having no ACLs/Bucket owner enforced object ownership exposes owner canonical ID and displayname

0

You guys recommend not having ACLs on s3 buckets now, but if I create a bucket that is going to have read-only public access (ListBucket & GetObject only) from my application, then ListObjects/ListBucket on that bucket exposes both the Owner ID and DisplayName, which is not something I want public.

If I switch the bucket to Object writer ownership, the ListBucket results are nice and clean, containing only the relevant object info (key, etag, size, storage class).

It seems bad to leak the owner ID and display name like this? I'm going to keep it on Object writer I guess to avoid this even though the console has warnings all over the place about not using ACLs.

Chris

1 個回答
0

The canonical user ID is the Amazon S3–only concept. It is a 64-character obfuscated version of the account ID. Therefore you can't get anything out of the canonical user ID because it's a one-way hash (e.g. SHA-256).

For more information, please refer to the following links: https://docs.aws.amazon.com/AmazonS3/latest/userguide/finding-canonical-user-id.html https://docs.aws.amazon.com/AmazonS3/latest/userguide/example-walkthroughs-managing-access-example4.html

profile pictureAWS
已回答 1 年前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南