[ 
https://issues.apache.org/jira/browse/HBASE-15187?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15163439#comment-15163439
 ] 

Ted Yu commented on HBASE-15187:
--------------------------------

I went through some posts on using ESAPI to counter CSRF attack:

http://www.jtmelton.com/2010/05/16/the-owasp-top-ten-and-esapi-part-6-cross-site-request-forgery-csrf/

http://stackoverflow.com/questions/22555110/csrf-cross-site-request-forgery-protection-in-spring-mvc

The CSRF prevention it offers requires an exchange of a unique token value. 
While the hadoop filter only requires the presence of a header in the request. 
The need for a unique token value means that the server side needs to generate 
nonces and remember them so that they'll be considered valid on subsequent 
requests.  In my opinion this would be a much more intrusive change than what 
the hadoop filter does.

> Integrate CSRF prevention filter to REST gateway
> ------------------------------------------------
>
>                 Key: HBASE-15187
>                 URL: https://issues.apache.org/jira/browse/HBASE-15187
>             Project: HBase
>          Issue Type: Bug
>            Reporter: Ted Yu
>            Assignee: Ted Yu
>         Attachments: HBASE-15187.v1.patch, HBASE-15187.v2.patch, 
> HBASE-15187.v3.patch, HBASE-15187.v4.patch, HBASE-15187.v5.patch, 
> HBASE-15187.v6.patch, HBASE-15187.v7.patch, HBASE-15187.v8.patch
>
>
> HADOOP-12691 introduced a filter in Hadoop Common to help REST APIs guard 
> against cross-site request forgery attacks.
> This issue tracks the integration of that filter into HBase REST gateway.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to