Return-Path: X-Original-To: apmail-hadoop-hdfs-issues-archive@minotaur.apache.org Delivered-To: apmail-hadoop-hdfs-issues-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 7BFBA914F for ; Thu, 23 Feb 2012 18:15:13 +0000 (UTC) Received: (qmail 57101 invoked by uid 500); 23 Feb 2012 18:15:13 -0000 Delivered-To: apmail-hadoop-hdfs-issues-archive@hadoop.apache.org Received: (qmail 57059 invoked by uid 500); 23 Feb 2012 18:15:13 -0000 Mailing-List: contact hdfs-issues-help@hadoop.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: hdfs-issues@hadoop.apache.org Delivered-To: mailing list hdfs-issues@hadoop.apache.org Received: (qmail 57051 invoked by uid 99); 23 Feb 2012 18:15:13 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 23 Feb 2012 18:15:13 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=5.0 tests=ALL_TRUSTED,T_RP_MATCHES_RCVD X-Spam-Check-By: apache.org Received: from [140.211.11.116] (HELO hel.zones.apache.org) (140.211.11.116) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 23 Feb 2012 18:15:10 +0000 Received: from hel.zones.apache.org (hel.zones.apache.org [140.211.11.116]) by hel.zones.apache.org (Postfix) with ESMTP id 0FE3C336EF4 for ; Thu, 23 Feb 2012 18:14:49 +0000 (UTC) Date: Thu, 23 Feb 2012 18:14:49 +0000 (UTC) From: "Suresh Srinivas (Updated) (JIRA)" To: hdfs-issues@hadoop.apache.org Message-ID: <1436891428.10724.1330020889066.JavaMail.tomcat@hel.zones.apache.org> In-Reply-To: <1614543137.10516.1330016688982.JavaMail.tomcat@hel.zones.apache.org> Subject: [jira] [Updated] (HDFS-3001) dfsadmin -refreshServiceAcl fails Kerb authentication with valid Kerb ticket, other subcommands succeed MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/HDFS-3001?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Suresh Srinivas updated HDFS-3001: ---------------------------------- Description: With a valid hdfs kerberos ticket, the dfsadmin subcommand '-refreshServiceAcl' still fails on Kerb authentication. Please see the comment for more details. was: With a valid hdfs kerberos ticket, the dfsadmin subcommand '-refreshServiceAcl' still fails on Kerb authentication with the following error: bash-3.2$ /home/share/hadoop/bin/hdfs --config /home/conf/hadoop/ dfsadmin -refreshServiceAcl refreshServiceAcl: User hdfs/USER@DOMAIN (auth:KERBEROS) is not authorized for protocol interface org.apache.hadoop.security.authorize.Refresh AuthorizationPolicyProtocol, expected client Kerberos principal is null However, other dfsadmin commands like '-printTopology', '-refreshNamenodes', '-safemode', '-report', which should use the same privilege level, do not give authentication errors and work successfully: -- kerb ticket -- bash-3.2$ klist -5 Ticket cache: FILE:/tmp/path/kbtickets/hdfs.kerberos.ticket Default principal: hdfs/USER@DOMAIN Valid starting Expires Service principal 01/18/12 23:59:53 01/19/12 23:59:53 krbtgt/USER@DOMAIN renew until 01/25/12 23:59:53 -- -printTopology subcommand -- bash-3.2$ /home/share/hadoop/bin/hdfs --config /home/conf/hadoop/ dfsadmin -printTopology Rack: /IPADDR1.0 IPADDR2.43:1004 (HOST1.com) IPADDR3.44:1004 (HOST2.com) IPADDRn.60:1004 (HOSTn.com) Rack: /default-rack HOSTr.com -- -refreshNamenodes subcommand -- bash-3.2$ /home/share/hadoop/bin/hdfs --config /home/conf/hadoop/ dfsadmin -fs hdfs://NNHOST:8020 -refreshNamenodes DNHOST:8020 bash-3.2$ echo $? 0 -- -safemode subcommand -- bash-3.2$ /home/share/hadoop/bin/hdfs --config /home/conf/hadoop/ dfsadmin -fs hdfs://NNHOST:8020 -safemode get Safe mode is OFF With a valid hdfs kerberos ticket, the dfsadmin subcommand '-refreshServiceAcl' still fails on Kerb authentication with the following error: bash-3.2$ /home/share/hadoop/bin/hdfs --config /home/conf/hadoop/ dfsadmin -refreshServiceAcl refreshServiceAcl: User hdfs/USER@DOMAIN (auth:KERBEROS) is not authorized for protocol interface org.apache.hadoop.security.authorize.Refresh AuthorizationPolicyProtocol, expected client Kerberos principal is null However, other dfsadmin commands like '-printTopology', '-refreshNamenodes', '-safemode', '-report', which should use the same privilege level, do not give authentication errors and work successfully: - kerb ticket - bash-3.2$ klist -5 Ticket cache: FILE:/tmp/path/kbtickets/hdfs.kerberos.ticket Default principal: hdfs/USER@DOMAIN Valid starting Expires Service principal 01/18/12 23:59:53 01/19/12 23:59:53 krbtgt/USER@DOMAIN renew until 01/25/12 23:59:53 - -printTopology subcommand - bash-3.2$ /home/share/hadoop/bin/hdfs --config /home/conf/hadoop/ dfsadmin -printTopology Rack: /IPADDR1.0 IPADDR2.43:1004 (HOST1.com) IPADDR3.44:1004 (HOST2.com) IPADDRn.60:1004 (HOSTn.com) Rack: /default-rack HOSTr.com - -refreshNamenodes subcommand - bash-3.2$ /home/share/hadoop/bin/hdfs --config /home/conf/hadoop/ dfsadmin -fs hdfs://NNHOST:8020 -refreshNamenodes DNHOST:8020 bash-3.2$ echo $? 0 - -safemode subcommand - bash-3.2$ /home/share/hadoop/bin/hdfs --config /home/conf/hadoop/ dfsadmin -fs hdfs://NNHOST:8020 -safemode get Safe mode is OFF > dfsadmin -refreshServiceAcl fails Kerb authentication with valid Kerb ticket, other subcommands succeed > ------------------------------------------------------------------------------------------------------- > > Key: HDFS-3001 > URL: https://issues.apache.org/jira/browse/HDFS-3001 > Project: Hadoop HDFS > Issue Type: Bug > Components: hdfs client > Affects Versions: 0.23.1 > Reporter: patrick white > > With a valid hdfs kerberos ticket, the dfsadmin subcommand '-refreshServiceAcl' still fails on Kerb authentication. Please see the comment for more details. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa For more information on JIRA, see: http://www.atlassian.com/software/jira