Return-Path: X-Original-To: apmail-incubator-ambari-dev-archive@minotaur.apache.org Delivered-To: apmail-incubator-ambari-dev-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 48924F2D8 for ; Fri, 31 May 2013 01:42:21 +0000 (UTC) Received: (qmail 75876 invoked by uid 500); 31 May 2013 01:42:20 -0000 Delivered-To: apmail-incubator-ambari-dev-archive@incubator.apache.org Received: (qmail 75840 invoked by uid 500); 31 May 2013 01:42:20 -0000 Mailing-List: contact ambari-dev-help@incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: ambari-dev@incubator.apache.org Delivered-To: mailing list ambari-dev@incubator.apache.org Received: (qmail 75669 invoked by uid 99); 31 May 2013 01:42:20 -0000 Received: from arcas.apache.org (HELO arcas.apache.org) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 31 May 2013 01:42:20 +0000 Date: Fri, 31 May 2013 01:42:20 +0000 (UTC) From: "Siddharth Wagle (JIRA)" To: ambari-dev@incubator.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Updated] (AMBARI-2174) Eliminate cleartext LDAPS credentials from Ambari props files MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 [ https://issues.apache.org/jira/browse/AMBARI-2174?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Siddharth Wagle updated AMBARI-2174: ------------------------------------ Attachment: AMBARI-2174.patch > Eliminate cleartext LDAPS credentials from Ambari props files > ------------------------------------------------------------- > > Key: AMBARI-2174 > URL: https://issues.apache.org/jira/browse/AMBARI-2174 > Project: Ambari > Issue Type: Task > Components: controller > Affects Versions: 1.2.5 > Reporter: Siddharth Wagle > Assignee: Siddharth Wagle > Fix For: 1.2.5 > > Attachments: AMBARI-2174.patch > > > Observations: > - Currently we use the Java Keystore for storing server and agent SSL certificates. The keystore is a storage facility for cryptographic keys and certificates and is guarded by a password. > Presently what we do is generate a random 50 character long alphanumeric keystore password, the first time ambari starts with permissions 644. (should be 600) > {noformat} > -rw-r--r--. 1 root root 50 May 13 13:49 pass.txt > {noformat} > - Database password in ambari.properties, this is not clear text and is store in a file with appropriate ACL. > {noformat} > -rw-------. 1 root root 7 May 13 13:49 /etc/ambari-server/conf/password.dat > {noformat} > Need to discuss the flow of enabling LDAP access to Ambari in order to suggest a flexible approach. > Important considerations: > - Any cryptographic technique that requires encryption and decryption has understood weakness that the private key is protected by the appropriate ACL. Even if we encrypt passwords in the configuration files, the key used for achieving the encryption needs to be protected. > - One decent solution is, prompt the user for a passphrase and use the non-invertible secure digest (such as sha-1) of the password to lock the keystore. This same password can be used to encrypt LDAP credentials. In this approach we need to prompt the admin to provide the LDAP password when configuring a LDAP user for the first time and then write the encrypted password into the configuration file. Alternately, we can ask for the same during ambari-server setup, but that would be less flexible. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira