How to prevent SDK leaking host information to AWS?
See original GitHub issueConfirm by changing [ ] to [x] below:
- I’ve gone through Developer Guide and API reference
- I’ve checked AWS Forums and StackOverflow for answers
Describe the question
When pre-signing an S3 URL for a client to upload an image to, the SDK will generate a URL that includes an x-amz-user-agent
part that leaks information about our host system to the user and AWS:
&x-amz-user-agent=aws-sdk-js%2F3.13.0%20os%2Flinux%2F4.14.181-140.257.amzn2.x86_64%20lang%2Fjs%20md%2Fnodejs%2F14.16.1%20api%2Fs3%2F3.13.0%20exec-env%2FAWS_ECS_EC2
We would like this information to not be included in the URL. It is unclear to me what the SDK tries to achieve by including it in the first place.
Issue Analytics
- State:
- Created 2 years ago
- Comments:7 (3 by maintainers)
Top Results From Across the Web
Best practices for securing sensitive data in AWS data stores
This blog post focuses on general data security patterns and corresponding AWS security controls that protect your data.
Read more >Data protection in Amazon CloudFront - AWS Documentation
Use SSL/TLS to communicate with AWS resources. We recommend TLS 1.2 or later. Set up API and user activity logging with AWS CloudTrail....
Read more >Mitigate data leakage through the use of AppStream 2.0 and ...
Performs a describe action against the AppStream 2.0 API to ensure that the session ID and the user ID match. This helps to...
Read more >Best practices for working with AWS Lambda functions
To avoid potential data leaks across invocations, don't use the execution environment to store user data, events, or other information with security ...
Read more >Applying best practices for securing sensitive data in Amazon ...
Thus, it's important to protect the data against leakage by using attacks ... For more information see Logging Amazon RDS API Calls with...
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Hi @oliversalzburg
Thank you a lot for reporting this. You are right that SDK should not expose any information about the user who generates the URL. It will be removed in next release. I will keep you posted on this thread.
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs and link to relevant comments in this thread.