[
https://issues.apache.org/jira/browse/HADOOP-14146?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15946878#comment-15946878
]
Kai Zheng commented on HADOOP-14146:
------------------------------------
bq. I had quickly looked at Kerby and Apache DS. I didn't use them for a few
reasons: The extra dependency burden.
In case it's needed, Apache DS as LDAP involved the dependency is heavy, but
this work can be done using Kerby and only {{org.apache.kerby.kerb-core}}
module is needed, which is pretty lightweight.
bq. The encoding format is decades old so there shouldn't be a maintainability
issue.
Anyway to decode the kerberos ticket, we need to test and verify it works for
the main Kerberos KDC products. It looks good to provide some tests already, I
guess the packets are AD or MIT issued ones?
> KerberosAuthenticationHandler should authenticate with SPN in AP-REQ
> --------------------------------------------------------------------
>
> Key: HADOOP-14146
> URL: https://issues.apache.org/jira/browse/HADOOP-14146
> Project: Hadoop Common
> Issue Type: Bug
> Components: security
> Affects Versions: 2.5.0
> Reporter: Daryn Sharp
> Assignee: Daryn Sharp
> Attachments: HADOOP-14146.1.patch, HADOOP-14146.patch
>
>
> Many attempts (HADOOP-10158, HADOOP-11628, HADOOP-13565) have tried to add
> multiple SPN host and/or realm support to spnego authentication. The basic
> problem is the server tries to guess and/or brute force what SPN the client
> used. The server should just decode the SPN from the AP-REQ.
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]