You are viewing a plain text version of this content. The canonical link for it is here.
Posted to yarn-issues@hadoop.apache.org by "Jason Lowe (JIRA)" <ji...@apache.org> on 2017/05/25 22:11:04 UTC
[jira] [Created] (YARN-6650) ContainerTokenIdentifier is re-encoded
during token verification
Jason Lowe created YARN-6650:
--------------------------------
Summary: ContainerTokenIdentifier is re-encoded during token verification
Key: YARN-6650
URL: https://issues.apache.org/jira/browse/YARN-6650
Project: Hadoop YARN
Issue Type: Bug
Components: security
Affects Versions: 2.8.0
Reporter: Jason Lowe
A ContainerTokenIdentifier is serialized into bytes and signed by the RM secret key. When the NM needs to verify the identifier, it is decoding the bytes into a ContainerTokenIdentifier to get the key ID then re-encoding the identifier into a byte buffer to hash it with the key. This is fine as long as the RM and NM both agree how a ContainerTokenIdentifier should be serialized into bytes.
However when the versions of the RM and NM are different and fields were added to the identifier between those versions then the NM may end up re-serializing the fields in a different order than the RM did, especially when there were gaps in the protocol field IDs that were filled in between the versions. If the fields are reordered during the re-encoding then the bytes will not match the original stream that was signed and the token verification will fail.
The original token identifier bytes received via RPC need to be used by the verification process, not the bytes generated by re-encoding the identifier.
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)
---------------------------------------------------------------------
To unsubscribe, e-mail: yarn-issues-unsubscribe@hadoop.apache.org
For additional commands, e-mail: yarn-issues-help@hadoop.apache.org