[ 
https://issues.apache.org/jira/browse/CASSANDRA-13404?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15955710#comment-15955710
 ] 

Jason Brown commented on CASSANDRA-13404:
-----------------------------------------

To back up and add a bit more context (for myself, if anything), where do you 
want to add the additional hostname verification? Can you explain the specific 
behavior you're looking to add? The attached patch adds hostname verification 
on the server-side, where we listen for client connections. Adding hostname 
verification to the server-side of a TLS connection doesn't make much sense 
without requiring client auth, correct? Further, this would require the 
database server to know *all* of the possible peers that would want to connect 
to it, before the process starts.

Please let me know if I'm misunderstanding something here.

Also, I've spoken with the netty developers, and they said netty currently does 
not support  (in either netty 4.0 or 4.1) the ability to perform hostname 
verification on the server side (either openssl or jdk ssl). Thus, I'm not sure 
how you verified your patch behaves correctly.



> Hostname verification for client-to-node encryption
> ---------------------------------------------------
>
>                 Key: CASSANDRA-13404
>                 URL: https://issues.apache.org/jira/browse/CASSANDRA-13404
>             Project: Cassandra
>          Issue Type: New Feature
>            Reporter: Jan Karlsson
>            Assignee: Jan Karlsson
>             Fix For: 4.x
>
>         Attachments: 13404-trunk.txt
>
>
> Similarily to CASSANDRA-9220, Cassandra should support hostname verification 
> for client-node connections.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Reply via email to