Thanks Ismael,

I created the child page but forgot the add it to the table... I
re-numbered "Join Semantics" to KIP-77.

Sorry for the confusion.

-Matthias

On 08/27/2016 01:01 PM, Ismael Juma wrote:
> Hi Matthias,
> 
> Improve Kafka Streams Join Semantics is not mentioned on the KIP page and
> that is probably the source of confusion:
> 
> https://cwiki.apache.org/confluence/display/KAFKA/
> Kafka+Improvement+Proposals
> 
> Ismael
> 
> On Thu, Aug 25, 2016 at 10:44 PM, Matthias J. Sax <matth...@confluent.io>
> wrote:
> 
>> I guess this should be KIP-77 ?
>>
>> KIP-76 is "Improve Kafka Streams Join Semantics"
>>
>> See http://search-hadoop.com/m/uyzND19SmQJ1yfCQ42/v=plain
>>
>> -Matthias
>>
>> On 08/25/2016 10:13 PM, Ashish Singh wrote:
>>> Hey Gwen,
>>>
>>> You’re right that if someone can alter the executable then they can do
>>> things in the context of the thing running the script, like kafka. But if
>>> you were kafka admin user (or root), you could also do lots of things to
>>> lots of other different files owned by the user, so it’s not really that
>>> much different than the current state of things.
>>>
>>> You’re right to wonder about the real security gains here. In some sense,
>>> they aren’t many, because if you know where to look and what to do, you
>> can
>>> coax the password out of that executable. What this approach really does
>> is
>>> make it *nontrivial* for an attacker to get the password. And people tend
>>> to flip out when they see passwords sitting in the clear on a disk,
>> because
>>> we’ve all been rightly trained that cleartext passwords are bad.
>>>
>>> This approach when combined with some strong security practices, like the
>>> ones mentioned below makes the system reasonably secure. This approach is
>>> probably the simplest way for folks to strengthen their Kafka security.
>>> There are other more complicated ways, like Hadoop’s credential store,
>>> which depends on external systems. If the community feels that this does
>>> not help, we can definitely move towards more complicated mechanisms.
>>> However, this has sufficed for our needs so far and others have expressed
>>> their satisfaction on the JIRA.
>>>
>>>    - Executable decrypts a file that stores encrypted passwords.
>>>    - The secret to decrypt that file is passed in via environment, which
>> is
>>>    generally a bit harder to find than files on disk.
>>>    - The perms also protect the executable.
>>>    - The file sits on an ephemeral disk that’s mounted to memory, so
>>>    stealing a physical disk won’t result in getting even the encrypted
>>>    password.
>>>
>>> On Thu, Aug 25, 2016 at 9:07 AM, Gwen Shapira <g...@confluent.io> wrote:
>>>
>>> Hi Ashish,
>>>>
>>>> I appreciate the need to integrate our authentication with other
>>>> systems that store passwords.
>>>> I am not sure that doing so by running a binary is the best solution.
>>>>
>>>> First, it does not add security: As you said, a file is just "sitting
>>>> there" the same way an executable is just "sitting there" - we still
>>>> rely on file system privileges for security.
>>>> Second, the idea that Kafka will run arbitrary filesystem executables
>>>> is pretty terrifying. Reading a string from a file is harmless, but an
>>>> incorrectly privileged executable can be replaced with "rm -rf /" or
>>>> anything really. Kafka sometimes runs from privileged account, so this
>>>> is a serious risk.
>>>>
>>>> I looked at the Hadoop credential store you helpfully linked to in the
>>>> KIP, and it seems like the Hadoop proposal includes a well thought out
>>>> API to integrate with external systems. Since we took this approach in
>>>> the past, I'm wondering why not follow the same and use an API to
>>>> integrate with credential stores rather than arbitrary executables.
>>>>
>>>> Gwen
>>>>
>>>> On Wed, Aug 24, 2016 at 12:03 PM, Ashish Singh <asi...@cloudera.com>
>>>> wrote:
>>>>> Hey Guys,
>>>>>
>>>>> I’ve just posted KIP-76: Enable getting password from executable rather
>>>>> than passing as plaintext in config files
>>>>> <https://cwiki.apache.org/confluence/display/KAFKA/KIP-76+En
>>>> able+getting+password+from+executable+rather+than+passing+
>>>> as+plaintext+in+config+files>
>>>>> .
>>>>>
>>>>> The proposal is to enable getting passwords from executable. This is an
>>>> ask
>>>>> from very security conscious users.
>>>>>
>>>>> Full details are here:
>>>>>
>>>>> KIP:
>>>>> https://cwiki.apache.org/confluence/display/KAFKA/KIP-76+Ena
>>>> ble+getting+password+from+executable+rather+than+passing+as+
>>>> plaintext+in+config+files
>>>>> JIRA: https://issues.apache.org/jira/browse/KAFKA-2629
>>>>> POC: https://github.com/apache/kafka/pull/1770
>>>>>
>>>>> Thanks
>>>>>
>>>>> --
>>>>>
>>>>> Regards,
>>>>> Ashish
>>>>
>>>>
>>>>
>>>> --
>>>> Gwen Shapira
>>>> Product Manager | Confluent
>>>> 650.450.2760 | @gwenshap
>>>> Follow us: Twitter | blog
>>>>
>>> ​
>>>
>>
>>
> 

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to