Udo, are you proposing to deprecate in 1.12 and remove in 1.14?

> On Feb 28, 2020, at 1:03 PM, Udo Kohlmeyer <ukohlme...@pivotal.io> wrote:
> 
> +1 to adding the deprecation. But I would prefer that we give users more 
> notice than 3 months.
> 
> maybe we deprecate it in 1.14
> 
> --Udo
> 
> On 2/28/20 1:00 PM, Ernest Burghardt wrote:
>> +1
>> 
>> seems reasonable to do this for 1.12 and be ahead of the game, @Owen would
>> you please spawn that as a separate release 1.12 thread? thanks, eB
>> 
>> On Fri, Feb 28, 2020 at 11:56 AM Owen Nichols <onich...@pivotal.io> wrote:
>> 
>>> +1
>>> 
>>> We should have done this as soon as SSL/TLS was ready.  Better late than
>>> never!
>>> 
>>> While we normally wait until a major release to remove deprecated stuff,
>>> there is some precedent for removing insecure encryption algorithms sooner
>>> (Java has done this even in patch releases).  We should consider getting
>>> the deprecation notice into 1.12 and removing in 1.13, rather than waiting
>>> for 2.0.
>>> 
>>>> On Feb 28, 2020, at 11:42 AM, Bill Burcham <bill.burc...@gmail.com>
>>> wrote:
>>>> I propose we deprecate Geode’s proprietary UDP message privacy algorithm
>>>> based on the Diffie-Hellman key exchange protocol. This would deprecate:
>>>> 
>>>> ConfigurationProperties.SECURITY_UDP_DHALGO
>>>> 
>>>> String DistributionConfig.getSecurityUDPDHAlgo()
>>>> 
>>>> void DistributionConfig.setSecurityUDPDHAlgo(String attValue)
>>>> DistributionConfig.SECURITY_UDP_DHALGO_NAME
>>>> 
>>>> Additionally we’d have to upate documentation to reflect deprecation.
>>>> 
>>>> From ConfigurationProperties.java:
>>>> 
>>>> 
>>>> Application can set this property to valid symmetric key algorithm, to
>>>> encrypt udp messages in Geode. Geode will generate symmetric key using
>>>> Diffie-Hellman key exchange algorithm between peers. That key further
>>> used
>>>> by specified algorithm to encrypt the udp messages.
>>>> 
>>>> The property (and the feature) was added mid-2016. Unfortunately it was
>>> not
>>>> added as an “experimental” feature, so it cannot simply be removed.
>>>> 
>>>> Incidentally, the corresponding property for client-server communication,
>>>> SECURITY_CLIENT_DHALGO, is already deprecated. It was deprecated in Geode
>>>> 1.5 in favor of SSL/TLS.
>>>> 
>>>> I am proposing deprecating the feature because:
>>>> 
>>>> 
>>>>   1.
>>>> 
>>>>   The feature has not proven popular with users.
>>>>   2.
>>>> 
>>>>   At least one hard-to-reproduce bug exists in the implementation:
>>>>   GEODE-6448 <https://issues.apache.org/jira/browse/GEODE-6448>. We’ve
>>>>   burned a person-week trying to fix the problem (Bruce Schuchardt and
>>> me)
>>>>   and it’s not clear how much more time it will take. If we decide to
>>>>   deprecate the feature, fixing this problem would be de-prioritized
>>>>   accordingly.
>>>>   3.
>>>> 
>>>>   If we decide, in the future, that UDP message security is required, it
>>>>   would be better to implement a standard algorithm such as DTLS
>>>>   <https://tools.ietf.org/html/rfc6347>:
>>>>   1.
>>>> 
>>>>      Our algorithm provides only message privacy whereas DTLS provides
>>>>      privacy, tamper-resistance, and message forgery protection
>>>>      2.
>>>> 
>>>>      DTLS is a standard
>>>>      3.
>>>> 
>>>>      There is some support for DTLS in the JDK (JEP-219
>>>>      <https://openjdk.java.net/jeps/219> delivered in JDK 9). It’s not a
>>>>      complete implementation e.g. guaranteed delivery is a
>>> do-it-yourself kit.
>>>> 
>>>> Actually implementing DTLS is out of scope for this proposal. Adding DTLS
>>>> would be a significant undertaking.
>>>> 
>>>> So, how do you feel about me making a GEODE ticket to deprecate the
>>>> SECURITY_UDP_DHALGO configuration property?
>>> 

Reply via email to