[
https://issues.apache.org/jira/browse/KAFKA-15273?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Manikumar resolved KAFKA-15273.
-------------------------------
Fix Version/s: 3.7.0
Resolution: Fixed
> Log common name of expired client certificate
> ---------------------------------------------
>
> Key: KAFKA-15273
> URL: https://issues.apache.org/jira/browse/KAFKA-15273
> Project: Kafka
> Issue Type: Improvement
> Components: clients, core, security
> Affects Versions: 3.6.0
> Reporter: Eike Thaden
> Assignee: Eike Thaden
> Priority: Minor
> Labels: PatchAvailable
> Fix For: 3.7.0
>
>
> If a client tries to authenticate via mTLS with an expired certificate, the
> connection is closed and the IP address of the connection attempt is logged.
> However, in complex enterprise IT environments it might be very hard or even
> impossible to identify which client tried to connect if only the IP address
> is known (e.g. due to complex virtualization/containerization/NAT). This
> results in significant effort for the Kafka platform teams to identify the
> developmers responsible for such a misconfigured client.
> As a possible solution I propose to log the common name used in the client
> certificate in addition to the IP address. Due to security considerations,
> this should only be done if that certificate is just expired and would be
> valid otherwise (e.g. signed by a known, non-expired root/intermediate CA).
> The way Kafka should handle any valid/invalid/expired certificate must be
> exactly the same as before, except for the creation of a log message in case
> it is expired.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)