Thanks. So what do people typically do to mitigate this? Other than restricting who has access to this network?
-- Jan Høydahl, search solution architect Cominvent AS - www.cominvent.com > 27. sep. 2018 kl. 17:10 skrev Andor Molnar <an...@cloudera.com.INVALID>: > > Right. It's plaintext. > > > On Thu, Sep 27, 2018 at 4:54 PM, Jan Høydahl <jan....@cominvent.com> wrote: > >> I am *explicitly* asking about old-style 3.4.x socket protocol, not the >> new Netty transport which I know supports SSL. >> >> My original question was whether authentication credentials are passed in >> plaintext across the wire and thus being easy to pickup by an attacker. >> And if that is true, if there are know ways of working around the lack of >> SSL support for the TCP transport. >> >> Martin Gainty, I cannot see how I can easily plug in TLS1.3 in my existing >> connection between client and Zookeeper 3.4.x, but if there is a simple way >> to do so then please share how you did it. >> >> The only solution I see, as we're stuck with 3.4.x, is to setup IPSec >> tunnels on OS level on all client/server traffic. I wanted to avoid that. >> >> -- >> Jan Høydahl, search solution architect >> Cominvent AS - www.cominvent.com >> >>> 27. sep. 2018 kl. 16:14 skrev Andor Molnar <an...@cloudera.com.INVALID>: >>> >>> https://cwiki.apache.org/confluence/display/ZOOKEEPER/ >> ZooKeeper+SSL+User+Guide >>> >>> SSL (client-server) has been added in 3.5.1 >>> SSL server-server support is being reviewed on GitHub. >>> >>> Regards, >>> Andor >>> >>> >>> >>> On Thu, Sep 27, 2018 at 3:46 PM, Jan Høydahl <jan....@cominvent.com> >> wrote: >>> >>>> Hi, >>>> >>>>> if you're prevented from implementing SSL why not use TLSv1.3? >>>> >>>> >>>> I have not found any evidence that Zookeeper server nor (Java) client >>>> supports TLS in version 3.4.13. Please point me to some docs or >> tutorial. >>>> We don't want to fork Zookeeper to implement this stuff ourselves :) >>>> >>>> -- >>>> Jan Høydahl, search solution architect >>>> Cominvent AS - www.cominvent.com >>>> >>>>> 27. sep. 2018 kl. 15:17 skrev Martin Gainty <mgai...@hotmail.com>: >>>>> >>>>> >>>>> ________________________________ >>>>> From: Jan Høydahl <jan....@cominvent.com> >>>>> Sent: Thursday, September 27, 2018 5:12 AM >>>>> To: user@zookeeper.apache.org >>>>> Subject: Digest auth with classic TCP transport >>>>> >>>>> Hi >>>>> >>>>> We use ZK 3.4.13, and unfortunately cannot use Netty transport and SSL. >>>>> We plan to use digest authentication and Zookeeper ACL protection. >>>>> >>>>> Question is, since we cannot use SSL, is there some other way to make >>>> sure the user credentials are not sniffed over the network and thus let >> an >>>> attacker impersonate our application and cange the content in Zookeeper? >>>> Does the Zookeeper client do some smart moves to protect/hash the >> password >>>> over the network? I suppose the binary transport is easy to decipher for >>>> those who try. >>>>> >>>>> MG>if you're prevented from implementing SSL why not use TLSv1.3? >>>>> MG>with TLSv1.3 you can implement encryption/decryption with crypto >>>> private/public keys and x509 certs >>>>> https://en.wikipedia.org/wiki/Transport_Layer_Security >>>>> Transport Layer Security - Wikipedia<https://en. >>>> wikipedia.org/wiki/Transport_Layer_Security> >>>>> Transport Layer Security (TLS) – and its predecessor, Secure Sockets >>>> Layer (SSL), which is now deprecated by the Internet Engineering Task >> Force >>>> (IETF) – are cryptographic protocols that provide communications >> security >>>> over a computer network. Several versions of the protocols find >> widespread >>>> use in applications such as web browsing, email, instant messaging, and >>>> voice over IP (VoIP). >>>>> en.wikipedia.org >>>>> >>>>> >>>>> MG>path of least resistance is to contact verisign and ask them to >>>> generate keys, certs and allow them to act as CA >>>>> MG>Caveat: tls1.3 implementation is slow and is supported by Mozilla >>>> v60...and some versions of chrome >>>>> MG>as far as ciphers to prevent MIMA do not implement TLS_DH_anon and >>>> TLS_ECDH_anon key agreement methods MG>do not authenticate the server >>>>> MG>you will want public key size to be min 2048bit to conform to chrome >>>> secure transmission requirements >>>>> MG>securing message is done thru MD5 or SHA but you will need to >>>> incorporate selected algo into >>>>> MG>supported cipher-suite(s) >>>>> https://en.wikipedia.org/wiki/Cipher_suite >>>>> Cipher suite - Wikipedia<https://en.wikipedia.org/wiki/Cipher_suite> >>>>> A cipher suite is a set of algorithms that help secure a network >>>> connection that uses Transport Layer Security (TLS) or Secure Socket >> Layer >>>> (SSL). The set of algorithms that cipher suites usually contain >> include: a >>>> key exchange algorithm, a bulk encryption algorithm, and a message >>>> authentication code (MAC) algorithm.. The key exchange algorithm is >> used to >>>> exchange a key between two devices. >>>>> en.wikipedia.org >>>>> >>>>> >>>>> HTH >>>>> Martin >>>>> -- >>>>> Jan Høydahl >>>>> Cominvent AS - www.cominvent.com<http://www.cominvent.com> >>>>> >>>> >>>> >> >>