[ 
https://issues.apache.org/jira/browse/ACCUMULO-1009?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Berman updated ACCUMULO-1009:
-------------------------------------

    Attachment: ACCUMULO-1009_thriftSsl.patch

Attaching first draft of SSL patch for comment.  To generate keys, in 
$ACCUMULO_HOME, {{mkdir conf/ssl}} and run:

{code}
bin/accumulo org.apache.accumulo.server.security.ssl.CertUtils generate-all 
--local-keystore conf/ssl/keystore.jks --root-keystore conf/ssl/root.jks 
--root-truststore conf/ssl/truststore.jks
{code}

then you can turn it on with instance.ssl.enabled=true in your site config.  
Keystore locations and passwords are all configurable, but the defaults should 
work without any additional config (private keys protected with instance 
secret, and the public root cert is in a separate passwordless truststore).

To create an SSL connection from a client, you can use the new ZKInstance 
constructor that takes an additional {{boolean ssl}} parameter, or just {{echo 
instance.ssl.enabled=true >> ~/.accumulo/config}} to SSL all of your client 
connections.  If you're running your client on the same machine where you 
generated certs, the default path will still work for you.  Otherwise, {{echo 
ssl.client.truststore.path=/path/to/truststore.jks >> ~/.accumulo/config}}.  
I'm imagining the common usage scenario will be to have your truststore path in 
local client config, but leave whether or not SSL is enabled up to each 
individual client application.

I added a couple SSL-enabled integration tests that cover a range of connection 
scenarios (plain instance connectors, mapreduce jobs, admin commands), and you 
can also run _all_ the ITs with SSL enabled with {{mvn verify -DuseSslForIT}}.

A few tasks I know I still have remaining:
- Fail fast if client and server SSL switch is mismatched based on flag in ZK
- Interactive cert generation process more like `bin/accumulo init`, rather 
than running CertUtils with a big pile of switches
- SSL support on the client side of the proxy
- Docs

One known risk is that the Thrift SSL transport only supports blocking 
connections.  This means that when SSL is enabled, we have to switch to a 
TThreadPoolServer instead of a THsHaServer.  In theory the performance impact 
of this change can be mitigated by cranking up the thread pool size, but I 
haven't done any scale testing to see what the practical impact of this 
constraint actually is.  At the moment, as long as we use Thrift for transport, 
I don't think we have much choice.

I would love comments, suggestions, questions, etc.
                
> Support encryption over the wire
> --------------------------------
>
>                 Key: ACCUMULO-1009
>                 URL: https://issues.apache.org/jira/browse/ACCUMULO-1009
>             Project: Accumulo
>          Issue Type: New Feature
>            Reporter: Keith Turner
>            Assignee: Michael Berman
>             Fix For: 1.6.0
>
>         Attachments: ACCUMULO-1009_thriftSsl.patch
>
>
> Need to support encryption between ACCUMULO clients and servers.  Also need 
> to encrypt communications between server and servers.   
> Basically need to make it possible for users to enable SSL+thrift.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to