Return-Path: X-Original-To: apmail-hadoop-general-archive@minotaur.apache.org Delivered-To: apmail-hadoop-general-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 88806D2F4 for ; Sun, 14 Oct 2012 07:16:38 +0000 (UTC) Received: (qmail 47139 invoked by uid 500); 14 Oct 2012 07:16:36 -0000 Delivered-To: apmail-hadoop-general-archive@hadoop.apache.org Received: (qmail 46464 invoked by uid 500); 14 Oct 2012 07:16:31 -0000 Mailing-List: contact general-help@hadoop.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: general@hadoop.apache.org Delivered-To: mailing list general@hadoop.apache.org Received: (qmail 46419 invoked by uid 99); 14 Oct 2012 07:16:29 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 14 Oct 2012 07:16:29 +0000 X-ASF-Spam-Status: No, hits=-0.7 required=5.0 tests=RCVD_IN_DNSWL_LOW,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: domain of shv.hadoop@gmail.com designates 209.85.210.48 as permitted sender) Received: from [209.85.210.48] (HELO mail-da0-f48.google.com) (209.85.210.48) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 14 Oct 2012 07:16:23 +0000 Received: by mail-da0-f48.google.com with SMTP id z8so2630310dad.35 for ; Sun, 14 Oct 2012 00:16:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=hLL4z0RluZiaa4IAqwRuT5FD5ScjmMkElsjByvV+lv0=; b=VT2kVvDSn78n4HjvvVa6S+8WcgsxGLydroj04+OjweXxhRNDDs8gHqUx1rlcNHc7S2 EVBU0uaLwZg9LlvljlUTFRE57BNDLRfjbo4CZuZDcqAIVR7dYPJD6YWjtNXYY1hbT6T4 fSBOu/u5ZKrye92GdsE0Lnrm1lSY7suYbl86MTm+VpphRvejT2SSGeSyLWOlqJXrZxuF QLHezijyb409loONpwF0RnIn/Mndo6RU3tB7egem47M4iHu2Wete8Iq2x7u32h1oTBnx AJN/n+KguG/RX5fmezFo6dWAJxH9YiKfIBYL2JmmJhym/aOkEZhYVVfNMhdD6Uhj8QM3 02Pg== MIME-Version: 1.0 Received: by 10.68.203.164 with SMTP id kr4mr27349574pbc.46.1350198962853; Sun, 14 Oct 2012 00:16:02 -0700 (PDT) Received: by 10.68.199.231 with HTTP; Sun, 14 Oct 2012 00:16:02 -0700 (PDT) In-Reply-To: References: Date: Sun, 14 Oct 2012 00:16:02 -0700 Message-ID: Subject: Re: [ANNOUNCE] Hadoop-1.0.4 release, with Security fix From: Konstantin Shvachko To: general@hadoop.apache.org, mattf@apache.org Content-Type: text/plain; charset=ISO-8859-1 X-Virus-Checked: Checked by ClamAV on apache.org Hi Matt, Could you please explain what is the difference between Hadoop 1.0.4 just accepted and Hadoop 1.1.0 being voted at the same time? Also why is it important to keep and release both of these branches? I am lost here. I assume other people might have that question in mind as well. Thanks, --Konstantin On Fri, Oct 12, 2012 at 2:01 PM, Matt Foley wrote: > Hello, > The release of Hadoop-1.0.4 has been voted, accepted, and posted. > It is available in SVN and Maven, as well as at > http://www.us.apache.org/dist/hadoop/common/hadoop-1.0.4/ > > It is still propagating to mirrors, and should be available on all mirrors > by this time Saturday. > The documentation update is still being worked on and will be available by > Monday. > > This release is noteworthy for including a Security bug fix, related to > CVE-2012-4449, > discovered by Daryn Sharp and fixed by Owen O'Malley. The CVE announcement > is below. > > Best regards, > --Matt Foley > Release Manager > > *CVE-2012-4449: Apache Hadoop security token vulnerabilities > * > Severity: Critical > > Vendor: The Apache Software Foundation > > Versions Affected: > 0.20.X: All versions > 0.23: All versions before 0.23.4 > 1.0: All versions before 1.0.4 > 2.0: All versions before 2.0.2 > > Users affected: > Users who have enabled Hadoop's Kerberos security features. > > Impact: > Malicious users may crack the secret keys used to sign security > tokens, thus granting them the ability to fabricate tokens for > privilege escalation. Malicious users may also launch unauthorized > tasks as an arbitrary user for privilege escalation. > > Description: > When Hadoop's security features are enabled, clients initially present > Kerberos credentials to authenticate to a service such as the > NameNode. A client may then request a security token for subsequent > authentication within the Hadoop cluster. The client receives a > security token and a corresponding signature for the token, generated > using the HMAC algorithm and a SHA1 hash. > > Token passwords are generated using a trivial secret key length (20 > bits). A key of this size can be brute forced in at most a few > seconds. Once the secret is cracked, one can generate arbitrary > tokens to impersonate other users. These fraudulent tokens may be > used to gain unauthorized access to data or disrupt services within > the cluster. With default secret key rolling values, a cracked secret > may often be exploited for a couple days before another secret has to > be cracked. > > Some token-based services, such as the NameNode's delegation tokens > for the namespace, are immune from a compromised secret key because > they record the generated tokens. A fraudulent token with a valid > password will rejected since the service will know it did not generate > the token. Services that generate a token on behalf of another > service and rely on a shared secret for the other service to validate > the token's password are especially vulnerable. > > HDFS (all versions): > Malicious clients cannot gain unauthorized access to the namespace. > Malicious clients may however gain full access (read, write, and > delete) to any block based on knowledge of the block id. > > MapReduce (1.x): > Malicious clients may intercept task data, task logs, alter task > status, and disrupt tasks from executing or completing. A malicious > client may also inject data into a Pipes-based job. > > Yarn (2.x only): > Malicious clients may perform the same attacks as MapReduce. An > unauthorized yarn task may be launched unbeknownst to the > ResourceManager. Additionally, the security tokens for launching > tasks do not contain the job submitter. The user for task execution > is specified in an untrusted container launch context, thus allowing a > task to be launched as an arbitrary user. When combined, an > unauthorized task may be launched as an arbitrary user. > > Other Hadoop projects: > Hadoop projects using the token management framework may be > susceptible if their services do not store the tokens issued, or if a > service generates tokens for other services. This includes Apache > HBase version 0.92.0 or higher when the Kerberos-based security > features are enabled. > > Mitigation: > Users should immediately upgrade to the latest applicable release > (0.23.4, 1.0.4 or later, or 2.0.2), or should immediately apply the > patch provided below to their systems. > > Credit: This issue was discovered by Daryn Sharp of Yahoo! Inc.