Project

General

Profile

Actions

Bug #9430

closed

[SDKs] crunch-job leaks API tokens to the process list

Added by Brett Smith almost 10 years ago. Updated about 6 years ago.

Status:
Closed
Priority:
Normal
Assigned To:
-
Category:
-
Target version:
-
Story points:
-

Description

When you run crunch-job, it creates subprocesses that include the Arvados API token in the argv. For example, environment variables get converted to docker run --env options. Since ARVADOS_API_TOKEN is an environment variable, this gets included.

This is a security problem when people use crunch-job to run jobs on a local system, like a shell node. Other users on that system can grab the token out of the process list and use it to impersonate the user.

Actions #1

Updated by Tom Clegg almost 10 years ago

Related, but not exactly the same issue: Running a (regular non-local batch) job in a shared project can expose the per-job token, via the live logging facility, to another user who can read that project. In such a case, the token is revoked when the job ends, so (unlike the local job case described above) there is a limited window during which the second user can take advantage of the leaked token.

Actions #2

Updated by Peter Amstutz about 6 years ago

  • Status changed from New to Closed
Actions

Also available in: Atom PDF