[ 
https://issues.apache.org/jira/browse/HADOOP-2239?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12579018#action_12579018
 ] 

Hadoop QA commented on HADOOP-2239:
-----------------------------------

-1 overall.  Here are the results of testing the latest attachment 
http://issues.apache.org/jira/secure/attachment/12377862/2239-2.patch
against trunk revision 619744.

    @author +1.  The patch does not contain any @author tags.

    tests included -1.  The patch doesn't appear to include any new or modified 
tests.
                        Please justify why no tests are needed for this patch.

    javadoc +1.  The javadoc tool did not generate any warning messages.

    javac +1.  The applied patch does not generate any new javac compiler 
warnings.

    release audit -1.  The applied patch generated 194 release audit warnings 
(more than the trunk's current 193 warnings).

    findbugs +1.  The patch does not introduce any new Findbugs warnings.

    core tests +1.  The patch passed core unit tests.

    contrib tests +1.  The patch passed contrib unit tests.

Test results: 
http://hudson.zones.apache.org/hudson/job/Hadoop-Patch/1969/testReport/
Findbugs warnings: 
http://hudson.zones.apache.org/hudson/job/Hadoop-Patch/1969/artifact/trunk/build/test/findbugs/newPatchFindbugsWarnings.html
Checkstyle results: 
http://hudson.zones.apache.org/hudson/job/Hadoop-Patch/1969/artifact/trunk/build/test/checkstyle-errors.html
Release audit warnings: 
http://hudson.zones.apache.org/hudson/job/Hadoop-Patch/1969/artifact/trunk/current/releaseAuditDiffWarnings.txt
Console output: 
http://hudson.zones.apache.org/hudson/job/Hadoop-Patch/1969/console

This message is automatically generated.

> Security:  Need to be able to encrypt Hadoop socket connections
> ---------------------------------------------------------------
>
>                 Key: HADOOP-2239
>                 URL: https://issues.apache.org/jira/browse/HADOOP-2239
>             Project: Hadoop Core
>          Issue Type: Bug
>          Components: dfs
>            Reporter: Allen Wittenauer
>            Assignee: Chris Douglas
>             Fix For: 0.17.0
>
>         Attachments: 2239-0.patch, 2239-1.patch, 2239-2.patch
>
>
> We need to be able to use hadoop over hostile networks, both internally and 
> externally to the enterpise.  While authentication prevents unauthorized 
> access, encryption should be used to prevent such things as packet snooping 
> across the wire.  This means that hadoop client connections, distcp, etc, 
> would use something such as SSL to protect the TCP/IP packets.  
> Post-Kerberos, it would be useful to use something similar to NFS's krb5p 
> option.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to