[ 
https://issues.apache.org/jira/browse/SOLR-14158?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17007148#comment-17007148
 ] 

Noble Paul commented on SOLR-14158:
-----------------------------------

Sorry, this was supposed to be an opt-in feature. We are not eliminating the ZK 
option. In fact, this will be an alternate

> package manager to read keys from packagestore and not ZK 
> ----------------------------------------------------------
>
>                 Key: SOLR-14158
>                 URL: https://issues.apache.org/jira/browse/SOLR-14158
>             Project: Solr
>          Issue Type: Bug
>      Security Level: Public(Default Security Level. Issues are Public) 
>          Components: packages
>            Reporter: Noble Paul
>            Assignee: Noble Paul
>            Priority: Major
>              Labels: packagemanager
>
> The security of the package system relies on securing ZK. It's much easier 
> for users to secure the file system than securing ZK.
> We provide an option to read public keys from file store.  The default 
> behavior will be to read from ZK 
> The nodes must be started with {{-Dpkg.keys=filestore}}
> This will
>  * disable the remote {{PUT /api/cluster/files}} 
>  * The CLI will directly write to the keys to 
> {{<SOLR_HOME>/filestore/_trusted_keys/}} dir
>  * The CLI directly writes the package artifacts to the local solr and ask 
> other nodes to fetch from this node. Nobody can upload executable jars over a 
> remote call
>  * Keys stored in ZK will not be used or trusted. So nobody can attack the 
> cluster by publishing a malicious key into Solr



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org

Reply via email to