[ https://issues.apache.org/jira/browse/KAFKA-15861?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Colin McCabe resolved KAFKA-15861. ---------------------------------- Resolution: Won't Fix If you want to distributed keys separately, consider using a keystore file. If you want to implement metadata log encryption, consider filing a KIP. For now I will close this as "Won't Fix" since we don't have any KIP describing a different implementation. > In Kraft mode, "ssl.keystore.key" private keys are accesible to all the > controllers and brokers > ----------------------------------------------------------------------------------------------- > > Key: KAFKA-15861 > URL: https://issues.apache.org/jira/browse/KAFKA-15861 > Project: Kafka > Issue Type: Improvement > Affects Versions: 3.6.0 > Reporter: Jesús Cea > Priority: Major > > Kafka allow dynamic updates of the TLS keys using > "{color:#000000}ssl.keystore.key" and > "{color:#000000}ssl.keystore.certificate.chain{color}". In a KRaft cluster, > that data is distributed to the entire cluster, so the private keys of the > X509 certificates are widely shared.{color} > To test this, you could propagate a X.509 certificate update via > "kafka-configs" for a particular server and then use > "{color:#000000}kafka-metadata-shell.sh" to verify that the new certificate > is openly shared with all the cluster servers (controllers and brokers) > (under > "{color:#000000}image/configs/BROKER:XXXXX/listener.name.XXXXX.ssl.keystore.key{color}"){color} > You can also verify this doing a "strings" to the "__cluster_metadata-0" > topic log files and "grep" the PEM private key. > Expected result: I understand the need of the replicated metadata in KRaft > mode, but the X.509 private key should be shared encrypted with > "password.encoder.secret", so only the relevant broker is able to decrypt the > certificate private key, although all the cluster has access to the "opaque" > encrypted data. If each broker has a (different) high quality > "password.encoder.secret", the encrypted private key should be safe to > replicate. > -- This message was sent by Atlassian Jira (v8.20.10#820010)