-
Notifications
You must be signed in to change notification settings - Fork 312
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security: prevent malicious post indexing #10
Comments
This looks pretty interesting. We could add optional support for this plugin: https://github.com/sonian/elasticsearch-jetty |
I believe this is more of an educational and documentational thing, as this will require stricter configuration of the nginx directives on the server. Leaving open for now until I write the documentation surrounding this. Open to thoughts or suggestions on how to better improve security surrounding this @tlovett1 @TheLastCicada @zamoose. |
Something like this may work: http://snippets.aktagon.com/snippets/555-how-to-filter-post-parameters-with-nginx-and-the-perl-module |
Run through internal script in plugin before sending on to ES. |
Good news on this front, after a fantastic post by the Elasticsearch team (post here) where they discuss good ways to incorporate NGINX usage into the HTTP stack with Elasticsearch, @TheLastCicada and I were able to come up with a directive that should help lock down any usage that is using a specific API endpoint (i.e.
|
Awesome article. You could even use Basic HTTP Auth to lock down that endpoint even further. |
Via server side - but still an important thing to figure out is how we're limiting and controlling access to the Elasticsearch server. Currently we are proxy pass limiting access to POST - this does not prevent users from maliciously indexing data
The text was updated successfully, but these errors were encountered: