[
https://issues.apache.org/jira/browse/KAFKA-3987?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17930539#comment-17930539
]
jeri jose commented on KAFKA-3987:
----------------------------------
To align with FIPS 140-3 compliance requirements, MD5 should be replaced with a
FIPS-approved cryptographic algorithm. The Kafka log cleaner currently enforces
MD5 as the default hash algorithm in SkimpyOffsetMap, even though
SkimpyOffsetMap already supports alternatives like SHA-256.
Since FIPS 140-3 mandates stronger cryptographic standards, updating the
default hash algorithm to a FIPS-compliant option ensures better security and
regulatory compliance while still allowing users to override it if needed.
[GitHub Pull Request #19035|https://github.com/apache/kafka/pull/19035]
> Allow configuration of the hash algorithm used by the LogCleaner's offset map
> -----------------------------------------------------------------------------
>
> Key: KAFKA-3987
> URL: https://issues.apache.org/jira/browse/KAFKA-3987
> Project: Kafka
> Issue Type: Improvement
> Components: config
> Reporter: Luciano Afranllie
> Priority: Major
> Labels: needs-kip
>
> In order to be able to do deployments of Kafka that are FIPS 140-2
> (https://en.wikipedia.org/wiki/FIPS_140-2) complaint one of the requirements
> is not to use MD5.
> Kafka is using MD5 to hash message keys in the offset map (SkimpyOffsetMap)
> used by the log cleaner.
> The idea is to be able to configure this hash algorithm to something allowed
> by FIPS using a new configuration property.
> The property could be named "log.cleaner.hash.algorithm" with a default value
> equal to "MD5" and the idea is to use it in the constructor of CleanerConfig.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)