HBASE-30130 Add a security-model section to the website#8170
Open
apurtell wants to merge 1 commit intoapache:masterfrom
Open
HBASE-30130 Add a security-model section to the website#8170apurtell wants to merge 1 commit intoapache:masterfrom
apurtell wants to merge 1 commit intoapache:masterfrom
Conversation
raboof
reviewed
Apr 30, 2026
Member
raboof
left a comment
There was a problem hiding this comment.
looks good, added a few comments!
|
|
||
| ## Reporting Security Vulnerabilities | ||
|
|
||
| To report an undisclosed, sensitive security vulnerability in Apache HBase, please preferentially send your report to the private mailing list [private@hbase.apache.org](mailto:private@hbase.apache.org). You may also report security vulnerabilities to the Apache Software Foundation's security team privately via email at [security@apache.org](mailto:security@apache.org). Please do not use JIRA or any public channel for security reports. |
Member
There was a problem hiding this comment.
Please do not ask people to report vulnerabilities to private@hbase.apache.org, but ask them to email security@apache.org.
If you're ready to receive reports 'directly', you can request a project security list (https://security.apache.org/resources/#project-specific-security-lists)
|
|
||
| ## What Is Considered a Vulnerability | ||
|
|
||
| The following categories of issues are considered valid security vulnerabilities and should be reported to [private@hbase.apache.org](mailto:private@hbase.apache.org) or [security@apache.org](mailto:security.apache.org): |
Comment on lines
+95
to
+96
| - **Authorization bypass**: An authenticated user performing operations beyond their granted ACL permissions. | ||
| - **Privilege escalation**: An authenticated user with limited permissions gaining administrative or superuser capabilities. |
| - **Access requiring operator-level cluster configuration changes**: Issues that require modifying `hbase-site.xml` or other server configuration files require host-level access, which is outside the HBase security boundary. | ||
| - **Information disclosure via administrative interfaces on trusted networks**: Version information, configuration details, or metrics visible in the web UIs when accessed from within the trusted network. | ||
| - **Exposure of services on untrusted networks**: Placing HBase services directly on the public internet without firewalls or VPN is an operator misconfiguration, not a vulnerability. | ||
|
|
Member
There was a problem hiding this comment.
Some more things to put in either of the above lists:
- Are logs intended to be safe to expose to users with read-only authorization, or may they contain credentials?
- Is it a problem when an unauthenticated user can easily determine the deployed version?
- Is it OK if an attacker can discover what usernames are valid for the system?
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Add a "Security Model" page to the Apache HBase website, following the ASF Security Team's recommendation for projects to document their security assumptions.
The page defines HBase's trust boundaries, explains that HBase's default unauthenticated configuration is intended only for development and testing, and clarifies security expectations for gateway services, coprocessors, web UIs, and transport encryption. It enumerates what constitutes a valid vulnerability versus what does not, providing clear guidance for operators, security researchers, and the ASF Security Team when triaging incoming reports.