[ 
https://issues.apache.org/jira/browse/HADOOP-9421?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13689451#comment-13689451
 ] 

Luke Lu commented on HADOOP-9421:
---------------------------------

Specifically:

bq. Re-introduces the roundtrip I removed for tokens and usable by other auths 
in the future

Not true. The initiate proto wrapped in rpc header is part of the connection 
header packet even though they're logically separate messages.

bq. Appears to add yet another roundtrip for non-token auths

Not true. See above.

bq. Completely removes the ability for the client to chose the best or most 
preferred auth

Not true. In fact the client initiate proto allows future auths without 
introduce new round-trip.

bq. Ruins pluggable auths because the client now requires specific logic to 
"guess" if it can do the new auth

Not true. initiate "allows" but not "requires" client specific logic, hence 
more extensible.

bq. Prevents elimination of token use_ip

Not applicable to any known token mechs: Digest-MD5 or SCRAM, as the former is 
always server initiated and the latter doesn't care.

bq. Prevents supporting tokens for multi-interface, multi-A record, or CNAMEs

Not true. Token auth don't care, see above. And the initiate proto is 
extensible for all kinds of auth metadata.

bq. Breaks my ability to add IP failover support

Not true. IP failover works with tokens as is and for Kerberos if server 
principal is shared among the servers for the same logical server. Can be 
extended to support insane cross server principal failover, while maintaining 
minimum round-trips in normal cases.

bq. Allows clients to do complete DOS attacks by tying up the socket 
indefinitely with initiates

Clients can already do the same by keeping RPC connections indefinitely. DoS is 
only significant if it requires client less resource to DoS a server, which is 
not the case.

In summary, your patch changes the major flow of the current RPC with a new 
negotiate round-trip except for a round-trip reduction hack for Digest-MD5 
tokens, since it disallows client to send any new auth metadata in the first 
packet. My patch is actually a (conceptually) small change to extend the 
capability to send arbitrary auth metadata in the first packet and allows 
server to intelligently respond with either challenge or negotiate, which 
allows round-trip optimization for all future auths besides Digest-MD5 tokens.


                
> Convert SASL to use ProtoBuf and add lengths for non-blocking processing
> ------------------------------------------------------------------------
>
>                 Key: HADOOP-9421
>                 URL: https://issues.apache.org/jira/browse/HADOOP-9421
>             Project: Hadoop Common
>          Issue Type: Sub-task
>    Affects Versions: 2.0.3-alpha
>            Reporter: Sanjay Radia
>            Assignee: Daryn Sharp
>            Priority: Blocker
>         Attachments: HADOOP-9421.patch, HADOOP-9421.patch, HADOOP-9421.patch, 
> HADOOP-9421.patch, HADOOP-9421.patch, HADOOP-9421.patch, HADOOP-9421.patch, 
> HADOOP-9421.patch, HADOOP-9421-v2-demo.patch
>
>


--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to