You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@hive.apache.org by "Thejas M Nair (JIRA)" <ji...@apache.org> on 2017/09/07 17:55:00 UTC

[jira] [Updated] (HIVE-17152) Improve security of random generator for HS2 cookies

     [ https://issues.apache.org/jira/browse/HIVE-17152?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Thejas M Nair updated HIVE-17152:
---------------------------------
       Resolution: Fixed
    Fix Version/s: 3.0.0
           Status: Resolved  (was: Patch Available)

Patch committed to master.
Thanks for the patch [~taoli-hwx]

> Improve security of random generator for HS2 cookies
> ----------------------------------------------------
>
>                 Key: HIVE-17152
>                 URL: https://issues.apache.org/jira/browse/HIVE-17152
>             Project: Hive
>          Issue Type: Bug
>          Components: HiveServer2
>            Reporter: Tao Li
>            Assignee: Tao Li
>             Fix For: 3.0.0
>
>         Attachments: HIVE-17152.1.patch
>
>
> The random number generated is used as a secret to append to a sequence and SHA to implement a CookieSigner. If this is attackable, then it's possible for an attacker to sign a cookie as if we had. We should fix this and use SecureRandom as a stronger random function .
> HTTPAuthUtils has a similar issue. If that is attackable, an attacker might be able to create a similar cookie. Paired with the above issue with the CookieSigner, it could reasonably spoof a HS2 cookie.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)