Thanks for the reviews.

Makes sense. I don't see any downsides. Updated the KIP, to go with Option
2.
I will be starting the vote thread soon.

Thanks,


On Wed, Sep 19, 2018 at 2:17 PM Rajini Sivaram <rajinisiva...@gmail.com>
wrote:

> Hi Manikumar,
>
> Unless there is a downside to option 2 (e.g will it impose character limits
> in the DN), it may be better to go with option 2 for consistency and
> flexibility.
>
> On Wed, Sep 19, 2018 at 5:11 AM, Harsha <ka...@harsha.io> wrote:
>
> > Thanks. I am also leaning towards option 2, as it will help the
> > consistency of expressing such mapping between sasl and ssl.
> > -Harsha
> >
> > On Tue, Sep 18, 2018, at 8:27 PM, Manikumar wrote:
> > > Hi Harsha,
> > >
> > > Thanks for the review. Yes, As mentioned on the motivation section,
> this
> > is
> > > to simply extracting fields from the certificates
> > > for the common use cases. Yes, we are not supporting extracting
> > > SubjectAltName using this KIP.
> > >
> > > Thanks,
> > >
> > >
> > > On Wed, Sep 19, 2018 at 8:29 AM Harsha <ka...@harsha.io> wrote:
> > >
> > > > Hi Manikumar,
> > > >         I am interested to know the reason for exposing this config,
> > given
> > > > a user has access to PrincipalBuilder interface to build their
> > > > interpretation of an identity from the X509 certificates. Is this to
> > > > simplify extraction of identity? and also there are other use cases
> > where
> > > > user's will extract SubjectAltName to construct the identity I guess
> > thats
> > > > not going to supported by this method.
> > > >
> > > > Thanks,
> > > > Harsha
> > > >
> > > > On Tue, Sep 18, 2018, at 8:25 AM, Manikumar wrote:
> > > > > Hi Rajini,
> > > > >
> > > > > I don't have strong reasons for rejecting Option 2. I just felt
> > Option 1
> > > > is
> > > > > sufficient for
> > > > > the common use-cases (extracting single field, like CN etc..).
> > > > >
> > > > > We are open to go with Option 2, for more flexible mapping
> mechanism.
> > > > > Let us know, your preference.
> > > > >
> > > > > Thanks,
> > > > >
> > > > >
> > > > > On Tue, Sep 18, 2018 at 8:05 PM Rajini Sivaram <
> > rajinisiva...@gmail.com>
> > > > > wrote:
> > > > >
> > > > > > Hi Manikumar,
> > > > > >
> > > > > > It wasn't entirely clear to me why Option 2 was rejected.
> > > > > >
> > > > > > On Tue, Sep 18, 2018 at 7:47 AM, Manikumar <
> > manikumar.re...@gmail.com>
> > > > > > wrote:
> > > > > >
> > > > > > > Hi All,
> > > > > > >
> > > > > > > We would like to go with Option 1, which adds a new
> configuration
> > > > > > parameter
> > > > > > > pair of the form:
> > > > > > > ssl.principal.mapping.pattern, ssl.principal.mapping.value.
> This
> > will
> > > > > > > fulfill the requirement for most of the common use cases.
> > > > > > >
> > > > > > > We would like to include the KIP in the upcoming release. If
> > there no
> > > > > > > concerns, would like to start vote on this KIP.
> > > > > > >
> > > > > > > Thanks,
> > > > > > >
> > > > > > > On Fri, Sep 14, 2018 at 11:32 PM Priyank Shah <
> > ps...@hortonworks.com
> > > > >
> > > > > > > wrote:
> > > > > > >
> > > > > > > > Definitely a helpful change. +1 for Option 2.
> > > > > > > >
> > > > > > > > On 9/14/18, 10:52 AM, "Manikumar" <
> manikumar.re...@gmail.com>
> > > > wrote:
> > > > > > > >
> > > > > > > >     Hi Eno,
> > > > > > > >
> > > > > > > >     Thanks for the review.
> > > > > > > >
> > > > > > > >     Most often users want to extract one of the field (eg.
> > CN). CN
> > > > is
> > > > > > the
> > > > > > > >     commonly used field.
> > > > > > > >     For this simple change, users need to build and maintain
> > the
> > > > custom
> > > > > > > >     principal builder class
> > > > > > > >     and also package and deploy to the all brokers. Having
> > > > configurable
> > > > > > > > rules
> > > > > > > >     will be useful.
> > > > > > > >
> > > > > > > >     Proposed mapping rules works on string representation of
> > the
> > > > X.500
> > > > > > > >     distinguished name(RFC2253 format) [1].
> > > > > > > >     Mapping rules can use the attribute types keywords
> defined
> > in
> > > > RFC
> > > > > > > 2253
> > > > > > > > (CN,
> > > > > > > >     L, ST, O, OU, C, STREET, DC, UID).
> > > > > > > >
> > > > > > > >     Any additional/custom attribute types are emitted as
> OIDs.
> > To
> > > > emit
> > > > > > > >     additional attribute type keys,
> > > > > > > >     we need to have OID -> attribute type keyword String
> > > > mapping.[2]
> > > > > > > >
> > > > > > > >     For example, String representation of
> > X500Principal("CN=Duke,
> > > > > > > > OU=JavaSoft,
> > > > > > > >     O=Sun Microsystems, C=US, EMAILADDRESS=t...@test.com")
> > > > > > > >     will be "CN=Duke,OU=JavaSoft,O=Sun
> > > > > > > >     Microsystems,C=US,1.2.840.113549.1.9.1=#
> > > > > > > 160d7465737440746573742e636f6d"
> > > > > > > >
> > > > > > > >     If we have the OID - key mapping ("1.2.840.113549.1.9.1",
> > > > > > > > "emailAddress"),
> > > > > > > >     the string will be
> > > > > > > >     "CN=Duke,OU=JavaSoft,O=Sun
> Microsystems,C=US,emailAddress=
> > > > > > > > t...@test.com"
> > > > > > > >
> > > > > > > >     Since we are not passing this mapping, we can not extarct
> > using
> > > > > > > > additional
> > > > > > > >     attribute type keyword string.
> > > > > > > >     If the user want to extract additional attribute keys, we
> > need
> > > > to
> > > > > > > write
> > > > > > > >     custom principal builder class.
> > > > > > > >
> > > > > > > >     Hope the above helps. Update the KIP.
> > > > > > > >
> > > > > > > >     [1]
> > > > > > > >
> > > > > > > >
> > > > https://docs.oracle.com/javase/7/docs/api/javax/security/auth/x500/
> > > > > > > X500Principal.html#getName(java.lang.String)
> > > > > > > >
> > > > > > > >     [2]
> > > > > > > >
> > > > > > > >
> > > > https://docs.oracle.com/javase/7/docs/api/javax/security/auth/x500/
> > > > > > > X500Principal.html#getName(java.lang.String,%20java.util.Map)
> > > > > > > >
> > > > > > > >     Thanks
> > > > > > > >
> > > > > > > >     On Fri, Sep 14, 2018 at 7:44 PM Eno Thereska <
> > > > > > eno.there...@gmail.com
> > > > > > > >
> > > > > > > > wrote:
> > > > > > > >
> > > > > > > >     > Manikumar, thanks. If I understand the KIP motivation
> > right,
> > > > this
> > > > > > > is
> > > > > > > >     > currently already possible, but you want to have an
> > easier
> > > > way of
> > > > > > > > doing it,
> > > > > > > >     > right? The motivation would be stronger if we had 2-3
> > common
> > > > > > cases
> > > > > > > > (from
> > > > > > > >     > experience) where the suggested pattern would solve
> > them, and
> > > > > > > > perhaps 1-2
> > > > > > > >     > cases where the pattern would not be adequate and we'd
> > have
> > > > to
> > > > > > fall
> > > > > > > > back to
> > > > > > > >     > the existing builder class.
> > > > > > > >     >
> > > > > > > >     > Thanks
> > > > > > > >     > Eno
> > > > > > > >     >
> > > > > > > >     > On Fri, Sep 14, 2018 at 12:36 PM, Manikumar <
> > > > > > > > manikumar.re...@gmail.com>
> > > > > > > >     > wrote:
> > > > > > > >     >
> > > > > > > >     > > Hi All,
> > > > > > > >     > >
> > > > > > > >     > > We'd appreciate any thoughts / comments on the
> proposed
> > > > options
> > > > > > > for
> > > > > > > >     > > customizing SSL principal names.
> > > > > > > >     > > We are happy to discuss any alternative
> > > > approaches/suggestions.
> > > > > > > >     > >
> > > > > > > >     > > Thanks,
> > > > > > > >     > >
> > > > > > > >     > > On Sat, Sep 8, 2018 at 12:45 AM Manikumar <
> > > > > > > > manikumar.re...@gmail.com>
> > > > > > > >     > > wrote:
> > > > > > > >     > >
> > > > > > > >     > > > Hi all,
> > > > > > > >     > > >
> > > > > > > >     > > > I have created a KIP that proposes couple of
> options
> > for
> > > > > > > building
> > > > > > > >     > custom
> > > > > > > >     > > > SSL principal names.
> > > > > > > >     > > >
> > > > > > > >     > > >
> > > > > > > >     > > > https://cwiki.apache.org/
> > confluence/display/KAFKA/KIP-
> > > > > > > >     > >
> > > > 371%3A+Add+a+configuration+to+build+custom+SSL+principal+name
> > > > > > > >     > > >
> > > > > > > >     > > > Please take a look.
> > > > > > > >     > > >
> > > > > > > >     > > > Thanks,
> > > > > > > >     > > > Manikumar
> > > > > > > >     > > >
> > > > > > > >     > >
> > > > > > > >     >
> > > > > > > >
> > > > > > > >
> > > > > > > >
> > > > > > >
> > > > > >
> > > >
> >
>

Reply via email to