[ 
https://issues.apache.org/jira/browse/SOLR-10307?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16014295#comment-16014295
 ] 

Mano Kovacs commented on SOLR-10307:
------------------------------------

Thanks, [[email protected]].
I see you backported to 6x too. I mentioned above:
bq. There is a non-backward compatible change in the patch. If solr is not 
started through the batch files (solr.sh or solr.bat), but rather by running 
the start.jar directly with -Dsolr.jetty.truststore.password, Jetty will not 
pick up the keystore and truststore passwords. The patch changes jetty-ssl.xml 
so that is not using the system properties anymore. I did not find a way to use 
both there. Should this go to the upgrade notes?

Is that a concern?

> Provide SSL/TLS keystore password a more secure way
> ---------------------------------------------------
>
>                 Key: SOLR-10307
>                 URL: https://issues.apache.org/jira/browse/SOLR-10307
>             Project: Solr
>          Issue Type: Improvement
>      Security Level: Public(Default Security Level. Issues are Public) 
>          Components: security
>            Reporter: Mano Kovacs
>            Assignee: Mark Miller
>             Fix For: master (7.0), 6.7
>
>         Attachments: SOLR-10307.patch, SOLR-10307.patch, SOLR-10307.patch
>
>
> Currently the only way to pass server and client side SSL keytstore and 
> truststore passwords is to set specific environment variables that will be 
> passed as system properties, through command line parameter.
> First option is to pass passwords through environment variables which gives a 
> better level of protection. Second option would be to use hadoop credential 
> provider interface to access credential store.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to