ambari-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Andrew Onischuk (JIRA)" <j...@apache.org>
Subject [jira] [Updated] (AMBARI-16810) Ambari Agent security bypassed in Python=>2.7.9
Date Mon, 23 May 2016 14:40:12 GMT

     [ https://issues.apache.org/jira/browse/AMBARI-16810?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Andrew Onischuk updated AMBARI-16810:
-------------------------------------
    Resolution: Fixed
        Status: Resolved  (was: Patch Available)

Committed to trunk and branch-2.4

> Ambari Agent security bypassed in Python=>2.7.9
> -----------------------------------------------
>
>                 Key: AMBARI-16810
>                 URL: https://issues.apache.org/jira/browse/AMBARI-16810
>             Project: Ambari
>          Issue Type: Bug
>            Reporter: Andrew Onischuk
>            Assignee: Andrew Onischuk
>             Fix For: 2.4.0
>
>         Attachments: AMBARI-16810.patch
>
>
> We hard-coded the Ambari Agents to ignore certification
> verification. But the reason why this was required was Python be un-secure by
> default:  
> <https://access.redhat.com/articles/2039753>  
> <https://www.python.org/dev/peps/pep-0476/>
> That method will cause signed certificates to not serve any purpose & is
> discouraged by RedHat & Python security experts:
> > "It is also possible, though highly discouraged , to globally disable
> verification by monkeypatching the ssl module in versions of Python"
> Instead we should abstract it to a setting (e.g. ssl_verify_cert) in the
> ambari-agent.ini such that users can turn certification verification if they
> provide a signed/trusted certificate.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Mime
View raw message