[ 
https://issues.apache.org/jira/browse/AMBARI-20938?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Robert Levas updated AMBARI-20938:
----------------------------------
    Description: 
LDAPS connections to an Active Directory when enabling Kerberos should validate 
the server's SSL certificate.  The current implementation skips validation 
checks to help avoid SSL issues; however this is not secure. Also the 
_trusting_ SSL connection may not support the more secure SSL protocols - 
TLSv1.2.

A flag in the {{ambari.properties}} file 
({{kerberos.operation.verify.kdc.trust}}) should be available to allow for the 
user to select either a _trusting_  SSL connection or a validating 
(non-trusting) SSL connection to be used.  The default should be to use the 
standard (non-trusting) SSL connection. 


  was:
LDAPS connections to an Active Directory when enabling Kerberos should validate 
the server's SSL certificate.  The current implementation skips validation 
checks to help avoid SSL issues; however this is not secure. Also the 
_trusting_ SSL connection may not support the more secure SSL protocols - 
TLSv1.2.

A flag in the {{ambari.properties}} file should be available to allow for the 
_trusting_  SSL connection to be used; but the default should be to use the 
standard (non-trusting) SSL connection. 



> LDAPS connections to an Active Directory when enabling Kerberos should 
> validate the server's SSL certificate
> ------------------------------------------------------------------------------------------------------------
>
>                 Key: AMBARI-20938
>                 URL: https://issues.apache.org/jira/browse/AMBARI-20938
>             Project: Ambari
>          Issue Type: Bug
>          Components: ambari-server
>    Affects Versions: 2.0.0
>            Reporter: Robert Levas
>            Assignee: Robert Levas
>              Labels: active-directory, active_directory, kerberos, ssl
>             Fix For: 2.5.2
>
>
> LDAPS connections to an Active Directory when enabling Kerberos should 
> validate the server's SSL certificate.  The current implementation skips 
> validation checks to help avoid SSL issues; however this is not secure. Also 
> the _trusting_ SSL connection may not support the more secure SSL protocols - 
> TLSv1.2.
> A flag in the {{ambari.properties}} file 
> ({{kerberos.operation.verify.kdc.trust}}) should be available to allow for 
> the user to select either a _trusting_  SSL connection or a validating 
> (non-trusting) SSL connection to be used.  The default should be to use the 
> standard (non-trusting) SSL connection. 



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

Reply via email to