[ 
https://issues.apache.org/jira/browse/HDFS-2264?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13479692#comment-13479692
 ] 

Aaron T. Myers commented on HDFS-2264:
--------------------------------------

Hi Jitendra, I think that long term it may make sense to extensively change the 
protocol authorization system to support multiple expected client principal 
names and/or groups, but a change like that seems like overkill to address this 
particular issue.

I think that being able to configure multiple expected client principal names 
in the annotation still doesn't address the issue of the balancer, which could 
conceivably be run from any node in the cluster. All that should be required to 
run the balancer, and hence access this interface, is super user privileges, 
hence my suggestion to remove the clientPrincipal annotation entirely from the 
NamenodeProtocol, and just ensure that all the operations check for super user 
privileges. Would you be OK with that solution for this particular issue?
                
> NamenodeProtocol has the wrong value for clientPrincipal in KerberosInfo 
> annotation
> -----------------------------------------------------------------------------------
>
>                 Key: HDFS-2264
>                 URL: https://issues.apache.org/jira/browse/HDFS-2264
>             Project: Hadoop HDFS
>          Issue Type: Bug
>          Components: name-node
>    Affects Versions: 0.23.0
>            Reporter: Aaron T. Myers
>            Assignee: Harsh J
>             Fix For: 0.24.0
>
>         Attachments: HDFS-2264.r1.diff
>
>
> The {{@KerberosInfo}} annotation specifies the expected server and client 
> principals for a given protocol in order to look up the correct principal 
> name from the config. The {{NamenodeProtocol}} has the wrong value for the 
> client config key. This wasn't noticed because most setups actually use the 
> same *value* for for both the NN and 2NN principals ({{hdfs/_HOST@REALM}}), 
> in which the {{_HOST}} part gets replaced at run-time. This bug therefore 
> only manifests itself on secure setups which explicitly specify the NN and 
> 2NN principals.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to