[
https://issues.apache.org/jira/browse/FLINK-21108?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17272950#comment-17272950
]
Xiaoguang Sun edited comment on FLINK-21108 at 1/27/21, 3:53 PM:
-----------------------------------------------------------------
At this time, anybody who knows the endpoint of a running Flink cluster can
access it. This makes it easier to be compromised when there is vulnerability,
CVE-2020-17518 for example. In addition, people who has access to web console
can terminate or even submit new job which essentially makes it possible to run
arbitrary code on production environment. In addition, people can introspect
configuration of running jobs which might contain sensitive information as well.
For these reasons, it is kind of important to restrict Flink console to be only
available to authenticated users. Reverse proxy is one way of doing it, but we
probably need to figure out a way to completely hide the real server behind
such authentication proxy so malicious users can't by pass proxy and access
Flink console directly. This problem is getting worse when users are running
Flink on Kubernetes, the highly dynamic nature of Kubernetes will make
hardening Flink console a tough job because the address of Kubernetes ingress
server might change as well. If restricting access to Flink console is
something we have to do, we will have to
deal with this scenario eventually.
was (Author: xexplorer):
At this time, anybody who knows the endpoint of a running Flink cluster can
access it. This makes it easier to be compromised when there is vulnerability,
CVE-2020-17518 for example. In addition, people who has access to web console
can terminate or even submit new job which essentially make it possible to run
arbitrary code on production environment. In addition, people can introspect
configuration of running jobs which might contain sensitive information as well.
For these reasons, it is kind of important to restrict Flink console to be only
available to authenticated users. Reverse proxy is one way of doing it, but we
probably need to figure out a way to completely hide the real server behind
such authentication proxy so malicious users can't by pass proxy and access
Flink console directly. This problem is getting worse when users are running
Flink on Kubernetes, the highly dynamic nature of Kubernetes will make
hardening Flink console a tough job because the address of Kubernetes ingress
server might change as well. If restricting access to Flink console is
something we have to do, we will have to
deal with this scenario eventually.
> Flink runtime rest server and history server webmonitor do not require
> authentication.
> --------------------------------------------------------------------------------------
>
> Key: FLINK-21108
> URL: https://issues.apache.org/jira/browse/FLINK-21108
> Project: Flink
> Issue Type: New Feature
> Components: Runtime / REST, Runtime / Web Frontend
> Reporter: Xiaoguang Sun
> Priority: Major
> Labels: pull-request-available
>
> Flink runtime rest server and history server webmonitor do not require
> authentication. At certain scenarios, prohibiting unauthorized access is
> desired. Http basic authentication can be used here.
--
This message was sent by Atlassian Jira
(v8.3.4#803005)