[ 
https://issues.apache.org/jira/browse/MAPREDUCE-1026?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12758610#action_12758610
 ] 

Owen O'Malley commented on MAPREDUCE-1026:
------------------------------------------

1. Of course

2. I'm pretty agnostic what the authentication mechanism is, other than I don't 
want an extra round trip. I don't see any way of doing a hash without an extra 
round trip on the connection open. On the other hand, doing a password doesn't 
reveal anything that isn't already known. If the attacker can sniff the 
network, they already know the secret.

3. If there is a better key length, we can use it. 66^10 is big enough to be 
safe. 

4. Of course

5. The key is per a job of course, but there is no advantage to having the 
JobTracker pick it. Either way it will be framework code that picks it. Putting 
it in the job conf is easy, and secure (once MAPREDUCE-181 goes in). Given that 
the key will be at the JobTracker and all of the TaskTracker's, I don't see the 
submitting node as a problem.

> Shuffle should be secure
> ------------------------
>
>                 Key: MAPREDUCE-1026
>                 URL: https://issues.apache.org/jira/browse/MAPREDUCE-1026
>             Project: Hadoop Map/Reduce
>          Issue Type: Sub-task
>          Components: security
>            Reporter: Owen O'Malley
>            Assignee: Devaraj Das
>
> Since the user's data is available via http from the TaskTrackers, we should 
> require a job-specific secret to access it.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to