Mate Szalay-Beko created HBASE-25263:
----------------------------------------

             Summary: Change encryption key generation algorithm used in the 
HBase shell
                 Key: HBASE-25263
                 URL: https://issues.apache.org/jira/browse/HBASE-25263
             Project: HBase
          Issue Type: Improvement
          Components: encryption, shell
            Reporter: Mate Szalay-Beko
            Assignee: Mate Szalay-Beko


This ticket is a follow-up of HBASE-25181, where several issues were discussed 
on the PR:

1. Currently we use `PBKDF2WithHmacSHA1` key generation algorithm to generate a 
secret key for HFile / WalFile encryption, when the user is defining a string 
encryption key in the hbase shell. This algorithm is not secure enough and not 
allowed in certain environments (like on FIPS compliant clusters). Our plan is 
to change it to e.g.  `PBKDF2WithHmacSHA384`. If this would break backward 
compatibility, then we should make this algorithm configurable.

2. In `EncryptionUtil.createEncryptionContext` the various encryption config 
checks should throw IllegalStateExceptions instead of RuntimeExceptions.

3. Test cases in `TestEncryptionTest.java` should be broken down into smaller 
tests.

4. `TestEncryptionDisabled.java` should use `ExpectedException` JUnit rule to 
validate exceptions.





--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to