• Complain

Lakhe - Practical Hadoop security

Here you can read online Lakhe - Practical Hadoop security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2014, publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Lakhe Practical Hadoop security
  • Book:
    Practical Hadoop security
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2014
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Practical Hadoop security: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Practical Hadoop security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way.

You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors.

No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation and configuration examples--again with illustrated code samples.

The book concludes with the most important aspect of Hadoop security encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost.

Practical Hadoop Security:

  • Explains importance of security, auditing and encryption within a Hadoop installation
  • Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions
  • Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use

Lakhe: author's other books


Who wrote Practical Hadoop security? Find out the surname, the name of the author of the book and a list of all author's works by series.

Practical Hadoop security — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Practical Hadoop security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

APPENDIX A

Picture 1

Pageant Use and Implementation

Pageant is an SSH authentication agent that can be used with PuTTY or WinSCP for holding your decrypted keys in memory, so that you dont need to enter your passphrase to decrypt your key every time you are authenticating to a server using a key pair ( discusses key-based authentication in detail). If you are using multiple key pairs to authenticate to multiple servers, Pageant is even more useful. You can use Pageant to hold all your decrypted keys in memory, meaning you need to enter the respective passphrases only once when you start your Windows session. When you log off your Windows session, Pageant exits without saving the decrypted keys on disk, which is the reason you need to enter your passphrase again when you start your Windows session.

Because Pageant is part of PuTTY installation package, you can download it from the same URL ( http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html ). When you run the executable file Pageant.exe to start Pageant, an icon that looks like a computer wearing a hat will appear in your system tray. Right-click the icon to invoke the Pageant menu, and then select the menu option you need: New Session, Saved Sessions, View Keys, Add Key, About, or Exit. If you select View Keys before adding keys, however, you will just see an empty list box.

Using Pageant

To use Pageant, you need first to generate a key pair and copy the public key to the server to which you need to connect. For example, I generated a key pair and saved the keys as keytest.ppk (private key) and keytest.pub (public key). I then encrypted the private key using a passphrase. Because I wanted to connect to the host pract_hdp_sec , I pasted my public key in the authorized_keys file in .ssh directory (as discussed in illustrates selecting and adding the key.

Adding a key to Pageant When you select a key here testkeyppk you are - photo 2

. Adding a key to Pageant

When you select a key (here, testkey.ppk ), you are prompted for the passphrase ().

Using Pageant to store passphrase for a key After you enter the right - photo 3

. Using Pageant to store passphrase for a key

After you enter the right passphrase, Pageant decrypts your private key and holds it in memory until you log off your Windows session. You can see your key listed within Pageant, as shown in .

Listing a stored key within Pageant Now you just need to specify your - photo 4

. Listing a stored key within Pageant

Now, you just need to specify your private key as means of authorization within PuTTY ().

Specifying key-based authentication within PuTTY Next time you want to - photo 5

. Specifying key-based authentication within PuTTY

Next time you want to connect to the server pract_hdp_sec , just open a PuTTY session, and it will prompt you for login name. Once you enter the login name, PuTTY directly connects you to the server, as you can see in .

Key-based authentication performed using decrypted key from Pageant PuTTY - photo 6

. Key-based authentication performed using decrypted key from Pageant

PuTTY recognizes that Pageant is running, retrieves the decrypted key automatically, and uses it to authenticate. You can open as many PuTTY sessions for the same server as you need without typing your passphrase again.

In addition, Pageant can load multiple private keys automatically when it starts up. For example, suppose you need to connect to ten servers on a daily basis. Manually adding the keys every day to Pageant is difficult as well as error-prone. To automatically load multiple keys, use a Pageant command line similar to the following; the directory path, of course, depends on where your Pageant.exe or your private key file (.ppk file) is located:

C:\Users\Administrator\Desktop>pageant.exe c:\bhushan\keytest.ppk c:\bhushan\bhushan.ppk

You can add multiple keys separated by space. If the keys are encrypted, Pageant will prompt for passphrases at startup. If Pageant is already running and you execute this command, it will load keys into the existing Pageant.

You can also create a shortcut and specify the command line there, as shown in .

Specifying a starting default directory for multiple keys If you have just - photo 7

. Specifying a starting (default) directory for multiple keys

If you have just one private key, specify its full path within the Target field:

C:\Users\Administrator\Desktop>pageant.exe c:\bhushan\keytest.ppk

If you have multiple keys and the path is long, instead of specifying path for each key, you can just specify a starting directory. For example, to specify a starting point for my previous multi-key example, in the Target field enter C:\Users\Administrator\Desktop>pageant.exe keytest.ppk and in the Start in field enter C:\Bhushan .

After Pageant initializes and loads the keys specified on its command line, you can direct Pageant to start another program. This program (for e.g. WinSCP or PuTTY etc.) can then use the keys that Pageant loaded. The syntax is as follows:

C:\Users\Administrator\Desktop>pageant.exe c:\bhushan\keytest.ppk -c C:\PuTTY\putty.exe

Security Considerations

Holding your decrypted private keys in Pageant is more secure than storing key files on your local disk drive, but still has some known security issues.

For example, Windows doesnt protect swapped data (memory data written to a system swap file) in any way. So, if you using Pageant for a long time, the decrypted key data could likely be swapped and written to disk. A malicious attacker who gains access to your hard disk could also gain access to your keys. This is, of course, much more secure than storing an unencrypted file on your local disk drive, but still has vulnerabilities.

Windows only has safeguards to prevent excutable code writing into another excutable programs memory space; but still provides Read access to it. In other words, programs can access each others memory space, which is intended as a way to assist in debugging. Unfortunately, malicious programs can exploit this feature and can access Pageants memory to extract the decrypted keys and use them for unlawful purposes.

These risks can easily be mitigated, however, by making sure that your network infrastructure is secure and firewalls in place.

APPENDIX B

Picture 8

PuTTY and SSH Implementation for Linux-Based Clients

In the section Key-Based Authentication Using PuTTY in , you reviewed how PuTTY can effectively be used for key-based authentication for a Windows-based client. What about key-based authentication for Linux-based clients? The answer is PuTTY again.

You can download the Linux-based version of PuTTY from various sources. I used rpm (Red Hat Package Manager, a package management system used for software distribution in Linux domain) for the latest PuTTY version (0.63) for CentOS 6.2; the file is putty-0.63-1.el6.rf.x86_64.rpm . You can download the rpm from various sources; you just need to search for your operating system. After you download the file, install the rpm:

rpm -Uvh putty-0.63-1.el6.rf.x86_64.rpmNext page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Practical Hadoop security»

Look at similar books to Practical Hadoop security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Practical Hadoop security»

Discussion, reviews of the book Practical Hadoop security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.