[ 
https://issues.apache.org/jira/browse/HADOOP-14146?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Daryn Sharp updated HADOOP-14146:
---------------------------------
    Attachment: HADOOP-14146.3.patch

[~drankye], thanks for your time!
# Added OID suffix.
# Changed exception message.
# The login module's main purpose is obtaining a TGT which initiators/clients 
require.  Acceptor services only need the secrets in the keytab.  The 
{{Keytab}} instance automatically loads the secrets.
# I'm not sure I understand the first part.
#* There's no need to pre-check for a keytab in the subject because the 
authenticator created an empty subject.  
#* Java's GSS implementations used in SASL and SPNEGO automatically look for a 
keytab instance. 
# While perhaps a good idea, it's unrelated to this patch and more suitable for 
another jira if someone wants to do it.

> KerberosAuthenticationHandler should authenticate with SPN in AP-REQ
> --------------------------------------------------------------------
>
>                 Key: HADOOP-14146
>                 URL: https://issues.apache.org/jira/browse/HADOOP-14146
>             Project: Hadoop Common
>          Issue Type: Bug
>          Components: security
>    Affects Versions: 2.5.0
>            Reporter: Daryn Sharp
>            Assignee: Daryn Sharp
>         Attachments: HADOOP-14146.1.patch, HADOOP-14146.2.patch, 
> HADOOP-14146.3.patch, HADOOP-14146.patch
>
>
> Many attempts (HADOOP-10158, HADOOP-11628, HADOOP-13565) have tried to add 
> multiple SPN host and/or realm support to spnego authentication.  The basic 
> problem is the server tries to guess and/or brute force what SPN the client 
> used.  The server should just decode the SPN from the AP-REQ.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to