Files
the-littlest-jupyterhub/docs/topic/security.rst

78 lines
3.2 KiB
ReStructuredText
Raw Normal View History

2018-07-12 14:15:01 -07:00
=======================
Security Considerations
=======================
The Littlest JupyterHub is in pre-alpha state & should not be used in
security critical situations. We will try to keep things as secure as possible,
but sometimes trade security for massive gains in convenience. This page contains
information about the security model of The Littlest JupyterHub.
System user accounts
====================
2018-07-31 09:38:25 -07:00
Each JupyterHub user gets their own Unix user account created when they
2018-07-12 14:15:01 -07:00
first start their server. This protects users from each other, gives them a
home directory at a well known location, and allows sharing based on file system
permissions.
#. The unix user account created for a JupyterHub user named ``<username>`` is
``jupyter-<username>``. This prefix helps prevent clashes with users that
already exist - otherwise a user named ``root`` can trivially gain full root
access to your server.
#. A home directory is created for the user under ``/home/jupyter-<username>``.
#. The default permission of the home directory is change with ``o-rwx`` (remove
non-group members the ability to read, write or list files and folders in the
Home directory).
2018-07-12 14:15:01 -07:00
#. No password is set for this unix system user by default. The password used
to log in to JupyterHub (if using an authenticator that requires a password)
is not related to the unix user's password in any form.
#. All users created by The Littlest JupyterHub are added to the user group
``jupyterhub-users``.
``sudo`` access for admins
==========================
JupyterHub admin users are added to the user group ``jupyterhub-admins``,
which is granted complete root access to the whole server with the ``sudo``
command on the terminal. No password required.
This is a **lot** of power, and they can do pretty much anything they want to
the server - look at other people's work, modify it, break the server in cool &
2018-09-11 12:08:31 -07:00
funky ways, etc. This also means **if an admin's credentials are compromised
(easy to guess password, password re-use, etc) the entire JupyterHub is compromised.**
2018-07-12 14:15:01 -07:00
Off-boarding users securely
===========================
When you delete users from the JupyterHub admin console, their unix user accounts
are **not** removed. This means they might continue to have access to the server
even after you remove them from JupyterHub. Admins should manually remove the user
2018-07-31 09:38:25 -07:00
from the server & archive their home directories as needed. For example, the
following command deletes the unix user associated with the JupyterHub user ``yuvipanda``.
2018-07-31 09:38:25 -07:00
2018-08-11 08:25:21 +02:00
.. code-block:: bash
sudo userdel jupyter-yuvipanda
2018-07-31 09:38:25 -07:00
If the user removed from the server is an admin, extra care must be taken
since they could have modified the system earlier to continue giving them
access.
2018-07-12 14:15:01 -07:00
Per-user ``/tmp``
=================
``/tmp`` is shared by all users in most computing systems, and this has been
a consistent source of security issues. The Littlest JupyterHub gives each
user their own ephemeral ``/tmp`` using the `PrivateTmp <https://www.freedesktop.org/software/systemd/man/systemd.exec.html#PrivateTmp>`_
feature of systemd.
HTTPS
=====
2018-07-31 09:38:25 -07:00
Any internet-facing JupyterHub should use HTTPS to secure its traffic. For
information on how to use HTTPS with your JupyterHub, see :ref:`howto/admin/https`.