-
Notifications
You must be signed in to change notification settings - Fork 124
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal: Change default admin set name to NOT include a slash #1291
Comments
In RIIIF we also have this problem. We advise people to configure Apache to pass the encoded slashes correctly: https://github.com/curationexperts/riiif#special-note-for-passenger-and-apache-users |
Would like @samvera/hyrax-code-reviewers to chime in on this. We may also want to discuss this in a Samvera Tech call. (Though not next week, because of the conflict with OR2017.) Thx for raising this, @billdueber |
The scenario @billdueber described is not Apache+mod_passenger, but Apache+mod_proxy. There is of course a similar workaround available for mod_proxy ( The question here seems more about whether it is necessary to introduce such a configuration dependency in hyrax to only support the chosen default admin set name. |
@skorner I would argue that ModProxy and Apache are not required parts of this stack. |
I agree. I'm merely highlighting the fact that the default admin set name choice has consequences in several deployment scenarios. |
@skorner This seems like bad defaults in Apache to me. Nginx doesn't have this problem. I'm not strongly tied to the default admin set name, but it seems odd to change to support one deployment scenario. Furthermore there are other places you may encounter this bug (riiif for one) and it would make sense to fix the problem rather than eliminate one potential trigger. |
Two questions:
And an observation: |
I'd like to echo @elrayle's concern: is this going to be an issue for existing installations? If not, then I would support removing the I also agree that Apache is far from obscure, and is probably used by a significant fraction of Hydra deployments (possibly a majority). So dismissing it as "one deployment scenario" seems counterproductive here. |
@elrayle yes, I'm worried that this will just fix it in one place. And I really don't care what we call it. I think it's telling that NGINX and Apache have different default configurations. Has anyone asked the Apache team why they have it configured the way it is? I'm thinking that a reverse proxy should not be mutating data (so far as that is possible). Just because Apache is a big player doesn't mean they don't have bugs. |
I would like to chime in on this, as well. I am struggling with this now. I would love for this to be fixed, even if it is considered a work-around for apache users. |
i'd love to see this done, and would be sure to merge a PR that cleanly renames the admin set and provides tooling to properly update existing apps. |
Even though I found a work-around, which was mentioned in an earlier comment, I still think this should be fixed. |
bumping this to the 3.x series in hopes that we can pick it up post-3.0.0. |
Descriptive summary
Apache's
mod_proxy
, when reverse proxying, canonicalizes%2F
to/
in passed URLs (even though it's properly escaped) due to security considerations. URLs with the default admin set id ofadmin_set/default
then break. I'm suggesting we change the default admin set id, and consider restricting legal characters for an admin set ID.Rationale
As defined in HEAD, the variable DEFAULT_ID for the default admin set is
'admin_set/default'
.https://github.com/samvera/hyrax/blame/master/app/models/concerns/hyrax/admin_set_behavior.rb#L29
This is a problem (annoyance?) in that Apache's mod_proxy cannonicalizes passed URLs prior to sending them off to the proxied server, due to longstanding security issues where someone would protect a path and then some yahoo would pass in a URL with an embedded
%2F
to get around it.mod_proxy has an override (
nocanon
) but it is not on by default and its use may open up a server to other potential security issues.The mod_proxy docs state:
So, there's a workaround, but if there's not a deliberate reason to include a slash, maybe we could change it.
A potential further step would be to restrict the characters that are allowed in an admin set ID in general, so it doesn't crop up again.
Expected behavior
Default settings don't result in borked URLs on a common platform.
Related work
Link to related tickets or prior related work here.
The text was updated successfully, but these errors were encountered: