Re: Proposal to support custom java.security.Provider

2018-08-13 Thread Sai Boorlagadda
Exactly. I would have assumed #2 is bringing in default context if the user does not specific keystore and truststore. But unfortunately, the current code loads keystore from "{user.home}/.keystore" and so the proposal for this new property. We should probably disable loading from user.home if not

Re: Proposal to support custom java.security.Provider

2018-08-13 Thread Sai Boorlagadda
Good question. We can allow a user to use current properties ssl-protocols and ssl-ciphers even when he wants to use the default security provider. Here would be a sequence of steps user can to answer: 1) Decide whether you want SSL? 2) Great. Do you want to use 2.a) default ssl context? or

Re: Proposal to support custom java.security.Provider

2018-08-13 Thread Jinmei Liao
Doing #2 an #3 alone would fix GEODE-5338, right? We don't really need this new option. On Mon, Aug 13, 2018 at 8:32 AM Sai Boorlagadda wrote: > To make it clear about the different options: > > 1) if ssl-enabled-component & ssl-use-default-context is configured then > use default SSL context. >

Re: Proposal to support custom java.security.Provider

2018-08-13 Thread Jens Deppe
How does this work if the user wants to use the Trust/KeyStoreManager from the default security provider but still override other SSL properties such as ciphers or protocols? --Jens On Mon, Aug 13, 2018 at 8:32 AM Sai Boorlagadda wrote: > To make it clear about the different options: > > 1) if

Re: Proposal to support custom java.security.Provider

2018-08-13 Thread Sai Boorlagadda
To make it clear about the different options: 1) if ssl-enabled-component & ssl-use-default-context is configured then use default SSL context. 2) if ssl-enabled-component & no other ssl-* properties are configured then configure SSL context by loading truststore and keystore from user home direct

Re: Proposal to support custom java.security.Provider

2018-08-13 Thread Sai Boorlagadda
I missed follow up emails on this thread, for some reason my email client didn't show there were new messages on this thread. Like Jinmei said, a user has to first enable SSL by configuring ssl-enable-component and then chose between using default context or using specific keystore/trustsore (exist

Re: Proposal to support custom java.security.Provider

2018-08-09 Thread Jinmei Liao
let me see if my understanding is correct: if ssl-enabled-component is none, then we would accept non-ssl connections, no ssl context will be used. if ssl-enabled-component is something other than "none", but we don't specify any other ssl-* configurations, then we use the default ssl context provi

Re: Proposal to support custom java.security.Provider

2018-08-09 Thread Anthony Baker
> On Aug 9, 2018, at 10:05 AM, Jacob Barrett wrote: > > > > On Aug 9, 2018, at 9:42 AM, Anthony Baker wrote: > >>> >>> >>> I would like to also get consensus on defaulting GEODE's behavior to always >>> use default SSL context instead of introducing a new parameter >>> 'ssl-use-default-s

Re: Proposal to support custom java.security.Provider

2018-08-09 Thread Jacob Barrett
On Aug 9, 2018, at 9:42 AM, Anthony Baker wrote: >> >> >> I would like to also get consensus on defaulting GEODE's behavior to always >> use default SSL context instead of introducing a new parameter >> 'ssl-use-default-sslcontext'. If user's have specified any existing ssl-* >> props then t

Re: Proposal to support custom java.security.Provider

2018-08-09 Thread Anthony Baker
> > > I would like to also get consensus on defaulting GEODE's behavior to always > use default SSL context instead of introducing a new parameter > 'ssl-use-default-sslcontext'. If user's have specified any existing ssl-* > props then the current implementation is exercised (ie to configure the

Re: Proposal to support custom java.security.Provider

2018-08-07 Thread Sai Boorlagadda
Based on the review I am amending the proposal as follows: - Removing the proposed new property 'ssl-use-default-provider' - Add an ability for GEODE to use default SSLContext This way users can choose between whether to use default security context or provide ssl-* parameters to configure it as

Proposal to support custom java.security.Provider

2018-08-01 Thread Sai Boorlagadda
All, GEODE-5338[1], is a feature request to support CA & KEY rotation on the client application. I am proposing a solution[2] to add a new SSL property ( *ssl-use-default-provider*) to let Geode use default security provider[3] (either JDK provided provider or a custom provider) to load and manag