Return-Path: Delivered-To: apmail-incubator-cassandra-user-archive@minotaur.apache.org Received: (qmail 77087 invoked from network); 2 Dec 2009 21:56:24 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 2 Dec 2009 21:56:24 -0000 Received: (qmail 27871 invoked by uid 500); 2 Dec 2009 21:56:24 -0000 Delivered-To: apmail-incubator-cassandra-user-archive@incubator.apache.org Received: (qmail 27858 invoked by uid 500); 2 Dec 2009 21:56:24 -0000 Mailing-List: contact cassandra-user-help@incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: cassandra-user@incubator.apache.org Delivered-To: mailing list cassandra-user@incubator.apache.org Received: (qmail 27849 invoked by uid 99); 2 Dec 2009 21:56:24 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 02 Dec 2009 21:56:24 +0000 X-ASF-Spam-Status: No, hits=2.6 required=10.0 tests=RCVD_NUMERIC_HELO,SPF_HELO_PASS,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of gcdcu-cassandra-user@m.gmane.org designates 80.91.229.12 as permitted sender) Received: from [80.91.229.12] (HELO lo.gmane.org) (80.91.229.12) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 02 Dec 2009 21:56:14 +0000 Received: from list by lo.gmane.org with local (Exim 4.50) id 1NFxAm-0001qr-Ts for cassandra-user@incubator.apache.org; Wed, 02 Dec 2009 22:55:44 +0100 Received: from 38.98.147.130 ([38.98.147.130]) by main.gmane.org with esmtp (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Wed, 02 Dec 2009 22:55:44 +0100 Received: from tzz by 38.98.147.130 with local (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Wed, 02 Dec 2009 22:55:44 +0100 X-Injected-Via-Gmane: http://gmane.org/ To: cassandra-user@incubator.apache.org From: Ted Zlatanov Subject: Re: Cassandra access control Date: Wed, 02 Dec 2009 15:55:16 -0600 Organization: =?utf-8?B?0KLQtdC+0LTQvtGAINCX0LvQsNGC0LDQvdC+0LI=?= @ Cienfuegos Lines: 37 Message-ID: <87eindhwhn.fsf@lifelogs.com> References: <87eio6p7pb.fsf@lifelogs.com> <87fx7ul6id.fsf@lifelogs.com> <1259708330.19220.59.camel@achilles> <87638pl96u.fsf@lifelogs.com> <87ljhljhv2.fsf@lifelogs.com> <1259784893.10676.32.camel@achilles> <87zl61i0kn.fsf@lifelogs.com> <1259786109.10676.35.camel@achilles> <87r5rdhxsr.fsf@lifelogs.com> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Complaints-To: usenet@ger.gmane.org X-Gmane-NNTP-Posting-Host: 38.98.147.130 X-Face: bd.DQ~'29fIs`T_%O%C\g%6jW)yi[zuz6;d4V0`@y-~$#3P_Ng{@m+e4o<4P'#(_GJQ%TT= D}[Ep*b!\e,fBZ'j_+#"Ps?s2!4H2-Y"sx" User-Agent: Gnus/5.110011 (No Gnus v0.11) Emacs/23.1.50 (gnu/linux) Cancel-Lock: sha1:XiUQ6V4LrqDezx0Fy8VbsnHKqNk= Sender: news X-Virus-Checked: Checked by ClamAV on apache.org On Wed, 2 Dec 2009 15:32:35 -0600 Jonathan Ellis wrote: JE> 2009/12/2 Ted Zlatanov : >> I'd still rather pass something back. �As I said, it allows backends to >> maintain state when it makes sense to do so and can alleviate the >> problem of redundant auth queries in the future. JE> That makes no sense whatsoever. Backends can maintain state or not JE> either way; adding a token you have to pass back makes just adds an JE> extra layer of mapping token -> real state in the simple case of JE> token-is-only-valid-per-connection and an unreasonable amount of JE> complexity if you try to make it valid across more than one. JE> I'm -1 in the apache veto sense on the token idea. On Wed, 02 Dec 2009 15:38:14 -0600 Eric Evans wrote: EE> If not for SSO via shared-state between nodes, then for what? Can you EE> give a tangible example of "when it makes sense to do so"? Are you sure EE> this isn't YAGNI? Across nodes, backends can't maintain state easily, and even across threads it's not trivial. My version allows a distrubuted application to authenticate once and then reuse the same AuthenticationRequest, as long as the authentication backends have a permanent token store inside or outside Cassandra. If we're going to make the keyspace choice sticky per connection, we should allow for a way to open multiple connections to multiple keyspaces without necessarily hitting auth services every time. You claim the complexity is unreasonable. I disagree. If any complexity emerges, it will be in the backend code which a particular organization may need and will write. For Cassandra itself this is not an issue and the default case (AllowAll) will not create any such complexity. Ted