Return-Path: X-Original-To: apmail-hadoop-common-issues-archive@minotaur.apache.org Delivered-To: apmail-hadoop-common-issues-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id B09FE96B3 for ; Tue, 27 Sep 2011 09:58:35 +0000 (UTC) Received: (qmail 28351 invoked by uid 500); 27 Sep 2011 09:58:35 -0000 Delivered-To: apmail-hadoop-common-issues-archive@hadoop.apache.org Received: (qmail 28318 invoked by uid 500); 27 Sep 2011 09:58:35 -0000 Mailing-List: contact common-issues-help@hadoop.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: common-issues@hadoop.apache.org Delivered-To: mailing list common-issues@hadoop.apache.org Received: (qmail 28308 invoked by uid 99); 27 Sep 2011 09:58:35 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 27 Sep 2011 09:58:35 +0000 X-ASF-Spam-Status: No, hits=-2000.5 required=5.0 tests=ALL_TRUSTED,RP_MATCHES_RCVD X-Spam-Check-By: apache.org Received: from [140.211.11.116] (HELO hel.zones.apache.org) (140.211.11.116) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 27 Sep 2011 09:58:33 +0000 Received: from hel.zones.apache.org (hel.zones.apache.org [140.211.11.116]) by hel.zones.apache.org (Postfix) with ESMTP id B63B2411B3 for ; Tue, 27 Sep 2011 09:58:11 +0000 (UTC) Date: Tue, 27 Sep 2011 09:58:11 +0000 (UTC) From: "Steve Loughran (Commented) (JIRA)" To: common-issues@hadoop.apache.org Message-ID: <1201962064.2409.1317117491748.JavaMail.tomcat@hel.zones.apache.org> Subject: [jira] [Commented] (HADOOP-5731) IPC call can raise security exceptions when the remote node is running under a security manager MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/HADOOP-5731?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13115373#comment-13115373 ] Steve Loughran commented on HADOOP-5731: ---------------------------------------- Reviewing this, the risk is if a client running under a security manager tries to talk over IPC then it will fail. There's an obvious test for this to see if it's a real issue. I'm not sure it would surface in a webapp, which is the place that it would matter the most. they tend to play classloader games more than anything else > IPC call can raise security exceptions when the remote node is running under a security manager > ----------------------------------------------------------------------------------------------- > > Key: HADOOP-5731 > URL: https://issues.apache.org/jira/browse/HADOOP-5731 > Project: Hadoop Common > Issue Type: Bug > Components: ipc > Affects Versions: 0.21.0 > Reporter: Steve Loughran > Assignee: Steve Loughran > Priority: Minor > > I'm getting a security exception (java.lang.reflect.ReflectPermission suppressAccessChecks) in RPC.Server.call(), when calling a datanode brought up under a security manager, in method.setAccessible(true) -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa For more information on JIRA, see: http://www.atlassian.com/software/jira