You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@hive.apache.org by "Ashutosh Chauhan (JIRA)" <ji...@apache.org> on 2014/04/03 23:31:18 UTC

[jira] [Resolved] (HIVE-4887) sql standard auth should disable commands that impose security risk

     [ https://issues.apache.org/jira/browse/HIVE-4887?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Ashutosh Chauhan resolved HIVE-4887.
------------------------------------

       Resolution: Fixed
    Fix Version/s: 0.13.0
         Assignee: Ashutosh Chauhan

This got fixed via HIVE-6415 & HIVE-6827

> sql standard auth should disable commands that impose security risk
> -------------------------------------------------------------------
>
>                 Key: HIVE-4887
>                 URL: https://issues.apache.org/jira/browse/HIVE-4887
>             Project: Hive
>          Issue Type: Sub-task
>          Components: Authorization, Security
>            Reporter: Thejas M Nair
>            Assignee: Ashutosh Chauhan
>             Fix For: 0.13.0
>
>   Original Estimate: 72h
>  Remaining Estimate: 72h
>
> Hive's RDBMS style of authorization (using grant/revoke), relies on all data access being done through hive select queries. But hive also supports running dfs commands, shell commands (eg "!cat file"), and shell commands through hive streaming.
> This creates problems in securing a hive server using this authorization model. UDF is another way to write custom code that can compromise security, but you can control that by restricting access to users to be only through jdbc connection to hive server (2).
> (note that there are other major problems such as this one - HIVE-3271)



--
This message was sent by Atlassian JIRA
(v6.2#6252)