[
https://issues.apache.org/jira/browse/AMBARI-16810?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Andrew Onischuk updated AMBARI-16810:
-------------------------------------
Resolution: Fixed
Status: Resolved (was: Patch Available)
Committed to trunk and branch-2.4
> Ambari Agent security bypassed in Python=>2.7.9
> -----------------------------------------------
>
> Key: AMBARI-16810
> URL: https://issues.apache.org/jira/browse/AMBARI-16810
> Project: Ambari
> Issue Type: Bug
> Reporter: Andrew Onischuk
> Assignee: Andrew Onischuk
> Fix For: 2.4.0
>
> Attachments: AMBARI-16810.patch
>
>
> We hard-coded the Ambari Agents to ignore certification
> verification. But the reason why this was required was Python be un-secure by
> default:
> <https://access.redhat.com/articles/2039753>
> <https://www.python.org/dev/peps/pep-0476/>
> That method will cause signed certificates to not serve any purpose & is
> discouraged by RedHat & Python security experts:
> > "It is also possible, though highly discouraged , to globally disable
> verification by monkeypatching the ssl module in versions of Python"
> Instead we should abstract it to a setting (e.g. ssl_verify_cert) in the
> ambari-agent.ini such that users can turn certification verification if they
> provide a signed/trusted certificate.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)