Tom James created HADOOP-13825:
----------------------------------

             Summary: KMSClientProvider is not using truststore and keystore 
provided in ssl-client.xml
                 Key: HADOOP-13825
                 URL: https://issues.apache.org/jira/browse/HADOOP-13825
             Project: Hadoop Common
          Issue Type: Bug
          Components: kms
    Affects Versions: 2.6.0
            Reporter: Tom James


When a KMSClientProvider is initialized it initializes a SSLFactory object with 
its own trust store and key store (if hadoop.ssl.require.client.cert=true). But 
during the course of execution, KMSClientProvider.createConnection gets called, 
which in turn calls KerberosDelegationTokenAuthenticator.authenticate(). Inside 
authenticate, conn = (HttpURLConnection) url.openConnection() gets called which 
uses an entirely different trust store (default trust store in JAVA_HOME; 
"/usr/java/jdk1.7.0_67-cloudera/jre/lib/security/jssecacerts" for me) and key 
store (null).
This initializes the JVM trust store and keystore to the aforementioned trust 
store and keystore. 

This is causing problems down the line since all the specific certificates 
(client, server, custom root certificates) are all in the trust store and 
keystore specified in ssl-client.

Please find attached the log.

PS:
hadoop version
Hadoop 2.6.0-cdh5.7.1
Subversion http://github.com/cloudera/hadoop -r 
ae44a8970a3f0da58d82e0fc65275fff8deabffd
Compiled by jenkins on 2016-06-01T23:25Z
Compiled with protoc 2.5.0
>From source with checksum 298b68dc3b308983f04cb37e8416f13
This command was run using /usr/lib/hadoop/hadoop-common-2.6.0-cdh5.7.1.jar




--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org
For additional commands, e-mail: common-issues-h...@hadoop.apache.org

Reply via email to