You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@oozie.apache.org by "Alejandro Abdelnur (JIRA)" <ji...@apache.org> on 2014/01/02 18:55:50 UTC

[jira] [Commented] (OOZIE-1651) Oozie should mask the signature secret in the configuration output

    [ https://issues.apache.org/jira/browse/OOZIE-1651?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13860402#comment-13860402 ] 

Alejandro Abdelnur commented on OOZIE-1651:
-------------------------------------------

making the masking postfix configurable seems overkill, I would have them hardcoded.

> Oozie should mask the signature secret in the configuration output
> ------------------------------------------------------------------
>
>                 Key: OOZIE-1651
>                 URL: https://issues.apache.org/jira/browse/OOZIE-1651
>             Project: Oozie
>          Issue Type: Bug
>          Components: security
>    Affects Versions: 3.3.2, 4.0.0
>            Reporter: Robert Kanter
>            Assignee: Robert Kanter
>            Priority: Critical
>         Attachments: OOZIE-1651.patch, OOZIE-1651.patch, OOZIE-1651.patch
>
>
> The value of {{oozie.authentication.signature.secret}} is the secret that's used to sign the cookies/tokens crated by Oozie for authentication after Kerberos.  If a malicious user were to find out this secret, they could forge counterfeit cookies/tokens as any user with any expiration date.  
> Oozie exposed the configuration properties via its REST API.  It currently only masks any properties that end with ".password" (i.e. {{oozie.service.JPAService.jdbc.password}}).  We should expand this to also mask the signature secret.  
> In fact, it would be useful to generalize this ability to add a property that masks something the user can configure.



--
This message was sent by Atlassian JIRA
(v6.1.5#6160)