To make it clear about the different options: 1) if ssl-enabled-component & ssl-use-default-context is configured then use default SSL context. 2) if ssl-enabled-component & no other ssl-* properties are configured then configure SSL context by loading truststore and keystore from user home directory. 3) if ssl-enabled-component & ssl-* properties are configured then configure SSL context as configured by user.
While #2 and #3 are existing behavior, #1 is implemented as part of current proposal for GEODE-5338. On Mon, Aug 13, 2018 at 8:25 AM Sai Boorlagadda <sai.boorlaga...@gmail.com> wrote: > I missed follow up emails on this thread, for some reason my email client > didn't show there were new messages on this thread. Like Jinmei said, a > user has to first enable SSL by configuring ssl-enable-component and then > chose between using default context or using specific > keystore/trustsore (existing implementation). > > Also, I am dropping the idea of making it a new default to use default SSL > context as it will break backward compatibility. > > On Thu, Aug 9, 2018 at 10:52 AM Jinmei Liao <jil...@pivotal.io> wrote: > >> let me see if my understanding is correct: if ssl-enabled-component is >> none, then we would accept non-ssl connections, no ssl context will be >> used. if ssl-enabled-component is something other than "none", but we don't >> specify any other ssl-* configurations, then we use the default ssl context >> provided by JDK, any customization to the JDK's ssl context (either by >> installing a custom provider or keystore/truststore installed in jdk's >> path) will be used this way. But we do specify any other ssl-* >> configurations, then we use our usual way of loading the ssl context. >> >> On Thu, Aug 9, 2018 at 10:33 AM Anthony Baker <aba...@pivotal.io> wrote: >> >>> >>> >>> > On Aug 9, 2018, at 10:05 AM, Jacob Barrett <jbarr...@pivotal.io> >>> wrote: >>> > >>> > >>> > >>> > On Aug 9, 2018, at 9:42 AM, Anthony Baker <aba...@pivotal.io> wrote: >>> > >>> >>> >>> >>> >>> >>> I would like to also get consensus on defaulting GEODE's behavior to >>> always >>> >>> use default SSL context instead of introducing a new parameter >>> >>> 'ssl-use-default-sslcontext'. If user's have specified any existing >>> ssl-* >>> >>> props then the current implementation is exercised (ie to configure >>> the >>> >>> context as per provided properties). >>> >>> >>> >> >>> >> If geode is always configured to use the default SSL context, how do >>> we know to when to accept SSL v non-SSL connections? >>> >> >>> > >>> > The enable ssl properties. >>> > >>> >>> Sorry I’m missing something. If the only time we accept SSL connections >>> is when you enable geode ssl-* properties, what is the point of enabling >>> the default SSL context by default? >>> >>> Anthony >>> >>> >> >> -- >> Cheers >> >> Jinmei >> >