You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@hive.apache.org by "Jason Dere (JIRA)" <ji...@apache.org> on 2019/06/19 00:44:00 UTC

[jira] [Commented] (HIVE-21892) Trusted domain authentication should look at X-Forwarded-For header as well

    [ https://issues.apache.org/jira/browse/HIVE-21892?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16867149#comment-16867149 ] 

Jason Dere commented on HIVE-21892:
-----------------------------------

I think this makes sense. Also cc [~ashutosh.bapat] for feedback

> Trusted domain authentication should look at X-Forwarded-For header as well
> ---------------------------------------------------------------------------
>
>                 Key: HIVE-21892
>                 URL: https://issues.apache.org/jira/browse/HIVE-21892
>             Project: Hive
>          Issue Type: Bug
>    Affects Versions: 4.0.0
>            Reporter: Prasanth Jayachandran
>            Assignee: Prasanth Jayachandran
>            Priority: Major
>         Attachments: HIVE-21892.1.patch
>
>
> HIVE-21783 added trusted domain authentication. However, it looks only at request.getRemoteAddr() which works in most cases where there are no intermediate forward/reverse proxies. In trusted domain scenarios, if there intermediate proxies, the proxies typically append its own ip address "X-Forwarded-For" header. The X-Forwarded-For will look like clientIp -> proxyIp1 -> proxyIp2. The left most ip address in the X-Forwarded-For represents the real client ip address. For such scenarios, add a config to optionally look at X-Forwarded-For header when available to determine the real client ip. 



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)