<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Kerberos HDFS security issue in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133459#M96126</link>
    <description>&lt;P&gt;can anyone answer this please ?&lt;/P&gt;</description>
    <pubDate>Fri, 02 Dec 2016 10:50:57 GMT</pubDate>
    <dc:creator>aliyesami</dc:creator>
    <dc:date>2016-12-02T10:50:57Z</dc:date>
    <item>
      <title>Kerberos HDFS security issue</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133454#M96121</link>
      <description>&lt;P&gt;I have ranger plugin enabled for HDFS and the policy is in place and I am not in the list of users that have access to the policy (see picture) but I can still access all the HDFS directories ? &lt;/P&gt;&lt;PRE&gt;-bash-4.1$ klist
Ticket cache: FILE:/tmp/krb5cc_600
Default principal: &lt;A href="mailto:sami@MY.COM"&gt;sami@MY.COM&lt;/A&gt;
Valid starting     Expires            Service principal
11/30/16 23:22:44  12/01/16 23:22:44  &lt;A href="mailto:krbtgt/MY.COM@MY.COM"&gt;krbtgt/MY.COM@MY.COM&lt;/A&gt;
        renew until 11/30/16 23:22:44
-bash-4.1$
-bash-4.1$
-bash-4.1$ hdfs dfs -ls /user/flume/
Found 4 items
drwx------   - flume hdfs          0 2016-11-28 19:00 /user/flume/.Trash
drwxr-xr-x   - flume hdfs          0 2016-10-12 16:50 /user/flume/.hiveJars
drwxrwxr-x   - flume hdfs          0 2016-11-23 10:03 /user/flume/tweets
drwxr-xr-x   - flume hdfs          0 2016-11-03 10:54 /user/flume/tweets2
-bash-4.1$
&amp;lt;a href="/storage/attachments/10019-capture.jpg"&amp;gt;capture.jpg&amp;lt;/a&amp;gt;
&lt;/PRE&gt;&lt;P&gt;if I destroy the ticket then I don't get access . &lt;/P&gt;&lt;PRE&gt;-bash-4.1$ kdestroy
-bash-4.1$
-bash-4.1$
-bash-4.1$ klist
klist: No credentials cache found (ticket cache FILE:/tmp/krb5cc_600)
-bash-4.1$
-bash-4.1$ hdfs dfs -ls /user/flume/
16/12/01 13:19:08 WARN ipc.Client: Exception encountered while connecting to the server :
javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)]
&lt;/PRE&gt;</description>
      <pubDate>Fri, 02 Dec 2016 02:18:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133454#M96121</guid>
      <dc:creator>aliyesami</dc:creator>
      <dc:date>2016-12-02T02:18:23Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos HDFS security issue</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133455#M96122</link>
      <description>&lt;P&gt;Can you snapshot the page where you have the policies ? If the profile is public, I believe it overrides any other permissions. How about you introducing your user and denying any privileges from him over HDFS. &lt;/P&gt;</description>
      <pubDate>Fri, 02 Dec 2016 02:33:29 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133455#M96122</guid>
      <dc:creator>srai1</dc:creator>
      <dc:date>2016-12-02T02:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos HDFS security issue</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133456#M96123</link>
      <description>&lt;P&gt;Access will be granted with native HDFS permissions if there is no ranger policy. You can check ranger audit to confirm.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Dec 2016 02:35:19 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133456#M96123</guid>
      <dc:creator>vperiasamy</dc:creator>
      <dc:date>2016-12-02T02:35:19Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos HDFS security issue</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133457#M96124</link>
      <description>&lt;P&gt;but there is ranger policy in place please see the picture below &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="10025-c5oq0.png" style="width: 1491px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/22182i7AF12CF6F3DF6CF5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="10025-c5oq0.png" alt="10025-c5oq0.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2019 09:10:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133457#M96124</guid>
      <dc:creator>aliyesami</dc:creator>
      <dc:date>2019-08-19T09:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos HDFS security issue</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133458#M96125</link>
      <description>&lt;P&gt;on profile it doesn't say its a public profile ? please see the picture below  of the policy &lt;/P&gt;</description>
      <pubDate>Fri, 02 Dec 2016 02:51:36 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133458#M96125</guid>
      <dc:creator>aliyesami</dc:creator>
      <dc:date>2016-12-02T02:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos HDFS security issue</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133459#M96126</link>
      <description>&lt;P&gt;can anyone answer this please ?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Dec 2016 10:50:57 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133459#M96126</guid>
      <dc:creator>aliyesami</dc:creator>
      <dc:date>2016-12-02T10:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos HDFS security issue</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133460#M96127</link>
      <description>&lt;P&gt;see ranger audit logs to figure out whether ranger-acl or hadoop-acl is granting access to the user.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Dec 2016 02:42:54 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133460#M96127</guid>
      <dc:creator>vperiasamy</dc:creator>
      <dc:date>2016-12-03T02:42:54Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos HDFS security issue</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133461#M96128</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/10115/sahmad43.html" nodeid="10115"&gt;@Sami Ahmad&lt;/A&gt;: You have an HDFS policy which does not grant permissions to your user for viewing resources. In most of the components, this would boil down to access request being denied. However, in HDFS, if a Ranger policy does not grant access to a resource, native Hadoop privileges are checked as well. If HDFS grants user 'SAMI' access to resources, 'SAMI' will be able to access the same (inspite of Ranger policy not granting permission).&lt;/P&gt;&lt;P&gt;You can check whether its Ranger policy responsible for your user being able to view resources or its native Hadoop ACLs through Audit page-&amp;gt;Access tab.&lt;/P&gt;&lt;P&gt;In screenshot, Policy ID is --  and also, Access Enforcer=hadoop-acl which means the user had access through native Hadoop ACL. None of the Ranger Hadoop policies are responsible for the Access/ Deny. Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cloudera.com/legacyfs/online/attachments/12228-screen-shot-2017-02-08-at-104435-am.png"&gt;screen-shot-2017-02-08-at-104435-am.png&lt;/A&gt;
&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2017 02:50:56 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-HDFS-security-issue/m-p/133461#M96128</guid>
      <dc:creator>aleekha</dc:creator>
      <dc:date>2017-02-09T02:50:56Z</dc:date>
    </item>
  </channel>
</rss>

