[ 
https://issues.apache.org/jira/browse/HADOOP-2230?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12543716
 ] 

Allen Wittenauer commented on HADOOP-2230:
------------------------------------------

There are a lot of hidden issues here.  Let's see if I can cover them all in 
one post. :)

- On role based/capable operating systems (Solaris comes to mind) it is 
possible to strictly curtail root's capability.  It is not a safe assumption to 
assume that root==all powerful.

- In many cases, esp. for large data centers, the sysadmins are not the same 
people who administer the applications.  So trusting a group like wheel or root 
to hold who should have the power in Hadoop would cause these types of places a 
lot of pain.

- Trusting the uid that hadoop to be running under as privileged may not be 
possible if the hadoop process is running under a dedicated, noaccess type of 
account.  [In many places, they incorrectly use nobody or daemon for this type 
of thing, but the name of the account is irrelevant. ]

That said, I think I'd really prefer to either be able to specify exactly what 
users or what groups should contain the users that should be privileged.  

While I realize there is no 'su' capability either, the more I think about 
this, the more I'm thinking that there probably should be some sort of 'double 
check' when it comes time for privilege escalation.  After all, if I'm an admin 
user I don't want to accidently rm -rf / without having some sort of safety net 
(other than Trash, of cousre).  chown/chgrp are much more dangerous without 
this safety net, I think.  For example, under roles on Solaris, a user can use 
their 'superpowers' by issuing 'pfexec command' (vs. just using 'command').

Hmm...

> Post users:  need admin-only access to HDFS
> -------------------------------------------
>
>                 Key: HADOOP-2230
>                 URL: https://issues.apache.org/jira/browse/HADOOP-2230
>             Project: Hadoop
>          Issue Type: New Feature
>         Environment: All
>            Reporter: Allen Wittenauer
>
> When user support gets added to HDFS, administrators are going to need to be 
> able to set the namenode such that it only allows connections/interactions 
> from the administrative user.  This is particularly important after upgrades 
> and for other administrative work that may require the changing of user/group 
> ownership, permissions, location of files within the HDFS, etc.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to