ambari-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Siddharth Wagle (JIRA)" <>
Subject [jira] [Updated] (AMBARI-2174) Eliminate cleartext LDAPS credentials from Ambari props files
Date Fri, 07 Jun 2013 18:12:21 GMT


Siddharth Wagle updated AMBARI-2174:

    Attachment:     (was: AMBARI-2174-latest.patch)
> Eliminate cleartext LDAPS credentials from Ambari props files
> -------------------------------------------------------------
>                 Key: AMBARI-2174
>                 URL:
>             Project: Ambari
>          Issue Type: Task
>          Components: controller
>    Affects Versions: 1.2.5
>            Reporter: Siddharth Wagle
>            Assignee: Siddharth Wagle
>             Fix For: 1.2.5
>         Attachments: AMBARI-2174-latest.patch
> Observations:
> - Currently we use the Java Keystore for storing server and agent SSL certificates. The
keystore is a storage facility for cryptographic keys and certificates and is guarded by a
> Presently what we do is generate a random 50 character long alphanumeric keystore password,
the first time ambari starts with permissions 644. (should be 600)
> {noformat}
> -rw-r--r--. 1 root root   50 May 13 13:49 pass.txt
> {noformat}
> - Database password in, this is not clear text and is store in a file
with appropriate ACL.
> {noformat}
> -rw-------. 1 root root 7 May 13 13:49 /etc/ambari-server/conf/password.dat
> {noformat}
> Need to discuss the flow of enabling LDAP access to Ambari in order to suggest a flexible
> Important considerations:
> - Any cryptographic technique that requires encryption and decryption has understood
weakness that the private key is protected by the appropriate ACL. Even if we encrypt passwords
in the configuration files, the key used for achieving the encryption needs to be protected.
> - One decent solution is, prompt the user for a passphrase and use the non-invertible
secure digest (such as sha-1) of the password to lock the keystore. This same password can
be used to encrypt LDAP credentials. In this approach we need to prompt the admin to provide
the LDAP password when configuring a LDAP user for the first time and then write the encrypted
password into the configuration file. Alternately, we can ask for the same during ambari-server
setup, but that would be less flexible.

This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see:

View raw message