ztzg opened a new pull request #1519:
URL: https://github.com/apache/zookeeper/pull/1519


   This is a minimally disruptive mitigation for the issue reported in 
ZOOKEEPER-3979, "Clients can corrupt the audit log."
   
   A new property allows disabling the "legacy" `digest` authentication 
mechanism, which could be used by "an attacker" to inject unsanitized data into 
audit logs.
   
   In general, ZooKeeper administrators should disable unused authentication 
providers, and ensure that the ones which remain enabled to not produce user 
IDs susceptible to confuse audit log parsers.
   
   The rest of the patch is made of assorted small cleanups which should not 
have any impact on operation or security.
   
   (Note that the patch *series* attached to 
https://github.com/apache/zookeeper/pull/1519 contains additional measures, 
such as filtering audit user IDs by authentication scheme, but those seem to be 
overkill for typical deployment scenarios.  That code could still be fished out 
and polished if the circumstances evolved.)


----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to