You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@ambari.apache.org by "Robert Levas (JIRA)" <ji...@apache.org> on 2017/05/05 21:06:04 UTC
[jira] [Updated] (AMBARI-20938) LDAPS connections to an Active
Directory when enabling Kerberos should validate the server's SSL
certificate
[ https://issues.apache.org/jira/browse/AMBARI-20938?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Robert Levas updated AMBARI-20938:
----------------------------------
Description:
LDAPS connections to an Active Directory when enabling Kerberos should validate the server's SSL certificate. The current implementation skips validation checks to help avoid SSL issues; however this is not secure. Also the _trusting_ SSL connection may not support the more secure SSL protocols - TLSv1.2.
A flag in the {{ambari.properties}} file ({{kerberos.operation.verify.kdc.trust}}) should be available to allow for the user to select either a _trusting_ SSL connection or a validating (non-trusting) SSL connection to be used. The default should be to use the standard (non-trusting) SSL connection.
was:
LDAPS connections to an Active Directory when enabling Kerberos should validate the server's SSL certificate. The current implementation skips validation checks to help avoid SSL issues; however this is not secure. Also the _trusting_ SSL connection may not support the more secure SSL protocols - TLSv1.2.
A flag in the {{ambari.properties}} file should be available to allow for the _trusting_ SSL connection to be used; but the default should be to use the standard (non-trusting) SSL connection.
> LDAPS connections to an Active Directory when enabling Kerberos should validate the server's SSL certificate
> ------------------------------------------------------------------------------------------------------------
>
> Key: AMBARI-20938
> URL: https://issues.apache.org/jira/browse/AMBARI-20938
> Project: Ambari
> Issue Type: Bug
> Components: ambari-server
> Affects Versions: 2.0.0
> Reporter: Robert Levas
> Assignee: Robert Levas
> Labels: active-directory, active_directory, kerberos, ssl
> Fix For: 2.5.2
>
>
> LDAPS connections to an Active Directory when enabling Kerberos should validate the server's SSL certificate. The current implementation skips validation checks to help avoid SSL issues; however this is not secure. Also the _trusting_ SSL connection may not support the more secure SSL protocols - TLSv1.2.
> A flag in the {{ambari.properties}} file ({{kerberos.operation.verify.kdc.trust}}) should be available to allow for the user to select either a _trusting_ SSL connection or a validating (non-trusting) SSL connection to be used. The default should be to use the standard (non-trusting) SSL connection.
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)