[ https://issues.apache.org/jira/browse/HADOOP-10895?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14194994#comment-14194994 ]
Robert Kanter commented on HADOOP-10895: ---------------------------------------- [~tucu00], changing the default to not allow fallback will break anybody relying on that behavior. For example, the Oozie client. It would be okay if we had a config property to change it back, as this would allow the Oozie client to compile against this version of hadoop-auth and prior versions without any code changes. However, it looks like we can't do that, and a method will have to be called. This means that projects depending on this fallback behavior either have to stick to only an older version of hadoop-auth or only a newer version, which makes things more difficult. Why can't we keep the fallback enabled by default, and a method call to disable it? This shouldn't be a security problem because if you only want Kerberos, the server should only use the KerberosAuthenticationHandler, which IIRC, won't allow pseudo auth, even if the client falls back and tries to use it, right? > HTTP KerberosAuthenticator fallback should have a flag to disable it > -------------------------------------------------------------------- > > Key: HADOOP-10895 > URL: https://issues.apache.org/jira/browse/HADOOP-10895 > Project: Hadoop Common > Issue Type: Bug > Components: security > Affects Versions: 2.4.1 > Reporter: Alejandro Abdelnur > Assignee: Yongjun Zhang > Priority: Blocker > Attachments: HADOOP-10895.001.patch, HADOOP-10895.002.patch, > HADOOP-10895.003.patch, HADOOP-10895.004.patch > > > Per review feedback in HADOOP-10771, {{KerberosAuthenticator}} and the > delegation token version coming in with HADOOP-10771 should have a flag to > disable fallback to pseudo, similarly to the one that was introduced in > Hadoop RPC client with HADOOP-9698. -- This message was sent by Atlassian JIRA (v6.3.4#6332)