hive-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Thejas M Nair (JIRA)" <j...@apache.org>
Subject [jira] [Created] (HIVE-4887) hive should have an option to disable non sql commands that impose security risk
Date Fri, 19 Jul 2013 01:17:46 GMT
Thejas M Nair created HIVE-4887:
-----------------------------------

             Summary: hive should have an option to disable non sql commands that impose security
risk
                 Key: HIVE-4887
                 URL: https://issues.apache.org/jira/browse/HIVE-4887
             Project: Hive
          Issue Type: Task
          Components: Authorization, Security
            Reporter: Thejas M Nair


Hive's RDBMS style of authorization (using grant/revoke), relies on all data access being
done through hive select queries. But hive also supports running dfs commands, shell commands
(eg "!cat file"), and shell commands through hive streaming.

This creates problems in securing a hive server using this authorization model. UDF is another
way to write custom code that can compromise security, but you can control that by restricting
access to users to be only through jdbc connection to hive server (2).

(note that there are other major problems such as this one - HIVE-3271)

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Mime
View raw message