Uploaded image for project: 'Hadoop YARN'
  1. Hadoop YARN
  2. YARN-2198 Remove the need to run NodeManager as privileged account for Windows Secure Container Executor
  3. YARN-2552

Windows Secure Container Executor: the privileged file operations of hadoopwinutilsvc should be constrained to localdirs only

    XMLWordPrintableJSON

Details

    • Sub-task
    • Status: Resolved
    • Major
    • Resolution: Implemented
    • None
    • None
    • nodemanager

    Description

      YARN-2458 added file manipulation operations executed in an elevated context by hadoopwinutilsvc. W/o any constraint, the NM (or a hijacker that takes over the NM) can manipulate arbitrary OS files under highest possible privileges, an easy elevation attack vector. The service should only allow operations on files/directories that are under the configured NM localdirs. It should read this value from wsce-site.xml, as the yarn-site.xml cannot be trusted, being writable by Hadoop admins (YARN-2551 ensures wsce-site.xml is only writable by system Administrators, not Hadoop admins).

      Attachments

        1. YARN-2552.1.patch
          12 kB
          Remus Rusanu

        Activity

          People

            rusanu Remus Rusanu
            rusanu Remus Rusanu
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: