Ismael,

1. Jun had suggested added the full list of SHA-nnn in the [DISCUSS]
thread. I am ok with limiting to a smaller number if required.

3. Added a section on security considerations to the KIP.

Thank you,

Rajini

On Thu, Dec 1, 2016 at 4:22 PM, Ismael Juma <ism...@juma.me.uk> wrote:

> Hi Rajini,
>
> Sorry for the delay. For some reason, both of your replies (for this and
> KIP-85) were marked as spam by Gmail. Comments inline.
>
> On Mon, Nov 28, 2016 at 3:47 PM, Rajini Sivaram <
> rajinisiva...@googlemail.com> wrote:
> >
> > 1. I think you had asked earlier for SCRAM-SHA-1 to be removed since it
> is
> > not secure :-) I am happy to add that back in so that clients which don't
> > have access to a more secure algorithm can use it. But it would be a
> shame
> > to prevent users who only need Java clients from using more secure
> > mechanisms. Since SHA-1 is not secure, you need a secure Zookeeper
> > installation (or store your credentials in an alternative secure store)..
> > By supporting multiple algorithms, we are giving the choice to users. It
> > doesn't add much additional code, just the additional tests (one
> > integration test per mechanism). As more clients support new mechanisms,
> > users can enable these without any changes to Kafka.
> >
>
> Yes, I remember that I asked for SCRAM-SHA-1 to be removed. I probably
> wasn't clear. My suggestion was not to add that back, but whether we needed
> so many variants. For example, we could support SCRAM-SHA-256 and
> SCRAM-SHA-512.
> Would that be sufficient? It's true that the cost is not that large for us,
> but every other client also has to pay that additional extra cost and I am
> not sure sure about the benefit of some of the options.
>
> 3. I am assuming that ZK authentication will be enabled and ZK
> > configuration will be done directly using ZK commands. This is true for
> > ACLs, quotas etc. as well?
> >
>
> Right, I also thought that ACLs was the closest example. However, it seems
> like getting read access to the SCRAM DB has potentially worse
> consequences:
>
> "For a specific secret compromised, if an exchange is obtained from the
> wire by some mechanism, this gives sufficient information for an imposter
> to pose as the client for that server (but not another one using the same
> password). Note that this interception is only useful if the database has
> been compromised – SCRAM is safe against replay attack. This is the primary
> SCRAM weakness, and why it is important to protect the secret database
> carefully and to use TLS."[1]
>
> Also, because we are using fast hashes (instead of slow ones like bcrypt,
> scrypt, etc.), we are more susceptible to dictionary attacks (potentially
> mitigated by a reasonably large iteration count combined with good quality
> passwords).
>
> If nothing else, it may be worth mentioning some of this in the KIP and/or
> documentation.
>
> Ismael
>
> [1] http://www.isode.com/whitepapers/scram.html
>



-- 
Regards,

Rajini

Reply via email to