[ 
https://issues.apache.org/jira/browse/HADOOP-11726?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14367811#comment-14367811
 ] 

Haohui Mai commented on HADOOP-11726:
-------------------------------------

Here are a list of proposed approaches that I'm aware of. [~atm], please feel 
free to chime in if I miss anything.


* Fix all FileSystem implementations so that they continue to proceed if they 
fail to obtain a delegation token from the remote cluster (HDFS-6776). The 
advantage is that it is easy to implement in {{WebHdfsFileSystem}}. The 
disadvantage is that it prohibits security-sensitive applications to enforce 
some security policy. For example, implementing a secure distcp application 
that can only write to secure clusters on top of these FileSystem become 
impossible.

* Fix all applications that need to this type of integration (proposed in the 
discussion of HDFS-6776). The application can ignore the DT isssues  and 
continue to proceed. The advantage is that application has more information to 
make this informed decisions (again, think of the secure distcp use case).  The 
disadvantage is that the application itself needs to be fixed.

* Issue a dummy delegation token in insecure clusters (proposed in the 
discussion of HDFS-6776). It changes the server implementation to issue a dummy 
delegation token when the server is in insecure mode. The advantage is that 
neither the applications nor the FileSystem need to be changed. The 
disadvantage is that older versions of server might need to be upgraded to 
enable this fix, though it can be mitigated by using a proxy as suggested in 
HDFS-6776.



> Allow applications to access both secure and insecure clusters at the same 
> time
> -------------------------------------------------------------------------------
>
>                 Key: HADOOP-11726
>                 URL: https://issues.apache.org/jira/browse/HADOOP-11726
>             Project: Hadoop Common
>          Issue Type: Bug
>            Reporter: Haohui Mai
>
> Today there are multiple integration issues when an application 
> (particularly, distcp) access both secure and insecure clusters (e.g., 
> HDFS-6776 / HDFS-7036)
> There are four use cases in this scenario:
> * Secure <-> Secure. Works.
> * Insecure <-> Insecure. Works.
> * Accessing secure clusters from insecure client. Will not work as expected. 
> The insecure client won't be able to be authenticated with the secure client, 
> otherwise it is a security vulnerability.
> * Accessing insecure clusters from secure client. Currently it will not work 
> as the secure client won't be able to obtain a delegation token from the 
> insecure cluster.
> This jira proposes to fix the last use case.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to