[ 
https://issues.apache.org/jira/browse/NIFI-8220?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17282601#comment-17282601
 ] 

Nathan Gough commented on NIFI-8220:
------------------------------------

An additional action we could take would be when running insecurely, to 
restrict the Jetty server from binding to all interfaces (0.0.0.0) and only 
allow access to NiFi via loopback interface (127.0.0.1).

> Establish a secure by default configuration for NiFi
> ----------------------------------------------------
>
>                 Key: NIFI-8220
>                 URL: https://issues.apache.org/jira/browse/NIFI-8220
>             Project: Apache NiFi
>          Issue Type: Epic
>          Components: Tools and Build
>            Reporter: Joe Witt
>            Assignee: Joe Witt
>            Priority: Blocker
>             Fix For: 1.14.0
>
>
> Inspired by this tweet 
> https://twitter.com/_escctrl_/status/1359280656174510081?s=21 and the 
> resulting discussion here 
> https://lists.apache.org/thread.html/rc590f21807192a0dce18293c2d5b47392a6fd8a1ef26d77fbd6ee695%40%3Cdev.nifi.apache.org%3E
> It is time to change our config model.  It was also setup to be easy to use.  
> We've seen these silly setups on the Internet before but has gotten 
> ridiculous.  We need to take action.
> Will create a set of one or more JIRAs to roughly do the following.
> 1.  Disable HTTP by default.  If a user wants to enable to it for whatever 
> reason then also make them enable a new property which says something to the 
> effect of 'allow completely non secure access to the entire nifi instance - 
> not recommended'
> 2. Enable HTTPS with one way authentication by default which would be the 
> client authenticating the server whereby the server has a server cert.  We 
> could either make that cert a self-signed (and thus not trusted by client's 
> by default) cert or give a way for the user to run through command line 
> process to make a legit cert. 
> 3. If not already configured with an authorization provider supply and out of 
> the box provider which supports only a single auto generated at first startup 
> user/password enabling access to the NiFi system.
> 4. Disable all restricted processors by default.  Require the user to 
> explicitly enable them.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to