[ 
https://issues.apache.org/jira/browse/KAFKA-15273?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Manikumar resolved KAFKA-15273.
-------------------------------
    Fix Version/s: 3.7.0
       Resolution: Fixed

> Log common name of expired client certificate
> ---------------------------------------------
>
>                 Key: KAFKA-15273
>                 URL: https://issues.apache.org/jira/browse/KAFKA-15273
>             Project: Kafka
>          Issue Type: Improvement
>          Components: clients, core, security
>    Affects Versions: 3.6.0
>            Reporter: Eike Thaden
>            Assignee: Eike Thaden
>            Priority: Minor
>              Labels: PatchAvailable
>             Fix For: 3.7.0
>
>
> If a client tries to authenticate via mTLS with an expired certificate, the 
> connection is closed and the IP address of the connection attempt is logged. 
> However, in complex enterprise IT environments it might be very hard or even 
> impossible to identify which client tried to connect if only the IP address 
> is known (e.g. due to complex virtualization/containerization/NAT). This 
> results in significant effort for the Kafka platform teams to identify the 
> developmers responsible for such a misconfigured client.
> As a possible solution I propose to log the common name used in the client 
> certificate in addition to the IP address. Due to security considerations, 
> this should only be done if that certificate is just expired and would be 
> valid otherwise (e.g. signed by a known, non-expired root/intermediate CA). 
> The way Kafka should handle any valid/invalid/expired certificate must be 
> exactly the same as before, except for the creation of a log message in case 
> it is expired.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to