hadoop-common-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Owen O'Malley (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (HADOOP-10183) Allow use of UPN style principals in keytab files
Date Fri, 03 Jan 2014 22:18:51 GMT

    [ https://issues.apache.org/jira/browse/HADOOP-10183?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13861954#comment-13861954

Owen O'Malley commented on HADOOP-10183:

This used to work, although clearly someone broke it at some point. Do note that if the cluster
operator configures it this way, it is less secure because there is a single cluster wide
secret for each service account that is present on each machine.

Clearly you need to remove the "if (name.getHostName() == null)" check, but you shouldn't
have needed the other change. What problem were you trying to address?

With your patch you completely removed the check for the correct user. *laugh* I assume that
was unintentional.

All of the parsing of Kerberos names should be done in KerberosName and not spread out through
the code.

> Allow use of UPN style principals in keytab files
> -------------------------------------------------
>                 Key: HADOOP-10183
>                 URL: https://issues.apache.org/jira/browse/HADOOP-10183
>             Project: Hadoop Common
>          Issue Type: Improvement
>          Components: security
>    Affects Versions: 2.2.0
>            Reporter: Mubashir Kazia
>            Assignee: Mubashir Kazia
>         Attachments: AppConnection.java, HADOOP-10183.patch, HADOOP-10183.patch.1, Jaas.java,
SaslTestClient.java, SaslTestServer.java, hdfs.keytab, jaas-krb5.conf, krb5.conf
> Hadoop currently only allows SPN style (E.g. hdfs/node.fqdn@REALM) principals in keytab
files in a cluster configured with Kerberos security. This cause the burden of creating multiple
principals and keytabs for each node of the cluster. Active Directory allows the use of single
principal across multiple hosts if the SPNs for different hosts have been setup correctly
on the principal. With this scheme we have the server side using keytab file with UPN style
(E.g. hdfs@REALM) principal for a given service for all the nodes of the cluster. The client
side will request service tickets with SPN and it's own TGT and Active Directory will grant
service tickets with the correct secret. 
> This will simplify the use of principals and keytab files for Active Directory users
with one principal for each service across all the nodes of the cluster. 
> I have a patch to allow the use of UPN style principals in Hadoop. The patch will not
affect the use of SPN style principals. I couldn't figure out a way to write test cases against
MiniKDC so I have included the Oracle/Sun sample Sasl server and client code along with the
configuration I used to confirm this scheme works. 

This message was sent by Atlassian JIRA

View raw message