[ https://issues.apache.org/jira/browse/RANGER-5141?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17926664#comment-17926664 ]
Abhishek Jain commented on RANGER-5141: --------------------------------------- *For example:* Column '{_}Address{_}' in Table '{_}Employee{_}' is of type String and has *alphanumeric* values like '{_}Bangalore 560034{_}', 'Chennai 600005' etc. With redact masking option, these values will be encoded like '{_}xxxxxxxxx nnnnnn{_}', '{_}xxxxxxx nnnnnn{_}' respectively. Hence, the user can interpret that this column has values containing both alphabets and numbers. > [Column Masking] : Security Loop hole for Columns having alphanumeric values > using "Redact" Masking option > ---------------------------------------------------------------------------------------------------------- > > Key: RANGER-5141 > URL: https://issues.apache.org/jira/browse/RANGER-5141 > Project: Ranger > Issue Type: Bug > Components: Ranger > Affects Versions: 2.4.0 > Reporter: Abhishek Jain > Priority: Major > Labels: improvement, masking, security-issue > > Ranger partially exposes the columns having alphanumeric sensitive > values(String DataType) if the column is masked using ranger's column masking > policy with "redact" option. > _+*Steps to Reproduce:*+_ > 1) Create Hive table and insert data in it. > 2) Create Ranger Column Masking Policy on a string type column (with > alphanumeric values) for <testuser> with redact option. > 3) Fetch this column using <testuser> user in hive/beeline. > _*With such behaviour, it becomes easier for the un-authorised users i.e > <testuser> to guess these sensitive values of this particular column masked > with "redact" option.*_ -- This message was sent by Atlassian Jira (v8.20.10#820010)