Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Block developers from running Kibana as superuser #45973

Closed
kobelb opened this issue Sep 17, 2019 · 2 comments · Fixed by #48247
Closed

Block developers from running Kibana as superuser #45973

kobelb opened this issue Sep 17, 2019 · 2 comments · Fixed by #48247
Assignees
Labels
chore Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!

Comments

@kobelb
Copy link
Contributor

kobelb commented Sep 17, 2019

It's historically been quite common for developers to run the Kibana server as the elastic user. This practice ignores any issues with the kibana_system reserved role not having the necessary privileges in Elasticsearch, and has caused us to catch these issues incredibly late and have to rush in a fix.

Telling developers they shouldn't be doing this hasn't worked, so we should consider taking a more aggressive approach. The most obvious solution is to prevent the use of elasticsearch.username: elastic when in dev-mode. However, I'm open to alternatives.

@kobelb kobelb added chore Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! labels Sep 17, 2019
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security

@legrego
Copy link
Member

legrego commented Sep 25, 2019

The most obvious solution is to prevent the use of elasticsearch.username: elastic when in dev-mode. However, I'm open to alternatives.

This is likely the simplest answer, as we can enforce this with a schema validation and prevent startup altogether. Otherwise, we'll need to have the security plugin (or perhaps the dev server?) make an authenticate call after Kibana starts up and connects.

Another idea is to have the security plugin log frequent and annoying warnings when it detects this condition. This is potentially something we could keep in production (but less frequent/annoying), as we should be warning users when they're running Kibana as a severely over-privileged user.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
chore Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants