Return-Path: X-Original-To: apmail-cassandra-user-archive@www.apache.org Delivered-To: apmail-cassandra-user-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id CDD877D85 for ; Wed, 9 Nov 2011 14:32:23 +0000 (UTC) Received: (qmail 73109 invoked by uid 500); 9 Nov 2011 14:32:21 -0000 Delivered-To: apmail-cassandra-user-archive@cassandra.apache.org Received: (qmail 73080 invoked by uid 500); 9 Nov 2011 14:32:21 -0000 Mailing-List: contact user-help@cassandra.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: user@cassandra.apache.org Delivered-To: mailing list user@cassandra.apache.org Received: (qmail 73072 invoked by uid 99); 9 Nov 2011 14:32:21 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 09 Nov 2011 14:32:21 +0000 X-ASF-Spam-Status: No, hits=1.6 required=5.0 tests=FREEMAIL_ENVFROM_END_DIGIT,FREEMAIL_FROM,HTML_MESSAGE,RCVD_IN_DNSWL_LOW,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: domain of boneill42@gmail.com designates 209.85.161.44 as permitted sender) Received: from [209.85.161.44] (HELO mail-fx0-f44.google.com) (209.85.161.44) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 09 Nov 2011 14:32:16 +0000 Received: by faas12 with SMTP id s12so2087199faa.31 for ; Wed, 09 Nov 2011 06:31:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:content-type; bh=2PD8Xu/aJh2ITmv1BunuuRO3j74IP5svGbrK7hevaZo=; b=lGUsvoGDBtsNza5ExNhjGWozOw6I1rLqgrYyFAJSoFWzVuJb6vF7a3cKwsrqpHLd1U b6kgs8Vblw2JxrjdiZFgMsojORIn+3Zi1NYn+e1MGaV7s2njacAAb/khrECO9z3f7jw7 OBxMLU/syviNPA97UVeOKjh8t2qd4ldiWloWE= MIME-Version: 1.0 Received: by 10.223.91.143 with SMTP id n15mr5228591fam.23.1320849115269; Wed, 09 Nov 2011 06:31:55 -0800 (PST) Sender: boneill42@gmail.com Received: by 10.223.119.198 with HTTP; Wed, 9 Nov 2011 06:31:55 -0800 (PST) In-Reply-To: <4EB9BBA8.9020902@gmail.com> References: <4EB9BBA8.9020902@gmail.com> Date: Wed, 9 Nov 2011 09:31:55 -0500 X-Google-Sender-Auth: RtACfsUWbTxhrHimXUQsInGm7ro Message-ID: Subject: Re: security From: "Brian O'Neill" To: user@cassandra.apache.org Content-Type: multipart/alternative; boundary=001517447eee5149dc04b14e269a --001517447eee5149dc04b14e269a Content-Type: text/plain; charset=ISO-8859-1 Not sure this is the "standard approach", probably more "what we came up with". ;) We plan to deploy Cassandra behind a firewall denying all traffic on all ports other than 8080. Access from applications will be limited to the REST/HTTP layer, which we'll lock down with standard HTTP authentication mechanisms. (using built-in apache or the servlet container) Long term, we'll probably also introduce authorization/access control by URL as well, whereby only certain users/apps will have access to certain keyspaces and/or column families. (again... most likely using built-in apache mechanisms, or the servlet container) -brian On Tue, Nov 8, 2011 at 6:30 PM, Guy Incognito wrote: > hi, > > is there a standard approach to securing cassandra eg within a corporate > network? at the moment in our dev environment, anybody with network > connectivity to the cluster can connect to it and mess with it. this would > not be acceptable in prod. do people generally write custom authenticators > etc, or just put the cluster behind a firewall with the appropriate rules > to limit access? > -- Brian ONeill Lead Architect, Health Market Science (http://healthmarketscience.com) mobile:215.588.6024 blog: http://weblogs.java.net/blog/boneill42/ blog: http://brianoneill.blogspot.com/ --001517447eee5149dc04b14e269a Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Not sure this is the "standard approach", probably more "wha= t we came up with". ;)

We plan to deploy Cassandra behind a fir= ewall denying all traffic on all ports other than 8080.=A0 Access from appl= ications will be limited to the REST/HTTP layer, which we'll lock down = with standard HTTP authentication mechanisms. (using built-in apache or the= servlet container)

Long term, we'll probably also introduce authorization/access contr= ol by URL as well, whereby only certain users/apps will have access to cert= ain keyspaces and/or column families. (again... most likely using built-in = apache mechanisms, or the servlet container)

-brian


On Tue, Nov 8, 2011 at 6:3= 0 PM, Guy Incognito <dnd1066@gmail.com> wrote:
hi,

is there a standard approach to securing cassandra eg within a corporate ne= twork? =A0at the moment in our dev environment, anybody with network connec= tivity to the cluster can connect to it and mess with it. =A0this would not= be acceptable in prod. =A0do people generally write custom authenticators = etc, or just put the cluster behind a firewall with the appropriate rules t= o limit access?



--
Brian ONeill
Lead Ar= chitect, Health Market Science (http://healthmarketscience.com)
mobile:215.588.602= 4
blog: http://weblogs.java.net/blog/boneill42/
blog: http://brianoneill.blogspot.com/<= /a>

--001517447eee5149dc04b14e269a--