[
https://issues.apache.org/jira/browse/HIVE-4232?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13621823#comment-13621823
]
Prasad Mujumdar commented on HIVE-4232:
---------------------------------------
[~ashutoshc] thanks for the feedback.
Here are a couple of things to consider. Thrift SASL transport doesn't detect
if the other peer is not using the SASL transport
([THRIFT-1774|https://issues.apache.org/jira/browse/THRIFT-1774]). Hence if the
hiveserver and client are not using the same transport then the connection
simply hangs. Hence its using SASL transport as default and NOSASL is more of a
backdoor if you are using some non-java bindings that doesn't have thrift sasl
transport (and hence not listed in the hive-defaults).
IMO making non-sasl as default will lead to more problems than what it intends
to solve. For an end user , it doesn't matter what underlying authentication
libraries are used for the implementation. The normal authentication options
None, LDAP, Kerberos and Custom are self explanatory from point of view.
> JDBC2 HiveConnection has odd defaults
> -------------------------------------
>
> Key: HIVE-4232
> URL: https://issues.apache.org/jira/browse/HIVE-4232
> Project: Hive
> Issue Type: Bug
> Components: HiveServer2, JDBC
> Affects Versions: 0.11.0
> Reporter: Chris Drome
> Assignee: Chris Drome
> Fix For: 0.11.0
>
> Attachments: HIVE-4232-1.patch, HIVE-4232.patch
>
>
> HiveConnection defaults to using a plain SASL transport if auth is not set.
> To get a raw transport auth must be set to noSasl; furthermore noSasl is case
> sensitive. Code tries to infer Kerberos or plain authentication based on the
> presence of principal. There is no provision for specifying QOP level.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira