Roberta Marton created TRAFODION-2050:
-----------------------------------------

             Summary: Fix a problem we have supporting a Kerberized Zookeeper.
                 Key: TRAFODION-2050
                 URL: https://issues.apache.org/jira/browse/TRAFODION-2050
             Project: Apache Trafodion
          Issue Type: Sub-task
          Components: sql-security
            Reporter: Roberta Marton


As part of Kerberozing “Trafodion, we want to secure the Trafodion DCS/MXOSRVR 
data in ZooKeeper, specifically apply the ACL “auth:sasl:crdwa” to all 
/trafodion znodes. The default ACL seems to be “world:anyone:crdwa”, which 
means fully open access for everyone.

Once the /trafodion znodes are secured, the ZooKeeper client must authenticate 
with Kerberos to access the data. DCS can do this with the ZooKeeper Java 
client, after a one-line configuration change in dcs-env.sh. However, MXOSRVR 
cannot do this because it uses the ZooKeeper C client, which doesn’t support 
Kerberos authentication (see 
http://mail-archives.apache.org/mod_mbox/zookeeper-user/201505.mbox/%3CCANLc_9J6b4QCs5QXPFVp7myiOMOMboVme%3DDUNBh4Y-9hY7rHDQ%40mail.gmail.com%3E).

Possible Solutions:

1.      Change MXOSRVR to use JNI for all ZooKeeper calls.

2.      Reimplement MXOSRVR in Java within the multi-threaded DCS (a new 
architecture for MXOSRVR).  Until then, use non-secure ACLs for the /trafodion 
znodes. To be clear, other znodes would still be secured (e.g., HBase, Hive), 
this issue only affects the /trafodion znodes used by DCS/MXOSRVR. As far as we 
can tell, the worst case security impact is that someone could delete/modify 
the trafodion znodes to cause a Denial of Service (DoS) attack; customer data 
would not be compromised.

3.      Complete the work for 
https://issues.apache.org/jira/browse/ZOOKEEPER-1112 in the ZooKeeper open 
source project.






--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to