You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@ambari.apache.org by "Andrew Onischuk (JIRA)" <ji...@apache.org> on 2016/06/20 13:10:05 UTC

[jira] [Reopened] (AMBARI-16810) Ambari Agent security bypassed in Python=>2.7.9

     [ https://issues.apache.org/jira/browse/AMBARI-16810?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Andrew Onischuk reopened AMBARI-16810:
--------------------------------------

> Ambari Agent security bypassed in Python=>2.7.9
> -----------------------------------------------
>
>                 Key: AMBARI-16810
>                 URL: https://issues.apache.org/jira/browse/AMBARI-16810
>             Project: Ambari
>          Issue Type: Bug
>            Reporter: Andrew Onischuk
>            Assignee: Andrew Onischuk
>             Fix For: 2.4.0
>
>         Attachments: AMBARI-16810.patch
>
>
> We hard-coded the Ambari Agents to ignore certification
> verification. But the reason why this was required was Python be un-secure by
> default:  
> <https://access.redhat.com/articles/2039753>  
> <https://www.python.org/dev/peps/pep-0476/>
> That method will cause signed certificates to not serve any purpose & is
> discouraged by RedHat & Python security experts:
> > "It is also possible, though highly discouraged , to globally disable
> verification by monkeypatching the ssl module in versions of Python"
> Instead we should abstract it to a setting (e.g. ssl_verify_cert) in the
> ambari-agent.ini such that users can turn certification verification if they
> provide a signed/trusted certificate.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)