[
https://issues.apache.org/jira/browse/KAFKA-3665?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15408544#comment-15408544
]
Ryan P commented on KAFKA-3665:
-------------------------------
[~junrao] yes I do think that SNI is still relevant despite the presence of the
SAN certificate extension. Adding the VIP to each brokers SAN means that the
client can establish a security context with any terminal endpoint which also
contains the VIP hostname within the SAN extension. Since we cannot guarantee
the identity of the terminal entity it sort of takes away from the idea of
hostname verification.I personally prefer to take a more prudent approach with
client/server authentication. I'm actually curious if the SAN extension is
actually required at all in the wild. By default the Oracle JDK already
leverages SNI so your VIP is likely passing the request along to the correct
name based host to begin with. Disabling this functionality is actually a known
workaround when dealing with dated software which is not compatible with the
extension.
> Default ssl.endpoint.identification.algorithm should be https
> -------------------------------------------------------------
>
> Key: KAFKA-3665
> URL: https://issues.apache.org/jira/browse/KAFKA-3665
> Project: Kafka
> Issue Type: Bug
> Components: security
> Affects Versions: 0.9.0.1, 0.10.0.0
> Reporter: Ismael Juma
> Assignee: Ismael Juma
> Fix For: 0.10.1.0
>
>
> The default `ssl.endpoint.identification.algorithm` is `null` which is not a
> secure default (man in the middle attacks are possible).
> We should probably use `https` instead. A more conservative alternative would
> be to update the documentation instead of changing the default.
> A paper on the topic (thanks to Ryan Pridgeon for the reference):
> http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)