-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerable data exposed with metrics endpoint #1428
Comments
|
I think this is only if you use |
I still believe they should not be part of |
Yes but expvar is the standard Go mechanism for exposing process info, and using it as "metrics" is really a debugging step, not a recommended production setup. Also, isn't passing passwords via command line flags a big No in any case? Those can be viewed via ps. |
I guess we have a bunch of things that, combined, turn this into a potential security problem.
So:
|
I am currently forced to use expvar as metrics backend because of bug #1200 As You suggested, I will change a way of providing config to use envs instead of cmdline args. |
Requirement - what kind of business use case are you trying to solve?
Keep credentials secure and expose app metrics at same time.
Problem - what in Jaeger blocks you from solving the requirement?
Seen in jaeger-ingester. Output from "/metrics" endpoint shows whole cmdline, which contains datastore credentials "--es.username" and "--es.password".
Sample:
Proposal - what do you suggest to solve the problem or improve the existing situation?
Either remove cmdline parameter or parse properties and use some whitelist or blacklist to hide auth credentials.
Any open questions to address
The text was updated successfully, but these errors were encountered: