Radai, I don't have a strong objection to using a more verbose format. But the reasons for choosing the cryptic s=<salt>,t=<storedKey>,... format:
1. Unlike other properties like quotas stored in Zookeeper which need to be human readable in order to query the values, these values only need to be parsed by code. The base64-encoded array of bytes don't really mean anything to a human. You would only ever want to check if the user has credentials for a mechanism, you can't really tell what the credentials are from the value stored in ZK. 2. Single letter keys save space. Agree, it is not much, but since a more verbose format doesn't add much value, it feels like wasted space in ZK to store long key names for each property for each user for each mechanism. 3. SCRAM authentication messages defined in RFC 5802 <https://tools.ietf.org/html/rfc5802> use comma-separated key=value pairs with single letter keys. s=<salt> and i=<iterations> appear exactly like that in SCRAM messages. Server key and stored key are not exchanged, so I chose two unused letters. The same parser used for SCRAM messages is used to parse this persisted value as well since the format is the same. On Tue, Nov 15, 2016 at 5:02 PM, radai <radai.rosenbl...@gmail.com> wrote: > small nitpick - given that s,t,k and i are used as part of a rather large > CSV format, what is the gain in having them be single letter aliases? > in other words - why not salt=... , serverKey=... , storedKey=... , > iterations=... ? > > On Tue, Nov 15, 2016 at 7:26 AM, Mickael Maison <mickael.mai...@gmail.com> > wrote: > > > +1 > > > > On Tue, Nov 15, 2016 at 10:57 AM, Rajini Sivaram > > <rajinisiva...@googlemail.com> wrote: > > > Jun, > > > > > > Thank you, I have made the updates to the KIP. > > > > > > On Tue, Nov 15, 2016 at 12:34 AM, Jun Rao <j...@confluent.io> wrote: > > > > > >> Hi, Rajini, > > >> > > >> Thanks for the proposal. +1. A few minor comments. > > >> > > >> 30. Could you add that the broker config sasl.enabled.mechanisms can > now > > >> take more values? > > >> > > >> 31. Could you document the meaning of s,t,k,i used in > > /config/users/alice > > >> in ZK? > > >> > > >> 32. In the rejected section, could you document why we decided not to > > bump > > >> up the version of SaslHandshakeRequest? > > >> > > >> Jun > > >> > > >> > > >> On Mon, Nov 14, 2016 at 5:57 AM, Rajini Sivaram < > > >> rajinisiva...@googlemail.com> wrote: > > >> > > >> > Hi all, > > >> > > > >> > I would like to initiate the voting process for *KIP-84: Support > > >> SASL/SCRAM > > >> > mechanisms*: > > >> > > > >> > https://cwiki.apache.org/confluence/display/KAFKA/KIP- > > >> > 84%3A+Support+SASL+SCRAM+mechanisms > > >> > > > >> > This KIP adds support for four SCRAM mechanisms (SHA-224, SHA-256, > > >> SHA-384 > > >> > and SHA-512) for SASL authentication, giving more choice for users > to > > >> > configure security. When delegation token support is added to Kafka, > > >> SCRAM > > >> > will also support secure authentication using delegation tokens. > > >> > > > >> > Thank you... > > >> > > > >> > Regards, > > >> > > > >> > Rajini > > >> > > > >> > > > > > > > > > > > > -- > > > Regards, > > > > > > Rajini > > > -- Regards, Rajini