You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@ambari.apache.org by "Andrew Onischuk (JIRA)" <ji...@apache.org> on 2016/06/20 13:14:05 UTC
[jira] [Resolved] (AMBARI-16810) Ambari Agent security bypassed in
Python=>2.7.9
[ https://issues.apache.org/jira/browse/AMBARI-16810?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Andrew Onischuk resolved AMBARI-16810.
--------------------------------------
Resolution: Fixed
> Ambari Agent security bypassed in Python=>2.7.9
> -----------------------------------------------
>
> Key: AMBARI-16810
> URL: https://issues.apache.org/jira/browse/AMBARI-16810
> Project: Ambari
> Issue Type: Bug
> Reporter: Andrew Onischuk
> Assignee: Andrew Onischuk
> Fix For: 2.4.0
>
> Attachments: AMBARI-16810.patch
>
>
> We hard-coded the Ambari Agents to ignore certification
> verification. But the reason why this was required was Python be un-secure by
> default:
> <https://access.redhat.com/articles/2039753>
> <https://www.python.org/dev/peps/pep-0476/>
> That method will cause signed certificates to not serve any purpose & is
> discouraged by RedHat & Python security experts:
> > "It is also possible, though highly discouraged , to globally disable
> verification by monkeypatching the ssl module in versions of Python"
> Instead we should abstract it to a setting (e.g. ssl_verify_cert) in the
> ambari-agent.ini such that users can turn certification verification if they
> provide a signed/trusted certificate.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)