this vulnerability, an attacker must be suitably positioned to > intercept and modify the victim's network traffic.This scenario typically > occurs when a client communicates with the server over an insecure connection > such as public Wi-Fi, or a corporate or home network that is shared with a > compromised computer. Common defenses such as switched networks are not > sufficient to prevent this. An attacker situated in the user's ISP or the > application's hosting infrastructure could also perform this attack. Note > that an advanced adversary could potentially target any connection made over > the Internet's core infrastructure. > *Mitigation*: The application should instruct web browsers to only access the > application using HTTPS. To do this, enable HTTP Strict Transport Security > (HSTS) by adding a response header with the name 'Strict-Transport-Security' > and the value 'max-age=expireTime', where expireTime is the time in seconds > that browsers should remember that the site should only be accessed using > HTTPS. Consider adding the 'includeSubDomains' flag if appropriate. > Note that because HSTS is a "trust on first use" (TOFU) protocol, a user who > has never accessed the application will never have seen the HSTS header, and > will therefore still be vulnerable to SSL stripping attacks. To mitigate this > risk, you can optionally add the 'preload' flag to the HSTS header, and > submit the domain for review by browser vendors. -- This message was sent by Atlassian Jira (v8.3.4#803005)