[ 
https://issues.apache.org/jira/browse/HADOOP-10850?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14077932#comment-14077932
 ] 

Daryn Sharp commented on HADOOP-10850:
--------------------------------------

Interesting.  Let me look into the jdk code too.  We had to remove 
AuthenticatedURL because it was causing all kinds of problems like replay 
attacks, retries when spnego failed for a completely valid reason, and 
fallbacks to the pseudo authenticator causing the same thing.

Speaking wrt to webhdfs, POST/PUT isn't a problem because the client explicitly 
does a "two-step write".  The redirect that actually does the POST/PUT to DN 
uses a token.  Kerberos isn't valid because the DN's DFSClient must have a 
token.  Webhdfs also specifically requests a token on the first call, and 
always uses it after that to avoid repeated spnego negotiations.

> KerberosAuthenticator should not do the SPNEGO handshake
> --------------------------------------------------------
>
>                 Key: HADOOP-10850
>                 URL: https://issues.apache.org/jira/browse/HADOOP-10850
>             Project: Hadoop Common
>          Issue Type: Bug
>          Components: security
>    Affects Versions: 2.4.1
>            Reporter: Alejandro Abdelnur
>            Assignee: Alejandro Abdelnur
>
> As mentioned in HADOOP-10453, the JDK automatically does a SPNEGO handshake 
> when opening a connection with a URL within a Kerberos login context, there 
> is no need to do the SPNEGO handshake in the {{KerberosAuthenticator}}, 
> simply extract the auth token (hadoop-auth cookie) and do the fallback if 
> necessary.



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to