[ 
https://issues.apache.org/jira/browse/CASSANDRA-1567?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12974645#action_12974645
 ] 

Nirmal Ranganathan commented on CASSANDRA-1567:
-----------------------------------------------

So for this I think we'll go with just all internode encryption with 
AES_128/256 in an either/or situation. Either all your cluster node transfers 
is encrypted or not. Based on if there's demand to have just cross DC encrypted 
we can update it at that point and if users want to configure encryption 
options. 

> Provide configurable encryption support for internode communication
> -------------------------------------------------------------------
>
>                 Key: CASSANDRA-1567
>                 URL: https://issues.apache.org/jira/browse/CASSANDRA-1567
>             Project: Cassandra
>          Issue Type: New Feature
>          Components: Core
>            Reporter: Nirmal Ranganathan
>            Assignee: Nirmal Ranganathan
>             Fix For: 0.7.1
>
>         Attachments: 0002-Configurable-internode-encryption-option.patch, 
> 0003-Default-Key-and-Certificate-for-internode-SSL.patch
>
>
> Provide the option to encrypt internode communication. The initial thought is 
> to use JSSE 
> (http://download.oracle.com/javase/6/docs/technotes/guides/security/jsse/JSSERefGuide.html)
>  to wrap the existing ServerSocket & Sockets. This will only be an optional 
> configuration and not enabled by default. The defaults would be TLS V1, RSA 
> 1024-bit keys for handshake and SSL_RSA_WITH_RC4_128_MD5 as the cipher suite. 
> Although this can be made configurable if the need arises. 

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to