Be aware that even /select could have some harmful effects, see 
https://issues.apache.org/jira/browse/SOLR-2854 (addressed on trunk).

Even disregarding that issue, /select is a potential gateway to any request 
handler defined via /select?qt=/req_handler

Again, in general it's not a good idea to expose Solr to anything but a 
controlled app server.  

        Erik

On Nov 1, 2011, at 15:51 , Alireza Salimi wrote:

> What if we just expose '/select' paths - by firewalls and load balancers -
> and
> also use SSL and HTTP basic or digest access control?
> 
> On Tue, Nov 1, 2011 at 2:20 PM, Chris Hostetter 
> <hossman_luc...@fucit.org>wrote:
> 
>> 
>> : I was wondering if it's a good idea to expose Solr to the outside world,
>> : so that our clients running on smart phones will be able to use Solr.
>> 
>> As a general rule of thumb, i would say that it is not a good idea to
>> expose solr directly to the public internet.
>> 
>> there are exceptions to this rule -- AOL hosted some live solr instances
>> of the Sarah Palin emails for HufPo -- but it is definitely an expert
>> level type thing for people who are so familiar with solr they know
>> exactly what to lock down to make it "safe"
>> 
>> for typical users: put an application between your untrusted users and
>> solr and only let that application generate "safe" welformed requests to
>> Solr...
>> 
>> https://wiki.apache.org/solr/SolrSecurity
>> 
>> 
>> -Hoss
>> 
> 
> 
> 
> -- 
> Alireza Salimi
> Java EE Developer

Reply via email to