I am not opposed to removing this completely based on Chesnay's reasoning.
In general I agree that this feature probably does more harm than good.

Gyula

On Wed, Nov 16, 2022 at 9:13 AM Chesnay Schepler <ches...@apache.org> wrote:

> I'm inclined to go with d), removing it entirely.
>
> I must admit that I liked the idea behind the change; exposing more
> information about what might impact Flink's behavior is a good thing,
> although I'm irked that the statement in the FLIP about env variables
> already being exposed in the logs just isn't correct.
>
> I was quite disappointed when I saw that b) wasn't already implemented.
> It is concerning that this actually made it's way through the review
> rounds as-is.
>
> That being said I don't think that b) would be sufficient in anyway; the
> desensitization logic for config options is quite limited (and
> inherently not perfect), but config options are too important to not log
> them. This isn't really the case for environment variables that have
> limited effects on Flink, and it's just too easy to leak secrets.
> Oh you abbreviated PASSWORD to PW? Well you just leaked it.
>
> This brings us to c), where my immediate gut instinct was that no ones
> gonna bother to do that.
>
> as for e*) (opt-in flag that Gyula proposed); I think it's to easy to
> shoot yourself in the foot somewhere down the line. It may be fine at
> one point but setups evolve after all, and this seems like something to
> easily slip through.
>
> On 15/11/2022 15:41, Konstantin Knauf wrote:
> > Hi everyone,
> >
> > important correction, this is since 1.16.0, not 1.17+.
> >
> > Best,
> >
> > Konstantin
> >
> > Am Di., 15. Nov. 2022 um 14:25 Uhr schrieb Gyula Fóra <
> gyula.f...@gmail.com
> >> :
> >> Thanks for bringing this important issue to discussion Konstantin!
> >>
> >> I am in favor of not showing them by default with an optional
> configuration
> >> to enable it.
> >> Otherwise this poses a big security risk of exposing previously hidden
> >> information after upgrade.
> >>
> >> Gyula
> >>
> >> On Tue, Nov 15, 2022 at 2:15 PM Maximilian Michels <m...@apache.org>
> wrote:
> >>
> >>> Hey Konstantin,
> >>>
> >>> I'd be in favor of not printing them at all, i.e. option (d). We have
> the
> >>> configuration page which lists the effective config and already removes
> >> any
> >>> known secrets.
> >>>
> >>> -Max
> >>>
> >>> On Tue, Nov 15, 2022 at 11:26 AM Konstantin Knauf <kna...@apache.org>
> >>> wrote:
> >>>
> >>>> Hi all,
> >>>>
> >>>> since Flink 1.17 [1] the Flink Web UI prints *all* environment
> >> variables
> >>> of
> >>>> the Taskmanager or Jobmanagers hosts (Jobmanager -> Configuration ->
> >>>> Environment). Given that environment variables are often used to store
> >>>> sensitive information, I think, it is wrong and dangerous to print
> >> those
> >>> in
> >>>> the Flink Web UI. Specifically, thinking about how Kubernetes Secrets
> >> are
> >>>> usually injected into Pods.
> >>>>
> >>>> One could argue that anyone who can submit a Flink Job to a cluster
> has
> >>>> access to these environment variables anyway, but not everyone who has
> >>>> access to the Flink UI can submit a Flink Job.
> >>>>
> >>>> I see the the following options:
> >>>> a) leave as is
> >>>> b) apply same obfuscation as in flink-conf.yaml based on some
> heuristic
> >>> (no
> >>>> "secret", "password" in env var name)
> >>>> c) only print allow-listed values
> >>>> d) don't print any env vars in the web UI (at least by default)
> >>>>
> >>>> What do you think?
> >>>>
> >>>> Cheers,
> >>>>
> >>>> Konstantin
> >>>>
> >>>> [1] https://issues.apache.org/jira/browse/FLINK-28311
> >>>>
> >>>> --
> >>>> https://twitter.com/snntrable
> >>>> https://github.com/knaufk
> >>>>
> >
>
>

Reply via email to