erikgb commented on pull request #11916:
URL: https://github.com/apache/kafka/pull/11916#issuecomment-1073653291


   > @rajinisivaram Is there always a reason to require the key password?
   
   @dajac At least I do not think there is a good reason for it. 😸  We have 
found a [related comment in the test 
code](https://github.com/apache/kafka/blob/3.1/clients/src/test/java/org/apache/kafka/common/network/SslTransportLayerTest.java#L493-L495).
 IMO Kafka should not **enforce** best practices. It would be sufficient to 
_recommend_ encrypted private keys.
   
   This issue is currently blocking us from using PEM-formatted certificates 
issued by [cert-manager](https://github.com/cert-manager/cert-manager) with 
Kafka - since cert-manager does not support encrypted private keys.
   
   I asked one of the main cert-manager maintainers about this, and got the 
following comments:
   
   > There is a benefit to encrypting this stuff if the cert is being persisted 
to disk and if the decryption key isn't written to the same disk, which is 
probably a pretty common setup in a lot of older non-cloud systems. The issue 
in a lot of more modern or cloud environments - especially in k8s - is that 
certs are ideally never going to be written to disk and wherever they are 
stored, they'd likely be stored next to their decryption keys.
   
   > So I guess everyone's right - in some environments encrypting the key is 
probably worth it, and in some it's a false sense of security and wasted CPU 
cycles. That to me means that being able to choose to not encrypt the key is 
desirable.
   (This is assuming that the encryption is actually secure, which might not be 
true for all methods of encrypting private keys)


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: jira-unsubscr...@kafka.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


Reply via email to