Github user harishreedharan commented on the pull request:

    https://github.com/apache/spark/pull/4688#issuecomment-76240862
  
    Not sure if you got a chance to look at the patch. We are actually not 
logging in on every executor, but only on the Client and the AM. The client 
logs in, sets the tokens for the AM and the AM starts using those. At 60% of 
the expiry of AM's tokens (so around 4.2 days), the AM logs in and then 
generates tokens which are passed around the executors. So the replay attack 
should not be a concern, since the login happens days apart.
    
    The keytab is actually used only by the client once and the AM once. It is 
also passed around securely - we copy it to the application staging directory 
and the AM reads it from there.  So I don't think the distribution of the 
keytab is actually much of an issue. 


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at [email protected] or file a JIRA ticket
with INFRA.
---

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to