[ 
https://issues.apache.org/jira/browse/HADOOP-8518?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13403111#comment-13403111
 ] 

Daryn Sharp commented on HADOOP-8518:
-------------------------------------

I'm by no means a SPNEGO expert, so perhaps this will be educational.  Won't 
the MiM server need to present a valid principal in the KDC for whom it will 
purport to be?  Won't the MiM server be unable to recover the TGT from the 
service ticket if the server lacks the keytab entry?  If true, isn't the system 
already very compromised?
                
> SPNEGO client side should use KerberosName rules
> ------------------------------------------------
>
>                 Key: HADOOP-8518
>                 URL: https://issues.apache.org/jira/browse/HADOOP-8518
>             Project: Hadoop Common
>          Issue Type: Improvement
>          Components: security
>    Affects Versions: 1.0.3, 2.0.0-alpha
>            Reporter: Alejandro Abdelnur
>            Assignee: Alejandro Abdelnur
>             Fix For: 1.1.0, 2.0.1-alpha
>
>
> currently KerberosName is used only on the server side to resolve the client 
> name, we should use it on the client side as well to resolve the server name 
> before getting the kerberos ticket.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

Reply via email to