Exactly. I would have assumed #2 is bringing in default context if the user does not specific keystore and truststore. But unfortunately, the current code loads keystore from "{user.home}/.keystore" and so the proposal for this new property. We should probably disable loading from user.home if not specified in 2.0
Sai On Mon, Aug 13, 2018 at 8:48 AM Jinmei Liao <jil...@pivotal.io> wrote: > Doing #2 an #3 alone would fix GEODE-5338, right? We don't really need this > new option. > > On Mon, Aug 13, 2018 at 8:32 AM Sai Boorlagadda <sai.boorlaga...@gmail.com > > > wrote: > > > To make it clear about the different options: > > > > 1) if ssl-enabled-component & ssl-use-default-context is configured then > > use default SSL context. > > 2) if ssl-enabled-component & no other ssl-* properties are configured > then > > configure SSL context by loading truststore and keystore from user home > > directory. > > 3) if ssl-enabled-component & ssl-* properties are configured then > > configure SSL context as configured by user. > > > > While #2 and #3 are existing behavior, #1 is implemented as part of > current > > proposal for GEODE-5338. > > > > On Mon, Aug 13, 2018 at 8:25 AM Sai Boorlagadda < > sai.boorlaga...@gmail.com > > > > > wrote: > > > > > I missed follow up emails on this thread, for some reason my email > client > > > didn't show there were new messages on this thread. Like Jinmei said, a > > > user has to first enable SSL by configuring ssl-enable-component and > then > > > chose between using default context or using specific > > > keystore/trustsore (existing implementation). > > > > > > Also, I am dropping the idea of making it a new default to use default > > SSL > > > context as it will break backward compatibility. > > > > > > On Thu, Aug 9, 2018 at 10:52 AM Jinmei Liao <jil...@pivotal.io> wrote: > > > > > >> let me see if my understanding is correct: if ssl-enabled-component is > > >> none, then we would accept non-ssl connections, no ssl context will be > > >> used. if ssl-enabled-component is something other than "none", but we > > don't > > >> specify any other ssl-* configurations, then we use the default ssl > > context > > >> provided by JDK, any customization to the JDK's ssl context (either by > > >> installing a custom provider or keystore/truststore installed in jdk's > > >> path) will be used this way. But we do specify any other ssl-* > > >> configurations, then we use our usual way of loading the ssl context. > > >> > > >> On Thu, Aug 9, 2018 at 10:33 AM Anthony Baker <aba...@pivotal.io> > > wrote: > > >> > > >>> > > >>> > > >>> > On Aug 9, 2018, at 10:05 AM, Jacob Barrett <jbarr...@pivotal.io> > > >>> wrote: > > >>> > > > >>> > > > >>> > > > >>> > On Aug 9, 2018, at 9:42 AM, Anthony Baker <aba...@pivotal.io> > wrote: > > >>> > > > >>> >>> > > >>> >>> > > >>> >>> I would like to also get consensus on defaulting GEODE's behavior > > to > > >>> always > > >>> >>> use default SSL context instead of introducing a new parameter > > >>> >>> 'ssl-use-default-sslcontext'. If user's have specified any > existing > > >>> ssl-* > > >>> >>> props then the current implementation is exercised (ie to > configure > > >>> the > > >>> >>> context as per provided properties). > > >>> >>> > > >>> >> > > >>> >> If geode is always configured to use the default SSL context, how > do > > >>> we know to when to accept SSL v non-SSL connections? > > >>> >> > > >>> > > > >>> > The enable ssl properties. > > >>> > > > >>> > > >>> Sorry I’m missing something. If the only time we accept SSL > > connections > > >>> is when you enable geode ssl-* properties, what is the point of > > enabling > > >>> the default SSL context by default? > > >>> > > >>> Anthony > > >>> > > >>> > > >> > > >> -- > > >> Cheers > > >> > > >> Jinmei > > >> > > > > > > > > -- > Cheers > > Jinmei >