Yeah, actually our firewalls/loadbalancers can handle these issues.
If they don't, then I'll use HAProxy.

Thanks for all info :-)

On Tue, Nov 1, 2011 at 5:42 PM, Robert Stewart <bstewart...@gmail.com>wrote:

> I think you can address a lot of these concerns by running some proxy in
> front of SOLR, such as HAProxy.  You should be able to limit only certain
> URIs (so you can prevent /select queries).    HAProxy is a free software
> load-balancer, and it is very configurable and fairly easy to setup.
>
>
> On Nov 1, 2011, at 4:54 PM, Alireza Salimi wrote:
>
> > sorry, I didn't explain that part. We are the developers of client codes
> > too.
> > Meaning that just we know the credentials to access the web container,
> > and we won't run such queries.
> >
> > Right now, I'm writing a subclass of SearchHandler which changes the
> > SolrParams
> > to remove 'qt' parameter and limit the 'rows'. It must not be needed,
> > because
> > we are assuming that all requests will come from authenticated users, but
> > just
> > in case.
> >
> > Thanks
> >
> > On Tue, Nov 1, 2011 at 4:50 PM, Erik Hatcher <erik.hatc...@gmail.com>
> wrote:
> >
> >> SSL and auth doesn't address that /select can hit any request handler
> >> defined
> >>
> (/select?qt=/update&stream.body=<delete><query>*:*</query></delete>&commit=true).
> >> Be careful!
> >>
> >> But certainly knowing all the issues mentioned on this thread, it is
> >> possible to lock Solr down and make it safe to hit directly.  But not
> out
> >> of the box or trivially.
> >>
> >>       Erik
> >>
> >>
> >>
> >> On Nov 1, 2011, at 16:09 , Alireza Salimi wrote:
> >>
> >>> I'm not sure if anybody has asked these questions before or not.
> >>> Sorry if they are duplicates.
> >>>
> >>> The problem is that the clients (smart phones) of our Solr machines
> >>> are outside the network in which solr machines are located. So, we
> >>> need to somehow expose their service to the outside word.
> >>>
> >>> What's the safest way to do that?
> >>> If we implement just a controlled app sitting between those clients
> >>> we gonna waste lots of processing power because of proxying between
> >>> Solr and clients.
> >>>
> >>> We might also ignore some HTTP headers that Solr would generate
> >>> such as HTTP Cache headers. Anyways, creating such an application
> >>> seems to be a lot of work which is not that needed.
> >>>
> >>> Erik, do you think even if we use SSL and HTTP Authentication, still
> >>> it's not a good idea to expose Solr services?
> >>>
> >>>
> >>>
> >>> On Tue, Nov 1, 2011 at 3:57 PM, Erik Hatcher <erik.hatc...@gmail.com>
> >> wrote:
> >>>
> >>>> Be aware that even /select could have some harmful effects, see
> >>>> https://issues.apache.org/jira/browse/SOLR-2854 (addressed on trunk).
> >>>>
> >>>> Even disregarding that issue, /select is a potential gateway to any
> >>>> request handler defined via /select?qt=/req_handler
> >>>>
> >>>> Again, in general it's not a good idea to expose Solr to anything but
> a
> >>>> controlled app server.
> >>>>
> >>>>      Erik
> >>>>
> >>>> On Nov 1, 2011, at 15:51 , Alireza Salimi wrote:
> >>>>
> >>>>> What if we just expose '/select' paths - by firewalls and load
> >> balancers
> >>>> -
> >>>>> and
> >>>>> also use SSL and HTTP basic or digest access control?
> >>>>>
> >>>>> On Tue, Nov 1, 2011 at 2:20 PM, Chris Hostetter <
> >>>> hossman_luc...@fucit.org>wrote:
> >>>>>
> >>>>>>
> >>>>>> : I was wondering if it's a good idea to expose Solr to the outside
> >>>> world,
> >>>>>> : so that our clients running on smart phones will be able to use
> >> Solr.
> >>>>>>
> >>>>>> As a general rule of thumb, i would say that it is not a good idea
> to
> >>>>>> expose solr directly to the public internet.
> >>>>>>
> >>>>>> there are exceptions to this rule -- AOL hosted some live solr
> >> instances
> >>>>>> of the Sarah Palin emails for HufPo -- but it is definitely an
> expert
> >>>>>> level type thing for people who are so familiar with solr they know
> >>>>>> exactly what to lock down to make it "safe"
> >>>>>>
> >>>>>> for typical users: put an application between your untrusted users
> and
> >>>>>> solr and only let that application generate "safe" welformed
> requests
> >> to
> >>>>>> Solr...
> >>>>>>
> >>>>>> https://wiki.apache.org/solr/SolrSecurity
> >>>>>>
> >>>>>>
> >>>>>> -Hoss
> >>>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>> --
> >>>>> Alireza Salimi
> >>>>> Java EE Developer
> >>>>
> >>>>
> >>>
> >>>
> >>> --
> >>> Alireza Salimi
> >>> Java EE Developer
> >>
> >>
> >
> >
> > --
> > Alireza Salimi
> > Java EE Developer
>
>


-- 
Alireza Salimi
Java EE Developer

Reply via email to