[ 
https://issues.apache.org/jira/browse/HADOOP-11218?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14188667#comment-14188667
 ] 

Haohui Mai commented on HADOOP-11218:
-------------------------------------

I propose a more aggressive approach, that is, to remove this configuration and 
pick reasonable ciphers / protocols. The reason is that it requires some domain 
knowledges to properly configure it correctly, and misconfiguring it can lead 
to security holes. It would be nice to not having a configuration that can 
shoot the users' foot.

Note that the configuration is added in 2.6 which still supports Java 6. The 
configuration allows users that run 2.6 on Java 7 to disable the flawed 
protocols / ciphers. As 2.7 is going to support Java 7 only, I think that the 
original motivation is fulfilled thus the configuration can be removed.

> Add TLSv1.1,TLSv1.2 to KMS, HttpFS, SSLFactory
> ----------------------------------------------
>
>                 Key: HADOOP-11218
>                 URL: https://issues.apache.org/jira/browse/HADOOP-11218
>             Project: Hadoop Common
>          Issue Type: Bug
>          Components: kms
>    Affects Versions: 2.7.0
>            Reporter: Robert Kanter
>            Priority: Critical
>
> HADOOP-11217 required us to specifically list the versions of TLS that KMS 
> supports. With Hadoop 2.7 dropping support for Java 6 and Java 7 supporting 
> TLSv1.1 and TLSv1.2, we should add them to the list.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to