[ 
https://issues.apache.org/jira/browse/RANGER-5141?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17926664#comment-17926664
 ] 

Abhishek Jain commented on RANGER-5141:
---------------------------------------

*For example:*
Column '{_}Address{_}' in Table '{_}Employee{_}' is of type String and has 
*alphanumeric* values like '{_}Bangalore 560034{_}', 'Chennai 600005' etc.
With redact masking option, these values will be encoded like '{_}xxxxxxxxx 
nnnnnn{_}', '{_}xxxxxxx nnnnnn{_}' respectively.
Hence, the user can interpret that this column has values containing both 
alphabets and numbers.

> [Column Masking] : Security Loop hole for Columns having alphanumeric values 
> using "Redact" Masking option
> ----------------------------------------------------------------------------------------------------------
>
>                 Key: RANGER-5141
>                 URL: https://issues.apache.org/jira/browse/RANGER-5141
>             Project: Ranger
>          Issue Type: Bug
>          Components: Ranger
>    Affects Versions: 2.4.0
>            Reporter: Abhishek Jain
>            Priority: Major
>              Labels: improvement, masking, security-issue
>
> Ranger partially exposes the columns having alphanumeric sensitive 
> values(String DataType) if the column is masked using ranger's column masking 
> policy with "redact" option.
> _+*Steps to Reproduce:*+_
> 1) Create Hive table and insert data in it.
> 2) Create Ranger Column Masking Policy on a string type column (with 
> alphanumeric values) for <testuser> with redact option.
> 3) Fetch this column using <testuser> user in hive/beeline.
> _*With such behaviour, it becomes easier for the un-authorised users i.e 
> <testuser> to guess these sensitive values of this particular column masked 
> with "redact" option.*_



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to