[ https://issues.apache.org/jira/browse/HBASE-14700?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14978847#comment-14978847 ]
Andrew Purtell commented on HBASE-14700: ---------------------------------------- The patch lgtm. I like the new metric. I can see why you might want this at TRACE level but I'd actually suggest WARN. Suggest also recording the user in this log line. Will be a PITA when the envisioned migration begins with most clients only capable of simple auth but very useful once there are just a handful of stragglers and every instance of this log line will be actionable. {code} 1530 if (allowFallbackToSimpleAuth) { 1531 metrics.authenticationFallback(); 1532 if (LOG.isTraceEnabled()) { 1533 LOG.trace("Falling back to SIMPLE auth for connection from " + getHostAddress()); 1534 } 1535 } else { {code} If we have fallbacks enabled both on client and server, then would it be the case if Kerberos auth fails we'd get a successful negotiation with SIMPLE auth, and with an audit record in the log and increment of relevant metric? That could also be useful in some settings. > Support a "permissive" mode for secure clusters to allow "simple" auth clients > ------------------------------------------------------------------------------ > > Key: HBASE-14700 > URL: https://issues.apache.org/jira/browse/HBASE-14700 > Project: HBase > Issue Type: Improvement > Components: security > Reporter: Gary Helmling > Assignee: Gary Helmling > Fix For: 2.0.0 > > Attachments: HBASE-14700-v2.patch, HBASE-14700.patch > > > When implementing HBase security for an existing cluster, it can be useful to > support mixed secure and insecure clients while all client configurations are > migrated over to secure authentication. > We currently have an option to allow secure clients to fallback to simple > auth against insecure clusters. By providing an analogous setting for > servers, we would allow a phased rollout of security: > # First, security can be enabled on the cluster servers, with the > "permissive" mode enabled > # Clients can be converting to using secure authentication incrementally > # The server audit logs allow identification of clients still using simple > auth to connect > # Finally, when sufficient clients have been converted to secure operation, > the server-side "permissive" mode can be removed, allowing completely secure > operation. > Obviously with this enabled, there is no effective access control, but this > would still be a useful tool to enable a smooth operational rollout of > security. Permissive mode would of course be disabled by default. Enabling > it should provide a big scary warning in the logs on startup, and possibly be > flagged on relevant UIs. -- This message was sent by Atlassian JIRA (v6.3.4#6332)