Yes, it is important to understand that only trusted clients and persons should 
be given access to Solr's port.

But it may stil be surprising to users that e.g. passwords to a DB or SSL 
keystore is available over HTTP when there is no need for them at the client 
side. I'm not saying itis a bug, but may be surprising. So I think we should 
continue step by step to address these and have Solr behave after the principle 
of least surprise, thus the discussion in 
https://issues.apache.org/jira/browse/SOLR-12976

After locking down secrets as good as possible, the next logical step would be 
to couple Solr's Authentication/Authorization feature to this, so that if a 
client has a role with the read/edit securityconfig permission, then she could 
be allowed to see those properties. So far the authorization is true/false 
based on handler/HTTPMethod meaning we'd have to add a new 
/solr/admin/info/system/secrets/ handler which could return those hidden props. 
But there may not be a need to retrieve these on API level at all.

--
Jan Høydahl, search solution architect
Cominvent AS - www.cominvent.com

> 8. nov. 2018 kl. 19:54 skrev Gus Heck <gus.h...@gmail.com>:
> 
> That's an interesting feature, and it addresses X, but there are lots of
> ways to discover system properties. In a managed schema, enter a field name
> ${java.version} and you'll get a field named 1.8.0_144 (or whatever). I
> still think it's important to address Y they are trying to hide the system
> properties from someone they have placed their trust in already.
> 
> On Thu, Nov 8, 2018 at 1:16 PM Jan Høydahl <jan....@cominvent.com> wrote:
> 
>> It's not documented in the Ref Guide, but you can set this system property
>> to fix it:
>> 
>> 
>> SOLR_OPTS="-Dsolr.redaction.system.pattern=(.*password.*|.*your-own-regex.*)"
>> 
>> Then the property will show as --REDACTED— in the UI.
>> 
>> Note that the property still will leak through /solr/admin/metrics and you
>> need to add the same exclusion in solr.xml, see
>> https://lucene.apache.org/solr/guide/7_5/metrics-reporting.html#the-metrics-hiddensysprops-element
>> 
>> --
>> Jan Høydahl, search solution architect
>> Cominvent AS - www.cominvent.com
>> 
>>> 7. nov. 2018 kl. 20:51 skrev Naveen M <navav1...@gmail.com>:
>>> 
>>> Hi,
>>> 
>>> Is there a way to disable jvm properties from the solr UI.
>>> 
>>> It has some information which we don’t want to expose. Any pointers would
>>> be helpful.
>>> 
>>> 
>>> Thanks
>> 
>> 
> 
> -- 
> http://www.the111shift.com

Reply via email to