[ 
https://issues.apache.org/jira/browse/KNOX-188?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Kevin Minder updated KNOX-188:
------------------------------

    Description: URLs with encrypted query strings, which contain sensitive 
cluster internal info, fail to be decrypted by the gateway after a cluster 
topology is redeployed in the gateway instance.  Upon redeployment the password 
for encryptQueryString is being regenerated even though the credential store 
already exists for a given topology file (cluster). This must be changed to 
only generate if the alias doesn't already exist inside the credential store.  
This only affects Knox HA cluster deployments.  The effect will be that gateway 
instances will not be able to decrypt URLs generated by other gateway instances 
after fail-over if the password are not kept in sync after each topology 
deployment.  The workaround is to manually synchronize the content of the 
{GATEWAY_HOME}/conf/security folder after topology deployment changes.  (was: 
URLs with encrypted query strings which contain sensitive cluster internal info 
fail to be decrypted by the gateway after a cluster topology is redeployed in 
the gateway instance.
Upon redeployment the password for encryptQueryString is being regenerated even 
though the credential store already exists for a given topology file (cluster). 
This must be changed to only generate if the alias doesn't already exist inside 
the credential store. By not retaining previous values Knox cluster deployments 
(HA) which require the passwords to be in sync across gateway instances will 
not be and will create decryption problems across load balancing and failover.)

> encryptQueryString Password is Recreated when Topology is Changed.
> ------------------------------------------------------------------
>
>                 Key: KNOX-188
>                 URL: https://issues.apache.org/jira/browse/KNOX-188
>             Project: Apache Knox
>          Issue Type: Bug
>          Components: Server
>            Reporter: Maksim Kononenko
>            Assignee: Larry McCay
>             Fix For: 0.4.0
>
>
> URLs with encrypted query strings, which contain sensitive cluster internal 
> info, fail to be decrypted by the gateway after a cluster topology is 
> redeployed in the gateway instance.  Upon redeployment the password for 
> encryptQueryString is being regenerated even though the credential store 
> already exists for a given topology file (cluster). This must be changed to 
> only generate if the alias doesn't already exist inside the credential store. 
>  This only affects Knox HA cluster deployments.  The effect will be that 
> gateway instances will not be able to decrypt URLs generated by other gateway 
> instances after fail-over if the password are not kept in sync after each 
> topology deployment.  The workaround is to manually synchronize the content 
> of the {GATEWAY_HOME}/conf/security folder after topology deployment changes.



--
This message was sent by Atlassian JIRA
(v6.1#6144)

Reply via email to