Return-Path: Delivered-To: apmail-hadoop-core-user-archive@www.apache.org Received: (qmail 79262 invoked from network); 30 Sep 2008 13:35:19 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 30 Sep 2008 13:35:19 -0000 Received: (qmail 56976 invoked by uid 500); 30 Sep 2008 13:35:12 -0000 Delivered-To: apmail-hadoop-core-user-archive@hadoop.apache.org Received: (qmail 56945 invoked by uid 500); 30 Sep 2008 13:35:12 -0000 Mailing-List: contact core-user-help@hadoop.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: core-user@hadoop.apache.org Delivered-To: mailing list core-user@hadoop.apache.org Received: (qmail 56934 invoked by uid 99); 30 Sep 2008 13:35:12 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 30 Sep 2008 06:35:12 -0700 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: domain of jason.rutherglen@gmail.com designates 209.85.217.13 as permitted sender) Received: from [209.85.217.13] (HELO mail-gx0-f13.google.com) (209.85.217.13) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 30 Sep 2008 13:34:12 +0000 Received: by gxk6 with SMTP id 6so11852461gxk.5 for ; Tue, 30 Sep 2008 06:33:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to :subject:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:references; bh=toleZrJw/Ink3si1ygLnYMnK/fvHBLl/TuJJ1fKEPqY=; b=I0FdN6nAmvggK+cb3p/oZy3YzVBon1SgwfaFmBC2rPfYy6D/RNUzPDrz1AC0pNub/9 lz7QLcGIwQmE3urKQMbYBdG9DPA7YWM4fqZuGrHy7EpNkI6xB3XlzJ2cxw8egsUfXInT wVcfljW8RSLPqbsUsvqYFIRdBWdq+GFm6cd6E= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :references; b=ek1xgfRZuyRo5vq3erEppsJG31fHm4jvNUpFC0QEBk55jJDGYzjBjWhDYJelSMKFyj 2kO6F/0YiuLOjjkCu+Xx1fLkurNZk8aKcbZPY1PIHj8TDFzu3e24CTyH7XcOdRkYxYRZ b6Qx+VWpa5eM3naRkm5ywKzb7i9TUEh1rOVsI= Received: by 10.150.140.16 with SMTP id n16mr9994063ybd.142.1222781626250; Tue, 30 Sep 2008 06:33:46 -0700 (PDT) Received: by 10.151.117.4 with HTTP; Tue, 30 Sep 2008 06:33:46 -0700 (PDT) Message-ID: <85d3c3b60809300633r2b1bb9fcoaf938c30bdcaa0b7@mail.gmail.com> Date: Tue, 30 Sep 2008 09:33:46 -0400 From: "Jason Rutherglen" To: core-user@hadoop.apache.org Subject: Re: Question about Hadoop 's Feature(s) In-Reply-To: <48E221EF.2020105@apache.org> MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline References: <3DADD35EDAE49145B9BA1AB44844771178F3E4@lvsrv_dns.luvina.net> <48DB7A59.1030506@apache.org> <85d3c3b60809291732r3e1e9227kf60adb6f79738698@mail.gmail.com> <48E221EF.2020105@apache.org> X-Virus-Checked: Checked by ClamAV on apache.org > However, HDFS uses HTTP to serve blocks up -that needs to be locked down > too. Would the signing work there? I am not familiar with HDFS over HTTP. Could it simply sign the stream and include the signature at the end of the HTTP message returned? On Tue, Sep 30, 2008 at 8:56 AM, Steve Loughran wrote: > Jason Rutherglen wrote: >> >> I implemented an RMI protocol using Hadoop IPC and implemented basic >> HMAC signing. It is I believe faster than public key private key >> because it uses a secret key and does not require public key >> provisioning like PKI would. Perhaps it would be a baseline way to >> sign the data. > > That should work for authenticating messages between (trusted) nodes. > Presumably the ipc.key value could be set in the Conf and all would be well. > > External job submitters shouldn't be given those keys; they'd need an > HTTP(S) front end that could authenticate them however the organisation > worked. > > Yes, that would be simpler. I am not enough of a security expert to say if > it will work, but the keys should be easier to work with. As long as the > configuration files are kept secure, your cluster will be locked. > > However, HDFS uses HTTP to serve blocks up -that needs to be locked down > too. Would the signing work there? > > -steve >