Hi all,

Just a kind reminder. I would really appreciate if we could get two more
binding +1 votes.

Thanks

On Mon, Apr 8, 2024, 2:08 PM Manikumar <manikumar.re...@gmail.com> wrote:

> Thanks for the KIP.
>
> +1 (binding)
>
>
>
>
> On Mon, Apr 8, 2024 at 9:49 AM Kirk True <k...@kirktrue.pro> wrote:
> >
> > +1 (non-binding)
> >
> > Apologies. I thought I’d already voted :(
> >
> > > On Apr 7, 2024, at 10:48 AM, Nelson B. <bachmanity...@gmail.com>
> wrote:
> > >
> > > Hi all,
> > >
> > > Just wanted to bump up this thread for visibility.
> > >
> > > Thanks!
> > >
> > > On Thu, Mar 28, 2024 at 3:40 AM Doğuşcan Namal <
> namal.dogus...@gmail.com>
> > > wrote:
> > >
> > >> Thanks for checking it out Nelson. Yeah I think it makes sense to
> leave it
> > >> for the users who want to use it for testing.
> > >>
> > >> On Mon, 25 Mar 2024 at 20:44, Nelson B. <bachmanity...@gmail.com>
> wrote:
> > >>
> > >>> Hi Doğuşcan,
> > >>>
> > >>> Thanks for your vote!
> > >>>
> > >>> Currently, the usage of TLS depends on the protocol used by the
> > >>> authorization server which is configured
> > >>> through the "sasl.oauthbearer.token.endpoint.url" option. So, if the
> > >>> URL address uses simple http (not https)
> > >>> then secrets will be transmitted in plaintext. I think it's possible
> to
> > >>> enforce using only https but I think any
> > >>> production-grade authorization server uses https anyway and maybe
> users
> > >> may
> > >>> want to test using http in the dev environment.
> > >>>
> > >>> Thanks,
> > >>>
> > >>> On Thu, Mar 21, 2024 at 3:56 PM Doğuşcan Namal <
> namal.dogus...@gmail.com
> > >>>
> > >>> wrote:
> > >>>
> > >>>> Hi Nelson, thanks for the KIP.
> > >>>>
> > >>>> From the RFC:
> > >>>> ```
> > >>>> The authorization server MUST require the use of TLS as described in
> > >>>>   Section 1.6 when sending requests using password authentication.
> > >>>> ```
> > >>>>
> > >>>> I believe we already have an enforcement for OAuth to be enabled
> only
> > >> in
> > >>>> SSLChannel but would be good to double check. Sending secrets over
> > >>>> plaintext is a security bad practice :)
> > >>>>
> > >>>> +1 (non-binding) from me.
> > >>>>
> > >>>> On Tue, 19 Mar 2024 at 16:00, Nelson B. <bachmanity...@gmail.com>
> > >> wrote:
> > >>>>
> > >>>>> Hi all,
> > >>>>>
> > >>>>> I would like to start a vote on KIP-1025
> > >>>>> <
> > >>>>>
> > >>>>
> > >>>
> > >>
> https://cwiki.apache.org/confluence/display/KAFKA/KIP-1025%3A+Optionally+URL-encode+clientID+and+clientSecret+in+authorization+header
> > >>>>>> ,
> > >>>>> which would optionally URL-encode clientID and clientSecret in the
> > >>>>> authorization header.
> > >>>>>
> > >>>>> I feel like all possible issues have been addressed in the
> discussion
> > >>>>> thread.
> > >>>>>
> > >>>>> Thanks,
> > >>>>>
> > >>>>
> > >>>
> > >>
> >
>

Reply via email to