[ https://issues.apache.org/jira/browse/ACCUMULO-1009?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13778110#comment-13778110 ]
Christopher Tubbs commented on ACCUMULO-1009: --------------------------------------------- A better mechanism would be to leave the CA on one box (the master?) and have tservers generate certs and submit the public key to the master for signing. This can be automated to the same degree as the previous proposed implementation, and is far more secure. There's no reason to automate an bad method of key distribution, when a better mechanism offers the same level of convenience, and better security, with the same user experience (they still have to execute "init-ssl" on each box). This argument is not an argument against the target goal of convenience... it was simply an attempt at pointing out flaws in one possible implementation of that convenience feature. {quote}To break the system you describe, you would have to break into a node and find the client certificate. Having different client certificates has a better recovery strategy (invalidate that one certificate), but it isn't any better when it comes to an attacker attempting to undermine the system.{quote} To me, that seems like a huge change to the "security equation". {quote}I'm all for getting rid of secrets we do not need{quote} Getting SSL authentication to ZK is a harder task, and I see it as separate from this ticket (a sub-ticket, or related ticket, perhaps). We won't be able to get rid of the instance.secret until that's done (at least). I just worry that the previously proposed mechanism would create an additional (unnecessary) dependency on it. However, further discussions about the particular implementation of a certificate provisioning solution seems futile, though, until we can address whether provisioning should be included in the first place. If it is included, then we need to address whether it is sensible to do it with an additional dependency and custom code (rather than leverage the available tools already on the system and specifically designed for that purpose). > Support encryption over the wire > -------------------------------- > > Key: ACCUMULO-1009 > URL: https://issues.apache.org/jira/browse/ACCUMULO-1009 > Project: Accumulo > Issue Type: New Feature > Reporter: Keith Turner > Assignee: Michael Berman > Fix For: 1.6.0 > > Attachments: ACCUMULO-1009_thriftSsl.patch > > > Need to support encryption between ACCUMULO clients and servers. Also need > to encrypt communications between server and servers. > Basically need to make it possible for users to enable SSL+thrift. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira