Hi all,

There was recently a private report to the Flink PMC, as well as publicly
[1] about Flink's ability to execute arbitrary code. In scenarios where
Flink is accessible by somebody unauthorized, this can lead to issues.
The PMC received a similar report in November 2018.

I believe it would be good to warn our users a bit more prominently about
the risks of accidentally opening up Flink to the public internet, or other
unauthorized entities.

I have collected the following potential solutions discussed so far:

a) Add a check-security.sh script, or a check into the frontend if the
JobManager can be reached on the public internet
b) Add a prominent warning to the download page
c) add an opt-out warning to the Flink logs / UI that can be disabled via
the config.
d) Bind the REST endpoint to localhost only, by default


I'm curious to hear if others have other ideas what to do.
I personally like to kick things off with b).


Best,
Robert


[1] https://twitter.com/pyn3rd/status/1197397475897692160

Reply via email to