[jira] [Commented] (FLINK-11088) Improve Kerberos Authentication using Keytab in YARN proxy user mode

2018-12-14 Thread Rong Rong (JIRA)


[ 
https://issues.apache.org/jira/browse/FLINK-11088?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16721857#comment-16721857
 ] 

Rong Rong commented on FLINK-11088:
---

I further dig into the details on the document on Hadoop side and seems like 
there are 3 recommended way of distributing credentials to secure long running 
service on YARN. See here: 
https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YarnApplicationSecurity.html#Securing_Long-lived_YARN_Services.

I am not sure whether this applies to other cluster resource management system, 
but I think it is worthwhile to take a look. For one: the current way of 
letting all JM and TMs renews keytab with KDC seems to be a problem. If we can 
have AM or JM renewing with keytab credential and distribute them via 
delegation token to all TMs it will release lots of loads on KDC server.

I will start drafting a simple discussion doc if the community thinks this is 
worth to dig deeper. Any thoughts [~till.rohrmann] [~aljoscha] ?

> Improve Kerberos Authentication using Keytab in YARN proxy user mode
> 
>
> Key: FLINK-11088
> URL: https://issues.apache.org/jira/browse/FLINK-11088
> Project: Flink
>  Issue Type: Improvement
>  Components: Security, YARN
>Reporter: Rong Rong
>Assignee: Rong Rong
>Priority: Major
>
> Currently flink-yarn assumes keytab is shipped as application master 
> environment local resource on client side and will be distributed to all the 
> TMs. This does not work for YARN proxy user mode [1] since proxy user or 
> super user might not have access to actual users' keytab, but can request 
> delegation tokens on users' behalf. 
> Based on the type of security options for long-living YARN service[2], we 
> propose to have the keytab file path discovery configurable depending on the 
> launch mode of the YARN client. 
> Reference: 
> [1] 
> https://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html
> [2] 
> https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YarnApplicationSecurity.html#Securing_Long-lived_YARN_Services



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (FLINK-11088) Improve Kerberos Authentication using Keytab in YARN proxy user mode

2018-12-09 Thread Rong Rong (JIRA)


[ 
https://issues.apache.org/jira/browse/FLINK-11088?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16714128#comment-16714128
 ] 

Rong Rong commented on FLINK-11088:
---

Initial investigation needs to find a way to distinguish between the two types 
of authentication method: Keytab and Delegation token.
However, since delegation tokens normally expires within a week, see: 
https://ci.apache.org/projects/flink/flink-docs-release-1.6/ops/security-kerberos.html#using-kinit-yarn-only,
 there should've been a configurable API to specify the way to pass over the 
Kerberos keytab to YARN application master. 

The proposal consists of several combination of scenarios:
1. Delegation token only - Cluster is short living. No keytab file
2. Delegation token on launch - Cluster can be long living if keytab file was 
supplied, or keytab acquisition method is defined.
3. Keytab on launch - Cluster is long living, Keytab is passed as YARN local 
resource (current method)

Please comment if you think there's any other ways of authenticating Flink app. 

> Improve Kerberos Authentication using Keytab in YARN proxy user mode
> 
>
> Key: FLINK-11088
> URL: https://issues.apache.org/jira/browse/FLINK-11088
> Project: Flink
>  Issue Type: Improvement
>  Components: Security, YARN
>Reporter: Rong Rong
>Assignee: Rong Rong
>Priority: Major
>
> Currently flink-yarn assumes keytab is shipped as application master 
> environment local resource on client side and will be distributed to all the 
> TMs. This does not work for YARN proxy user mode since proxy user or super 
> user does not have access to actual user's keytab but only delegation tokens. 
> We propose to have the keytab file path discovery configurable depending on 
> the launch mode of the YARN client. 
> Reference: 
> https://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)