> I would like to be able to define core specific permissions with
rule-based
> authorization in security.json in the same way you can do for collections.

PRs/Patches welcome... but I think you're going to have to accept migrating
to SolrCloud.  SolrCloud has gotten better year over year.

~ David Smiley
Apache Lucene/Solr Search Developer
http://www.linkedin.com/in/davidwsmiley


On Fri, May 7, 2021 at 3:39 AM Thomas Corthals <tho...@klascement.net>
wrote:

> I would like to be able to define core specific permissions with rule-based
> authorization in security.json in the same way you can do for collections.
>
> Thomas
>
> Op do 6 mei 2021 om 23:25 schreef David Smiley <dsmi...@apache.org>:
>
> > I'm reaching out to our user community to get opinions on what Solr
> should
> > do to be more secure-by-default.
> >
> > TL;DR: Solr 9 has better secure-by-defaults, but maybe we should do more
> > like have Solr pick some of it's default settings dependent on a new
> > env=dev|prod.
> >
> > I was shown a glimpse of a massive list of Solr servers exposed on the
> > public internet by a security researcher.  I'm kinda blown away that so
> > many people would be so careless.  I think Solr could and should run with
> > better "secure-by-default" settings.
> >
> > The situation will be much better in Solr 9 -- and I'll give a shout-out
> of
> > thanks to Rob Muir for helping make this so.  Here's a couple prominent
> > ones:
> > * Solr's Jetty now binds to localhost by default, configurable via
> > SOLR_JETTY_HOST.  Before 9, you can configure a similar thing in the
> Jetty
> > config files.  SOLR-13985
> > * Java's SecurityManager sandbox is enabled by default. -- SOLR-13984.
> > This option also exists in Solr since 8.5, toggle-able
> > via SOLR_SECURITY_MANAGER_ENABLED.  Mostly this prevents the worst of
> > security bugs -- RCE.
> >
> > I wonder if users will promptly set SOLR_JETTY_HOST=0.0.0.0 to get
> anything
> > done?  I think so... but it's something, protecting some users.
> >
> > Perhaps Solr ought to default to requiring a username/password?  I've
> heard
> > this suggestion and it's an obvious one even if some of us (me included)
> > worry that it would make it too annoying to play with Solr when getting
> > started.  I think the concerns could be mitigated based on the approach.
> > If Solr had an opt-in env=dev setting, for example, then Solr could not
> > insist on authentication, whereas a default env=prod would insist.  Of
> > course the authentication or lack thereof could be explicitly configured
> or
> > disabled at the user's prerogative.  What I like about an "env" setting
> is
> > that many other settings could be gated on this as well.
> >
> > I particularly like the idea of an env=dev|prod setting because a variety
> > of settings in Solr could have a default that is dependent on this value.
> > In particular I argue that a env=prod should result in Solr's config APIs
> > being disabled -- equivalent to -Ddisable.configEdit=true.  I believe a
> > minority of Solr users actually use these APIs, yet they are frequently a
> > step in exploiting weaknesses in Solr.
> >
> > ~ David Smiley
> > Apache Lucene/Solr Search Developer
> > http://www.linkedin.com/in/davidwsmiley
> >
>

Reply via email to