[ 
https://issues.apache.org/jira/browse/HADOOP-14146?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15946878#comment-15946878
 ] 

Kai Zheng commented on HADOOP-14146:
------------------------------------

bq. I had quickly looked at Kerby and Apache DS. I didn't use them for a few 
reasons: The extra dependency burden. 
In case it's needed, Apache DS as LDAP involved the dependency is heavy, but 
this work can be done using Kerby and only {{org.apache.kerby.kerb-core}} 
module is needed, which is pretty lightweight. 

bq. The encoding format is decades old so there shouldn't be a maintainability 
issue.
Anyway to decode the kerberos ticket, we need to test and verify it works for 
the main Kerberos KDC products. It looks good to provide some tests already, I 
guess the packets are AD or MIT issued ones?

> KerberosAuthenticationHandler should authenticate with SPN in AP-REQ
> --------------------------------------------------------------------
>
>                 Key: HADOOP-14146
>                 URL: https://issues.apache.org/jira/browse/HADOOP-14146
>             Project: Hadoop Common
>          Issue Type: Bug
>          Components: security
>    Affects Versions: 2.5.0
>            Reporter: Daryn Sharp
>            Assignee: Daryn Sharp
>         Attachments: HADOOP-14146.1.patch, HADOOP-14146.patch
>
>
> Many attempts (HADOOP-10158, HADOOP-11628, HADOOP-13565) have tried to add 
> multiple SPN host and/or realm support to spnego authentication.  The basic 
> problem is the server tries to guess and/or brute force what SPN the client 
> used.  The server should just decode the SPN from the AP-REQ.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to