cassandra-user mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Jack Krupansky <jack.krupan...@gmail.com>
Subject Re: Session timeout
Date Fri, 29 Jan 2016 22:34:18 GMT
No offense, but my suggestion here is that you write up a preliminary list
of your own answers based on your own reading of the doc, specs, and white
papers (and source code) and post that list, like on Google Docs, for
people to review in bulk, rather than force all Cassandra users on this
list to participate in a full security review one item at a time. To
reiterate, you should be treating the doc as the definitive guide to what
is supported - given the importance that the Cassandra and DSE developers
placed on security features over the past couple of years, it really is
truly safe to say that if it isn't in the doc then it is definitively not
supported. Yes, it would be good to review your final list as a courtesy
check, but asking us to confirm what appears to be obvious (i.e., it is not
in the doc) seems more than a bit excessive to me.

If there is any true confusion in the doc, of course let us know (or email
to docs@datastax.com), but there is no need for us to confirm that you did
not find something in the doc.

-- Jack Krupansky

On Fri, Jan 29, 2016 at 5:02 PM, oleg yusim <olegyusim@gmail.com> wrote:

> Jack,
>
> Appreciate the links. As I mentioned, I looked over both DSE and Cassandra
> sets of documentation, and ran some experiments on my Cassandra
> installation. What I'm bringing here is something I couldn't find
> definitive answer for in any of the above-mentioned sources.
>
> For instance, regarding logging, here are questions I have:
>
> 1)  Identity-based logging (we investigated it in another thread and I got
> "not supported" as an answer)
> 2)  Logging source and destinations (server and client IP)
> 3)  Logging connections and disconnections - same
> 4)  Logging hostname
> 5)  Ability to automatically shut down in case if it ran out of space to
> store logs?
> 6)  Ability to automatically overwrite audit logs in case if no more space
> is available (oldest first) ?
>
> Thanks,
>
> Oleg
>
> On Fri, Jan 29, 2016 at 3:47 PM, Jack Krupansky <jack.krupansky@gmail.com>
> wrote:
>
>> There is some more detail on DSE Security in this white paper:
>>
>> http://www.datastax.com/wp-content/uploads/2014/04/WP-DataStax-Enterprise-SOX-Compliance.pdf
>>
>> It mentions auditing, for example. I think you were asking abut that
>> earlier.
>>
>> There may be some additional info or discussion related to security on
>> these main web site pages:
>> http://www.datastax.com/products/datastax-enterprise-security
>>
>> Security was given a reasonably high priority for DSE in releases 3.0 and
>> beyond, so that if something is not highlighted in those promotional
>> materials, then it probably isn't in the software.
>>
>> In general, if you see a feature in DSE, just do a keyword search in the
>> Cassandra doc to see if it is supported outside of DSE.
>>
>> -- Jack Krupansky
>>
>> On Fri, Jan 29, 2016 at 4:23 PM, oleg yusim <olegyusim@gmail.com> wrote:
>>
>>> Alex,
>>>
>>> No offense are taken, your question is absolutely legit. As we used to
>>> joke in security world "putting on my black hat"/"putting on my white hat"
>>> - i.e. same set of questions I would be asking for hacking and protecting
>>> the product. So, I commend you for being careful here.
>>>
>>> Now, at that particular case I'm acting with my "white hat on". :) I'm
>>> hired by VMware, to help them improve security posture for their new
>>> products (vRealize package). I do that as part of the security team on
>>> VMware side, and working in conjunction with DISA (
>>> http://iase.disa.mil/stigs/Pages/a-z.aspx) we are creating STIGs (I
>>> explained this term in details in this same thread above, in my response to
>>> Jon, so I wouldn't repeat myself here) for all the components vRealize
>>> suite of products has, including Cassandra, which is used in one of the
>>> products. This STIGs would be handed over to DISA, reviewed by their SMEs
>>> and published on their website, creating great opportunity for all the
>>> products covered to improve their security posture and advance on a market
>>> for free.
>>>
>>> For VMware purposes, we would harden our suite of products, based on
>>> STIGs, and create own overall Security Guideline, riding on top of STIGs.
>>>
>>> As I mentioned above, for both Cassandra and DSE, equally, this document
>>> would be very beneficial, since it would enable customers and help them to
>>> run hardening on the product and place it right on the system, surrounded
>>> by the correct set of compensation controls.
>>>
>>> Thanks,
>>>
>>> Oleg
>>>
>>> On Fri, Jan 29, 2016 at 1:10 PM, Alex Popescu <alexp@datastax.com>
>>> wrote:
>>>
>>>>
>>>> On Fri, Jan 29, 2016 at 8:17 AM, oleg yusim <olegyusim@gmail.com>
>>>> wrote:
>>>>
>>>>> Thanks for encouraging me, I kind of grew a bit desperate. I'm
>>>>> security person, not a Cassandra expert, and doing security assessment
of
>>>>> Cassandra DB, I have to rely on community heavily. I will put together
a
>>>>> composed version of all my previous queries, will title it "Security
>>>>> assessment questions" and will post it once again.
>>>>
>>>>
>>>> Oleg,
>>>>
>>>> I'll apologize in advance if my answer will sound initially harsh. I've
>>>> been following your questions (mostly because I find them interesting), but
>>>> I've never jumped to answer any of them as I confess not knowing the
>>>> purpose of your research/report makes me caution (e.g. are you doing this
>>>> for your current employer evaluating the future use of the product? are you
>>>> doing this for an analyst company? are you planning to sell this report?
>>>> etc. etc).
>>>>
>>>>
>>>> --
>>>> Bests,
>>>>
>>>> Alex Popescu | @al3xandru
>>>> Sen. Product Manager @ DataStax
>>>>
>>>>
>>>
>>
>

Mime
View raw message