[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-17 Thread Lars Hofhansl (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Lars Hofhansl updated HBASE-9482:
-

Fix Version/s: (was: 0.94.13)
   0.94.12

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.95.2, 0.94.11
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.98.0, 0.94.12, 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482-0.94.patch, 
 HBASE-9482-0.94.patch, HBASE-9482.patch, HBASE-9482.patch, HBASE-9482.patch, 
 HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-11 Thread Lars Hofhansl (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Lars Hofhansl updated HBASE-9482:
-

   Resolution: Fixed
Fix Version/s: 0.94.13
   Status: Resolved  (was: Patch Available)

Committed to 0.94 as well.

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.95.2, 0.94.11
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.98.0, 0.96.0, 0.94.13

 Attachments: HBASE-9482-0.94.patch, HBASE-9482-0.94.patch, 
 HBASE-9482-0.94.patch, HBASE-9482.patch, HBASE-9482.patch, HBASE-9482.patch, 
 HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Fix Version/s: 0.96.0
Affects Version/s: 0.95.2
   0.94.11
   Status: Patch Available  (was: Open)

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.94.11, 0.95.2
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Attachment: HBASE-9482.patch

Patch for trunk.

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Attachments: HBASE-9482-0.94.patch, HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Status: Open  (was: Patch Available)

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.94.11, 0.95.2
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482.patch, HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Attachment: HBASE-9482.patch

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.95.2, 0.94.11
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482.patch, HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Release Note: Seems that trunk code moved ahead since I generated the 
patch. Resubmitting.
  Status: Patch Available  (was: Open)

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.94.11, 0.95.2
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482.patch, HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Status: Open  (was: Patch Available)

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.94.11, 0.95.2
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482.patch, 
 HBASE-9482.patch, HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Attachment: HBASE-9482.patch

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.95.2, 0.94.11
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482.patch, 
 HBASE-9482.patch, HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Release Note:   (was: Seems that trunk code moved ahead since I generated 
the patch. Resubmitting.)
  Status: Patch Available  (was: Open)

{{org.apache.hadoop.hbase.client.TestHCM.testConnection()}} creates an empty 
configuration (from HBase perspective) and hence does not have value for 
{{hbase.security.authentication}} set.

Resubmitting the patch.

Also, removing the ill placed comment in the release note section.

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.94.11, 0.95.2
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482.patch, 
 HBASE-9482.patch, HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Attachment: HBASE-9482-0.94.patch

Updated patch for 0.94 branch.

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.95.2, 0.94.11
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482-0.94.patch, 
 HBASE-9482.patch, HBASE-9482.patch, HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Attachment: HBASE-9482-0.94.patch

Updated patch for 0.94 branch addressing [~ghelmling]'s comment.

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.95.2, 0.94.11
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482-0.94.patch, 
 HBASE-9482-0.94.patch, HBASE-9482.patch, HBASE-9482.patch, HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Attachment: HBASE-9482.patch

And for trunk.

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.95.2, 0.94.11
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482-0.94.patch, 
 HBASE-9482-0.94.patch, HBASE-9482.patch, HBASE-9482.patch, HBASE-9482.patch, 
 HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Status: Open  (was: Patch Available)

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.94.11, 0.95.2
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482-0.94.patch, 
 HBASE-9482.patch, HBASE-9482.patch, HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Release Note: 
While it is possible to run secure HBase without securing underlying 
filesystem, it is recommended that you run secure HBase on top of a secured 
HDFS cluster to provide stronger guarantees of security. In such cases, you 
must configure HBase services to be able to authenticate to HDFS services.

However, if the cluster hosting HBase service is protected via other means; for 
example if it exports only HBase services to external users; you may save some 
overhead by running secure HBase over unsecured HDFS. In such cases, you must 
ensure that the HDSF services are not accessible to external user via any means.
  Status: Patch Available  (was: Open)

Submitting patch once again and adding release notes.

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.94.11, 0.95.2
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482-0.94.patch, 
 HBASE-9482-0.94.patch, HBASE-9482.patch, HBASE-9482.patch, HBASE-9482.patch, 
 HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-10 Thread stack (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

stack updated HBASE-9482:
-

Fix Version/s: 0.98.0

Committed to 0.96 and 0.98 (thanks [~ghelmling]).  [~lhofhansl] You want this 
in 0.94 boss?

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Affects Versions: 0.95.2, 0.94.11
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Fix For: 0.98.0, 0.96.0

 Attachments: HBASE-9482-0.94.patch, HBASE-9482-0.94.patch, 
 HBASE-9482-0.94.patch, HBASE-9482.patch, HBASE-9482.patch, HBASE-9482.patch, 
 HBASE-9482.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9482) Do not enforce secure Hadoop for secure HBase

2013-09-09 Thread Aditya Kishore (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Aditya Kishore updated HBASE-9482:
--

Attachment: HBASE-9482-0.94.patch

Patch of 0.94 branch.

 Do not enforce secure Hadoop for secure HBase
 -

 Key: HBASE-9482
 URL: https://issues.apache.org/jira/browse/HBASE-9482
 Project: HBase
  Issue Type: Bug
  Components: security
Reporter: Aditya Kishore
Assignee: Aditya Kishore
  Labels: security
 Attachments: HBASE-9482-0.94.patch


 We should recommend and not enforce secure Hadoop underneath as a requirement 
 to run secure HBase.
 Few of our customers have HBase clusters which expose only HBase services to 
 outside the physical network and no other services (including ssh) are 
 accessible from outside of such cluster.
 However they are forced to setup secure Hadoop and incur the penalty of 
 security overhead at filesystem layer even if they do not need to.
 The following code tests for both secure HBase and secure Hadoop.
 {code:title=org.apache.hadoop.hbase.security.User|borderStyle=solid}
   /**
* Returns whether or not secure authentication is enabled for HBase.  Note 
 that
* HBase security requires HDFS security to provide any guarantees, so this 
 requires that
* both codehbase.security.authentication/code and 
 codehadoop.security.authentication/code
* are set to codekerberos/code.
*/
   public static boolean isHBaseSecurityEnabled(Configuration conf) {
 return kerberos.equalsIgnoreCase(conf.get(HBASE_SECURITY_CONF_KEY)) 
 kerberos.equalsIgnoreCase(
 conf.get(CommonConfigurationKeys.HADOOP_SECURITY_AUTHENTICATION));
   }
 {code}
 What is worse that if {{hadoop.security.authentication}} is not set to 
 {{kerberos}} (undocumented at http://hbase.apache.org/book/security.html), 
 all other configuration have no impact and HBase RPCs silently switch back to 
 unsecured mode.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira