ambari-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Robert Levas (JIRA)" <j...@apache.org>
Subject [jira] [Updated] (AMBARI-20938) LDAPS connections to an Active Directory when enabling Kerberos should validate the server's SSL certificate
Date Fri, 05 May 2017 21:06:04 GMT

     [ https://issues.apache.org/jira/browse/AMBARI-20938?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Robert Levas updated AMBARI-20938:
----------------------------------
    Description: 
LDAPS connections to an Active Directory when enabling Kerberos should validate the server's
SSL certificate.  The current implementation skips validation checks to help avoid SSL issues;
however this is not secure. Also the _trusting_ SSL connection may not support the more secure
SSL protocols - TLSv1.2.

A flag in the {{ambari.properties}} file ({{kerberos.operation.verify.kdc.trust}}) should
be available to allow for the user to select either a _trusting_  SSL connection or a validating
(non-trusting) SSL connection to be used.  The default should be to use the standard (non-trusting)
SSL connection. 


  was:
LDAPS connections to an Active Directory when enabling Kerberos should validate the server's
SSL certificate.  The current implementation skips validation checks to help avoid SSL issues;
however this is not secure. Also the _trusting_ SSL connection may not support the more secure
SSL protocols - TLSv1.2.

A flag in the {{ambari.properties}} file should be available to allow for the _trusting_ 
SSL connection to be used; but the default should be to use the standard (non-trusting) SSL
connection. 



> LDAPS connections to an Active Directory when enabling Kerberos should validate the server's
SSL certificate
> ------------------------------------------------------------------------------------------------------------
>
>                 Key: AMBARI-20938
>                 URL: https://issues.apache.org/jira/browse/AMBARI-20938
>             Project: Ambari
>          Issue Type: Bug
>          Components: ambari-server
>    Affects Versions: 2.0.0
>            Reporter: Robert Levas
>            Assignee: Robert Levas
>              Labels: active-directory, active_directory, kerberos, ssl
>             Fix For: 2.5.2
>
>
> LDAPS connections to an Active Directory when enabling Kerberos should validate the server's
SSL certificate.  The current implementation skips validation checks to help avoid SSL issues;
however this is not secure. Also the _trusting_ SSL connection may not support the more secure
SSL protocols - TLSv1.2.
> A flag in the {{ambari.properties}} file ({{kerberos.operation.verify.kdc.trust}}) should
be available to allow for the user to select either a _trusting_  SSL connection or a validating
(non-trusting) SSL connection to be used.  The default should be to use the standard (non-trusting)
SSL connection. 



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Mime
View raw message