[ 
https://issues.apache.org/jira/browse/DRILL-4280?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15879506#comment-15879506
 ] 

ASF GitHub Bot commented on DRILL-4280:
---------------------------------------

Github user sudheeshkatkam commented on a diff in the pull request:

    https://github.com/apache/drill/pull/578#discussion_r102605579
  
    --- Diff: 
exec/java-exec/src/main/java/org/apache/drill/exec/rpc/security/AuthenticationOutcomeListener.java
 ---
    @@ -0,0 +1,238 @@
    +/**
    + * Licensed to the Apache Software Foundation (ASF) under one
    + * or more contributor license agreements.  See the NOTICE file
    + * distributed with this work for additional information
    + * regarding copyright ownership.  The ASF licenses this file
    + * to you under the Apache License, Version 2.0 (the
    + * "License"); you may not use this file except in compliance
    + * with the License.  You may obtain a copy of the License at
    + *
    + *    http://www.apache.org/licenses/LICENSE-2.0
    + *
    + * Unless required by applicable law or agreed to in writing, software
    + * distributed under the License is distributed on an "AS IS" BASIS,
    + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    + * See the License for the specific language governing permissions and
    + * limitations under the License.
    + */
    +package org.apache.drill.exec.rpc.security;
    +
    +import com.google.common.collect.ImmutableMap;
    +import com.google.common.collect.Maps;
    +import com.google.protobuf.ByteString;
    +import com.google.protobuf.Internal.EnumLite;
    +import com.google.protobuf.MessageLite;
    +import io.netty.buffer.ByteBuf;
    +import org.apache.drill.exec.proto.UserBitShared.SaslMessage;
    +import org.apache.drill.exec.proto.UserBitShared.SaslStatus;
    +import org.apache.drill.exec.rpc.BasicClient;
    +import org.apache.drill.exec.rpc.ClientConnection;
    +import org.apache.drill.exec.rpc.RpcException;
    +import org.apache.drill.exec.rpc.RpcOutcomeListener;
    +import org.apache.hadoop.security.UserGroupInformation;
    +
    +import javax.security.sasl.SaslClient;
    +import javax.security.sasl.SaslException;
    +import java.io.IOException;
    +import java.lang.reflect.UndeclaredThrowableException;
    +import java.security.PrivilegedExceptionAction;
    +import java.util.EnumMap;
    +import java.util.Map;
    +
    +import static com.google.common.base.Preconditions.checkNotNull;
    +
    +public class AuthenticationOutcomeListener<T extends EnumLite, R extends 
ClientConnection,
    +    HANDSHAKE_SEND extends MessageLite, HANDSHAKE_RESPONSE extends 
MessageLite>
    +    implements RpcOutcomeListener<SaslMessage> {
    +  private static final org.slf4j.Logger logger =
    +      
org.slf4j.LoggerFactory.getLogger(AuthenticationOutcomeListener.class);
    +
    +  private static final ImmutableMap<SaslStatus, SaslChallengeProcessor> 
CHALLENGE_PROCESSORS;
    +  static {
    +    final Map<SaslStatus, SaslChallengeProcessor> map = new 
EnumMap<>(SaslStatus.class);
    +    map.put(SaslStatus.SASL_IN_PROGRESS, new SaslInProgressProcessor());
    +    map.put(SaslStatus.SASL_SUCCESS, new SaslSuccessProcessor());
    +    map.put(SaslStatus.SASL_FAILED, new SaslFailedProcessor());
    +    CHALLENGE_PROCESSORS = Maps.immutableEnumMap(map);
    +  }
    +
    +  private final BasicClient<T, R, HANDSHAKE_SEND, HANDSHAKE_RESPONSE> 
client;
    +  private final R connection;
    +  private final T saslRpcType;
    +  private final UserGroupInformation ugi;
    +  private final RpcOutcomeListener<?> rpcOutcomeListener;
    +
    +  public AuthenticationOutcomeListener(BasicClient<T, R, HANDSHAKE_SEND, 
HANDSHAKE_RESPONSE> client,
    +                                       R connection, T saslRpcType, 
UserGroupInformation ugi,
    +                                       RpcOutcomeListener<?> 
rpcOutcomeListener) {
    +    this.client = client;
    +    this.connection = connection;
    +    this.saslRpcType = saslRpcType;
    +    this.ugi = ugi;
    +    this.rpcOutcomeListener = rpcOutcomeListener;
    +  }
    +
    +  public void initiate(final String mechanismName) {
    +    logger.trace("Initiating SASL exchange.");
    +    try {
    +      final ByteString responseData;
    +      final SaslClient saslClient = connection.getSaslClient();
    +      if (saslClient.hasInitialResponse()) {
    +        responseData = ByteString.copyFrom(evaluateChallenge(ugi, 
saslClient, new byte[0]));
    +      } else {
    +        responseData = ByteString.EMPTY;
    +      }
    +      client.send(new AuthenticationOutcomeListener<>(client, connection, 
saslRpcType, ugi, rpcOutcomeListener),
    +          connection,
    +          saslRpcType,
    +          SaslMessage.newBuilder()
    +              .setMechanism(mechanismName)
    +              .setStatus(SaslStatus.SASL_START)
    +              .setData(responseData)
    +              .build(),
    +          SaslMessage.class,
    +          true /** the connection will not be backed up at this point */);
    +      logger.trace("Initiated SASL exchange.");
    +    } catch (final Exception e) {
    +      rpcOutcomeListener.failed(RpcException.mapException(e));
    +    }
    +  }
    +
    +  @Override
    +  public void failed(RpcException ex) {
    +    rpcOutcomeListener.failed(RpcException.mapException(ex));
    +  }
    +
    +  @Override
    +  public void success(SaslMessage value, ByteBuf buffer) {
    +    logger.trace("Server responded with message of type: {}", 
value.getStatus());
    +    final SaslChallengeProcessor processor = 
CHALLENGE_PROCESSORS.get(value.getStatus());
    +    if (processor == null) {
    +      rpcOutcomeListener.failed(RpcException.mapException(
    +          new SaslException("Server sent a corrupt message.")));
    +    } else {
    +      try {
    +        final SaslChallengeContext context = new 
SaslChallengeContext(value, connection.getSaslClient(), ugi);
    +
    +        final SaslMessage saslResponse = processor.process(context);
    +
    +        if (saslResponse != null) {
    +          client.send(new AuthenticationOutcomeListener<>(client, 
connection, saslRpcType, ugi, rpcOutcomeListener),
    +              connection, saslRpcType, saslResponse, SaslMessage.class,
    +              true /** the connection will not be backed up at this point 
*/);
    +        } else {
    +          // success
    +          rpcOutcomeListener.success(null, null);
    +        }
    +      } catch (final Exception e) {
    +        rpcOutcomeListener.failed(RpcException.mapException(e));
    +      }
    +    }
    +  }
    +
    +  @Override
    +  public void interrupted(InterruptedException e) {
    +    rpcOutcomeListener.interrupted(e);
    +  }
    +
    +  private static class SaslChallengeContext {
    +
    +    final SaslMessage challenge;
    +    final SaslClient saslClient;
    +    final UserGroupInformation ugi;
    +
    +    public SaslChallengeContext(SaslMessage challenge, SaslClient 
saslClient, UserGroupInformation ugi) {
    +      this.challenge = checkNotNull(challenge);
    +      this.saslClient = checkNotNull(saslClient);
    +      this.ugi = checkNotNull(ugi);
    +    }
    +  }
    +
    +  private interface SaslChallengeProcessor {
    +
    +    /**
    +     * Process challenge from server, and return a response.
    +     *
    +     * Returns null iff SASL exchange is complete and successful.
    +     *
    +     * @param context challenge context
    +     * @return response
    +     * @throws Exception
    +     */
    +    SaslMessage process(SaslChallengeContext context) throws Exception;
    +
    +  }
    +
    +  private static class SaslInProgressProcessor implements 
SaslChallengeProcessor {
    +
    +    @Override
    +    public SaslMessage process(SaslChallengeContext context) throws 
Exception {
    +      final SaslMessage.Builder response = SaslMessage.newBuilder();
    +
    +      final byte[] responseBytes = evaluateChallenge(context.ugi, 
context.saslClient,
    +          context.challenge.getData().toByteArray());
    +
    +      final boolean isComplete = context.saslClient.isComplete();
    +      logger.trace("Evaluated challenge. Completed? {}.", isComplete);
    +      response.setData(responseBytes != null ? 
ByteString.copyFrom(responseBytes) : ByteString.EMPTY);
    +      // if isComplete, the client will get one more response from server
    +      response.setStatus(isComplete ? SaslStatus.SASL_SUCCESS : 
SaslStatus.SASL_IN_PROGRESS);
    +      return response.build();
    +    }
    +  }
    +
    +  private static class SaslSuccessProcessor implements 
SaslChallengeProcessor {
    +
    +    @Override
    +    public SaslMessage process(SaslChallengeContext context) throws 
Exception {
    +      if (context.saslClient.isComplete()) {
    +        logger.trace("Successfully authenticated to server using {}", 
context.saslClient.getMechanismName());
    +        // setup security layers here..
    +        return null;
    +      } else {
    +
    +        // server completed before client; so try once, fail otherwise
    +        evaluateChallenge(context.ugi, context.saslClient,
    +            context.challenge.getData().toByteArray()); // discard response
    +
    +        if (context.saslClient.isComplete()) {
    +          logger.trace("Successfully authenticated to server using {}", 
context.saslClient.getMechanismName());
    +          // setup security layers here..
    +          return null;
    --- End diff --
    
    Looks like DRILL-4335 is requesting for TLS. But encryption via SASL is 
also possible using [wrap and 
unwrap](https://docs.oracle.com/javase/7/docs/api/javax/security/sasl/SaslServer.html#unwrap(byte[],%20int,%20int))
 functions, if "quality of protection" is "auth-conf" (confidentiality). The 
differences are [nicely noted 
here](http://stackoverflow.com/questions/11347304/security-authentication-ssl-vs-sasl).
    
    I do not see any open tickets for encryption using SASL, but that should be 
a sub-task of [DRILL-291](https://issues.apache.org/jira/browse/DRILL-291).


> Kerberos Authentication
> -----------------------
>
>                 Key: DRILL-4280
>                 URL: https://issues.apache.org/jira/browse/DRILL-4280
>             Project: Apache Drill
>          Issue Type: Improvement
>            Reporter: Keys Botzum
>            Assignee: Sudheesh Katkam
>              Labels: security
>
> Drill should support Kerberos based authentication from clients. This means 
> that both the ODBC and JDBC drivers as well as the web/REST interfaces should 
> support inbound Kerberos. For Web this would most likely be SPNEGO while for 
> ODBC and JDBC this will be more generic Kerberos.
> Since Hive and much of Hadoop supports Kerberos there is a potential for a 
> lot of reuse of ideas if not implementation.
> Note that this is related to but not the same as 
> https://issues.apache.org/jira/browse/DRILL-3584 



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Reply via email to