You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@kudu.apache.org by "Dan Burkert (JIRA)" <ji...@apache.org> on 2017/08/18 20:21:00 UTC
[jira] [Commented] (KUDU-1886) TLS certificate hostname
verification
[ https://issues.apache.org/jira/browse/KUDU-1886?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16133578#comment-16133578 ]
Dan Burkert commented on KUDU-1886:
-----------------------------------
A lot of the plumbing for getting hostnames into the handshake is being done as part of KUDU-2032.
> TLS certificate hostname verification
> -------------------------------------
>
> Key: KUDU-1886
> URL: https://issues.apache.org/jira/browse/KUDU-1886
> Project: Kudu
> Issue Type: Improvement
> Components: rpc, security
> Affects Versions: 1.2.0
> Reporter: Dan Burkert
> Labels: security
>
> We currently aren't correctly handling hostname verification on master-generated (ipki) certificates. This has big consequences in terms of the security of the system, and what active attackers with access to a cert can achieve. Couple of points that came out of discussions:
> - We currently don't plumb the remote hostname into the client negotiation, which will probably become necessary to avoid a reverse-DNS lookup when verifying the server's cert.
> - The master should be validating that the hostname in a tserver's CSR matches the Kerberos principal of the connection's authentication.
--
This message was sent by Atlassian JIRA
(v6.4.14#64029)