[ 
https://issues.apache.org/jira/browse/IGNITE-13520?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17229017#comment-17229017
 ] 

Pavel Pereslegin commented on IGNITE-13520:
-------------------------------------------

[~nizhikov], take a look at these changes.

> Сlient node with a static encrypted cache configuration can generate an 
> encryption key when joining.
> ----------------------------------------------------------------------------------------------------
>
>                 Key: IGNITE-13520
>                 URL: https://issues.apache.org/jira/browse/IGNITE-13520
>             Project: Ignite
>          Issue Type: Bug
>    Affects Versions: 2.9
>            Reporter: Pavel Pereslegin
>            Assignee: Pavel Pereslegin
>            Priority: Major
>              Labels: encryption
>             Fix For: 2.10
>
>          Time Spent: 1h
>  Remaining Estimate: 0h
>
> Currently, when a client node joins a cluster with a static encrypted cache 
> configuration, it generates an encryption key for that cache and sends it to 
> the cluster (just like the server node does).
> _SpringEncryptedCacheRestartClientTest_ reproduces this behavior and it is 
> unexpected, it happens due to IGNITE-13567 (see 
> _GridEncryptionManager#collectJoiningNodeData_).
> The client node should not generate encryption keys and should be able to 
> start without configuring EncryptionSPI.
> After doing some research on possible solutions, we decided to reject node 
> joining in such a situation, because there is no clean and simple way to 
> distribute the same encryption key between server nodes that are already in 
> the cluster (we have to either add discovery overhead, block the exchange, or 
> add an additional exchange to be able to distribute keys between server nodes 
> that are already in the cluster).



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to