[ 
https://issues.apache.org/jira/browse/KAFKA-3665?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15408544#comment-15408544
 ] 

Ryan P commented on KAFKA-3665:
-------------------------------

[~junrao] yes I do think that SNI is still relevant despite the presence of the 
SAN certificate extension. Adding the VIP to each brokers SAN means that the 
client can establish a security context with any terminal endpoint which also 
contains the VIP hostname within the SAN extension. Since we cannot guarantee 
the identity of the terminal entity it sort of takes away from the idea of 
hostname verification.I personally prefer to take a more prudent approach with 
client/server authentication. I'm actually curious if the SAN extension is 
actually required at all in the wild. By default the Oracle JDK already 
leverages SNI so your VIP is likely passing the request along to the correct 
name based host to begin with. Disabling this functionality is actually a known 
workaround when dealing with dated software which is not compatible with the 
extension. 



> Default ssl.endpoint.identification.algorithm should be https
> -------------------------------------------------------------
>
>                 Key: KAFKA-3665
>                 URL: https://issues.apache.org/jira/browse/KAFKA-3665
>             Project: Kafka
>          Issue Type: Bug
>          Components: security
>    Affects Versions: 0.9.0.1, 0.10.0.0
>            Reporter: Ismael Juma
>            Assignee: Ismael Juma
>             Fix For: 0.10.1.0
>
>
> The default `ssl.endpoint.identification.algorithm` is `null` which is not a 
> secure default (man in the middle attacks are possible).
> We should probably use `https` instead. A more conservative alternative would 
> be to update the documentation instead of changing the default.
> A paper on the topic (thanks to Ryan Pridgeon for the reference): 
> http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to