[
https://issues.apache.org/jira/browse/HADOOP-2239?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12570832#action_12570832
]
Tsz Wo (Nicholas), SZE commented on HADOOP-2239:
------------------------------------------------
2239-0.patch: Codes are good. It even make the origin codes better. Below are
some comments
- It may not be good to store passwords in the config file. We should, at
least having a option, to let the user enter passwords in runtime (during
starting namenode, datanodes).
- need descriptions for new config properties
- need javadoc for protected members.
- need unit tests
> Security: Need to be able to encrypt Hadoop socket connections
> ---------------------------------------------------------------
>
> Key: HADOOP-2239
> URL: https://issues.apache.org/jira/browse/HADOOP-2239
> Project: Hadoop Core
> Issue Type: Bug
> Components: dfs
> Reporter: Allen Wittenauer
> Attachments: 2239-0.patch
>
>
> We need to be able to use hadoop over hostile networks, both internally and
> externally to the enterpise. While authentication prevents unauthorized
> access, encryption should be used to prevent such things as packet snooping
> across the wire. This means that hadoop client connections, distcp, etc,
> would use something such as SSL to protect the TCP/IP packets.
> Post-Kerberos, it would be useful to use something similar to NFS's krb5p
> option.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.