[ 
https://issues.apache.org/jira/browse/CASSANDRA-5120?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13588879#comment-13588879
 ] 

Ryan McGuire commented on CASSANDRA-5120:
-----------------------------------------

Given that cqlsh doesn't have the capability to use client certificates, I was 
curious if I could jury rig it through stunnel. Looks like it works.

My stunnel config:

{code}
client = yes
cert = client.pem
foreground = yes
debug = 7
pid = /tmp/stunnel-client.pid

[cqlsh]
accept = 9161
connect = 127.0.0.1:9160
{code}

This creates a clear text port 9161 that tunnels through to cassandra's SSL 
encrypted port 9160. You start stunnel with that config and then use cqlsh 
connecting to port 9161:

{code}
$ CQLSH_PORT=9161 cqlsh
Connected to ssl at 127.0.0.1:9161.
[cqlsh 2.3.0 | Cassandra 1.2.2-SNAPSHOT | CQL spec 3.0.0 | Thrift protocol 
19.35.0]
Use HELP for help.
cqlsh> 
{code}
                
> Add support for SSL sockets to use client certificate authentication.
> ---------------------------------------------------------------------
>
>                 Key: CASSANDRA-5120
>                 URL: https://issues.apache.org/jira/browse/CASSANDRA-5120
>             Project: Cassandra
>          Issue Type: Improvement
>          Components: Core
>    Affects Versions: 1.2.0
>            Reporter: Steven Franklin
>            Assignee: Aleksey Yeschenko
>            Priority: Minor
>             Fix For: 1.2.1
>
>         Attachments: trunk-5120.txt
>
>
> Add an option to EncryptionOptions to require client certication 
> authentication.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to