I had a slightly orthogonal question: Do we need any special
authentication mechanism today to join a Ratis ring ?
It is probably not a significant question -- and the answer is that we
are secure -- it was not obvious for me from reading code. Hence the
question.


Here is a possible attack vector:

1. Assume that it is possible to join the Ratis ring by simply
pointing to the Ratis group -- say you have a ring, and all I need to
do to join is some config file change -- or kill a machine and do an
ARP spoofing.
2. At that point, will updateKeys send the keys to an attacker ?
4. In other words, does putting the Symmetric keys into a replication
mode even make sense.
5. When SCM fails over, it can simply send its id across or ID in all
packets -- and the clients can negotiate a key ?

Thanks
Anu

On Sun, May 21, 2023 at 9:20 PM Sumit Agrawal
<sumitagra...@cloudera.com.invalid> wrote:
>
> Hi Duong,
>
> Thanks for working on this. I have gone to design docs and it looks good.
>
> Few query:
> 1. Upgrade from existing block token with async algo to symmetric
> algorithm:
> - any impact to existing/old clients?
>
> 2. When using block token configuration with HMACWithSha256 and later
> changed to HMACWithSha1, and restart SCM to take config in effect.
> - do this have any impact to existing token and DNs running with old and
> new token?
> Just to know if algorithm is upgraded in system, how do this have impact or
> do need any further changes to support this.
>
>
> Regards
> Sumit
>
> On Sat, May 20, 2023 at 5:35 AM Duong Nguyen <du...@apache.org> wrote:
>
> > Dear Ozone Devs,
> >
> > I would like to start this discussion thread for the proposal to merge
> > HDDS-7733-Symmetric-Tokens to master.
> >
> > This feature branch contains the implementation to replace the costly token
> > signature generation using asymmetric (RSA) keys with symmetric key
> > algorithms, like HMAC with SHA256. Symmetric key algorithms bring a
> > much better performance and are the natural fit for Ozone token use case.
> > Yet, they require building a mechanism to generate, store, distribute, and
> > renew symmetric secret keys. That requirement is not trivial and has to be
> > split into smaller tasks that cannot be shipped individually. That is
> > the reason why the implementation of HDDS-7733
> > <https://issues.apache.org/jira/browse/HDDS-7733> happens in a separate
> > feature branch.
> >
> > HDDS-7733 is not a new feature but an internal redesign for Ozone tokens to
> > improve OM performance/Ozone scalability. Apart from the existing
> > integration and acceptance tests which should already cover the usage of
> > tokens pretty well, we also added E2E test cases to cover the edge cases
> > related to the symmetric secret keys life-cycle, as per HDDS-8003
> > <https://issues.apache.org/jira/browse/HDDS-8003>.
> >
> > More information can be found on the wiki page:
> > https://cwiki.apache.org/confluence/pages/viewpage.action?pageId=255070328
> >
> > If there are no objections to the merge, we could start the official vote.
> >
> > Thanks,
> > Duong
> >
>
>
> --
> *Sumit Agrawal* | Senior Staff Engineer
> cloudera.com <https://www.cloudera.com>
> [image: Cloudera] <https://www.cloudera.com/>
> [image: Cloudera on Twitter] <https://twitter.com/cloudera> [image:
> Cloudera on Facebook] <https://www.facebook.com/cloudera> [image: Cloudera
> on LinkedIn] <https://www.linkedin.com/company/cloudera>
> ------------------------------

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@ozone.apache.org
For additional commands, e-mail: dev-h...@ozone.apache.org

Reply via email to