Mike, I was suggesting ON | OFF only for RBAC security, not for SSL 
configuration.  Any thoughts on that?

Anthony

> On Sep 9, 2016, at 9:44 AM, Michael Stolz <mst...@pivotal.io> wrote:
> 
> I think a reason that we might need to be less than all-or-nothing is for
> at least these two situations:
> 
> 1. a user who started out with SSL disabled, and now wants to enable it,
> but can't take a full global outage, so needs to get it enabled for the WAN
> first, and then for server-to-server and then for client/server.
> 
> 2. SSL enabled over the WAN because that is not a trusted network, but they
> can live without SSL for the server/server and client/server connections
> because they ARE in a trusted network and they don't need to pay the
> overhead for SSL on those links.
> 
> There are probably other scenarios as well, but these are the two that come
> to mind quickly.
> 
> 
> 
> --
> Mike Stolz
> Principal Engineer, GemFire Product Manager
> Mobile: 631-835-4771
> 
> On Fri, Sep 9, 2016 at 12:05 PM, Jinmei Liao <jil...@pivotal.io> wrote:
> 
>> That is my original thought as well. If we are protecting resources
>> (CLUSTER and DATA), it should be protected no matter which way user is
>> trying to access it. I guess I'll leave this to the PMs to decide.
>> 
>> On Thu, Sep 8, 2016 at 7:37 PM, Anthony Baker <aba...@pivotal.io> wrote:
>> 
>>> Udo, Kirk - this makes sense and thanks for the discussion to help
>> clarify
>>> the issue.
>>> 
>>> Regarding GEODE-1648, does it make sense to do at all?  That is, what if
>>> role-based access control is either ON | OFF instead of per component.
>> If
>>> we allow disabling RBAC for certain components, wouldn’t that make it
>>> possible to create a backdoor?  Could we start with a binary option and
>>> enable more granular control when requested by users?
>>> 
>>> Anthony
>>> 
>>>> On Sep 8, 2016, at 4:11 PM, Kirk Lund <kl...@pivotal.io> wrote:
>>>> 
>>>> +1 overall with some feedback...
>>>> 
>>>> 1) I think the list is reasonable with a few nitpicks below
>>>> 
>>>> 2) If these are Channels and not Components, then I would probably name
>>> it
>>>> SecurableChannels or SecurableCommunicationChannels or whatever.
>>>> 
>>>> 3) I'd prefer HTTP be renamed to Web or other non-protocol word -- HTTP
>>> is
>>>> a protocol and the names of the other channels are conceptual channels
>>>> rather than a protocol (the others use TCP/IP or RMI but we don't label
>>>> them as such). Or am I missing something here?
>>>> 
>>>> 4) JMX is probably ok. Currently we are using (and securing) JMX over
>> RMI
>>>> (javax.management.remote.rmi.RMIConnectorServer). There are other
>>>> connectors for JMX including HTTP (ex: mx4j.tools.adaptor.http.
>>> HttpAdaptor)
>>>> and SNMP (ex: com.sun.jmx.snmp.daemon.SnmpAdaptorServer). We only need
>>> JMX
>>>> over RMI for now, but would we add those others as new enums to
>>>> SecurableChannels later if we add anything like that to Geode? Or would
>>> we
>>>> try to group those all together under the name JMX? Or decide when the
>>> time
>>>> comes?
>>>> 
>>>> I think we should try to steer away from being overly controlled by
>> specs
>>>> especially for reasonable changes. We all follow agile process, so a
>>>> decision made one iteration could easily be undone or changed in the
>> next
>>>> iteration and most of us are following weekly iterations.
>>>> 
>>>> After a release anything exposed in a User API is very difficult to
>>> change
>>>> due to backwards compatibility constraints. I think we should be much
>>> more
>>>> careful with User APIs in Geode going forward to avoid some of the
>>> problems
>>>> we have with pre-existing Geode User APIs that we inherited.
>>>> 
>>>> -Kirk
>>>> 
>>>> On Thu, Sep 8, 2016 at 2:07 PM, Udo Kohlmeyer <ukohlme...@pivotal.io>
>>> wrote:
>>>> 
>>>>> As GEODE-420 deals with SSL comms configuration and GEODE-1648 with
>>>>> Authentication&Authorization I think we need to be careful in what is
>>>>> feasible and what is logical.
>>>>> 
>>>>> For SSL comms it was decided that the following components are
>> relevant
>>>>> [1] <https://cwiki.apache.org/confluence/display/GEODE/Revised+S
>>>>> SL+properties>:
>>>>> 
>>>>> * Locator => The comms channel between Locators + the initial comms
>>>>>  channel between clients and locator
>>>>> * Cluster => Internode comms channel (peer to peer)
>>>>> * Server => Client-server comms channel
>>>>> * Gateway => Comms channel between WAN Gateway senders/receivers
>>>>> * HTTP => Any HTTP comms. incl REST and Pulse
>>>>> * JMX => Any JMX comms
>>>>> 
>>>>> These components were selected as they seem to be logical boundaries
>> and
>>>>> communication interfaces.
>>>>> 
>>>>> I think the specialization of HTTP, for Authentication&Authorization
>> are
>>>>> functions of those interfaces:
>>>>> 
>>>>> * REST-admin
>>>>> * REST-dev
>>>>> * Pulse
>>>>> 
>>>>> I think that comms and functions exposed by those comms should not be
>>>>> mixed. I think that securing the comms channel is a factor of "trust".
>>> Do I
>>>>> implicitly trust the interface/system that I am connected to or are
>>>>> connecting to.
>>>>> 
>>>>> I think concepts like "management" is a concept in function. Do I
>> allow
>>> a
>>>>> user to access admin API's? The function of management should not
>>> determine
>>>>> if a system trusts another systems connection. When a new comms
>>> interface
>>>>> is added (say messaging), we want to be able to trust that comms
>>> channel.
>>>>> The "management" function should still work regardless of interface,
>> be
>>> it
>>>>> jmx,http/rest,prop tcp,messaging.
>>>>> 
>>>>> --Udo
>>>>> 
>>>>> [1]: https://cwiki.apache.org/confluence/display/GEODE/Revised+SS
>>>>> L+properties
>>>>> 
>>>>> 
>>>>> 
>>>>> On 9/09/2016 5:49 AM, Swapnil Bawaskar wrote:
>>>>> 
>>>>>> GEODE-1648 and GEODE-420 are both trying to add geode properties to
>>> secure
>>>>>> only some components.
>>>>>> GEODE-1648 is intending to add a property named
>>>>>> "security-enabled-components" that will allow users to turn off
>>>>>> authentication/authorization for some components
>>>>>> GEODE-420 is intending to add a property named
>> "ssl-enabled-components"
>>>>>> that will allow users to turn off ssl. for either client/server,
>>>>>> peer-to-peer or wan communication.
>>>>>> 
>>>>>> Since both deal with security, I think we should have the same list
>> of
>>>>>> components for these new geode properties. Intent of this thread is
>> to
>>>>>> arrive at a consensus on what these components are.
>>>>>> 
>>>>>> I would like to propose the following components:
>>>>>> Cluster => stands for peer-to-peer
>>>>>> Server => client/server and developer rest API
>>>>>> WAN => gateway sender/receiver
>>>>>> Management => jmx, admin-rest, pulse
>>>>>> 
>>>>>> Thanks!
>>>>>> Swapnil.
>>>>>> 
>>>>>> 
>>>>> 
>>> 
>>> 
>> 
>> 
>> --
>> Cheers
>> 
>> Jinmei
>> 

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

Reply via email to