Return-Path: X-Original-To: apmail-hadoop-common-issues-archive@minotaur.apache.org Delivered-To: apmail-hadoop-common-issues-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 3394DD6EB for ; Wed, 4 Jul 2012 06:12:36 +0000 (UTC) Received: (qmail 4537 invoked by uid 500); 4 Jul 2012 06:12:36 -0000 Delivered-To: apmail-hadoop-common-issues-archive@hadoop.apache.org Received: (qmail 4340 invoked by uid 500); 4 Jul 2012 06:12:35 -0000 Mailing-List: contact common-issues-help@hadoop.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: common-issues@hadoop.apache.org Delivered-To: mailing list common-issues@hadoop.apache.org Received: (qmail 4308 invoked by uid 99); 4 Jul 2012 06:12:35 -0000 Received: from issues-vm.apache.org (HELO issues-vm) (140.211.11.160) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 04 Jul 2012 06:12:35 +0000 Received: from isssues-vm.apache.org (localhost [127.0.0.1]) by issues-vm (Postfix) with ESMTP id CEF4C142854 for ; Wed, 4 Jul 2012 06:12:34 +0000 (UTC) Date: Wed, 4 Jul 2012 06:12:34 +0000 (UTC) From: "Laxman (JIRA)" To: common-issues@hadoop.apache.org Message-ID: <1882027919.2083.1341382354849.JavaMail.jiratomcat@issues-vm> In-Reply-To: <646958215.1784.1341369036696.JavaMail.jiratomcat@issues-vm> Subject: [jira] [Commented] (HADOOP-8554) KerberosAuthenticator should use the configured principal MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 [ https://issues.apache.org/jira/browse/HADOOP-8554?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13406289#comment-13406289 ] Laxman commented on HADOOP-8554: -------------------------------- About to raise another issue and noticed. We are also facing this problem in 2.0.1 bq. Seems like we should use the configured hadoop.http.authentication.kerberos.principal instead right? I don't find this property in trunk. I think it's better to pass principal from the user of KerberosAuthenticator. Any different opinion? > KerberosAuthenticator should use the configured principal > --------------------------------------------------------- > > Key: HADOOP-8554 > URL: https://issues.apache.org/jira/browse/HADOOP-8554 > Project: Hadoop Common > Issue Type: Bug > Components: security > Affects Versions: 1.0.0 > Reporter: Eli Collins > > In KerberosAuthenticator we construct the principal as follows: > {code} > String servicePrincipal = "HTTP/" + KerberosAuthenticator.this.url.getHost(); > {code} > Seems like we should use the configured hadoop.http.authentication.kerberos.principal instead right? > I hit this issue as a distcp using webhdfs://localhost fails because HTTP/localhost is not in the kerb DB but using webhdfs://eli-thinkpad works because HTTP/eli-thinkpad is (and is my configured principal). distcp using Hftp://localhost with the same config works so it looks like this check is webhdfs specific for some reason (webhdfs is using spnego and hftp is not?). -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa For more information on JIRA, see: http://www.atlassian.com/software/jira